Just some random small tools for dealing with asp.net Forms Authentication Cookies
☆31Aug 3, 2021Updated 4 years ago
Alternatives and similar repositories for aspnetCryptTools
Users that are interested in aspnetCryptTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆12Oct 29, 2021Updated 4 years ago
- PEN-300 collection to help you on your exam.☆13Apr 19, 2022Updated 3 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Docker container to use blutter (dart decompiler for android apps)☆22Sep 18, 2024Updated last year
- Prelude client side libraries☆17Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- ☆15Jun 26, 2025Updated 9 months ago
- ☆18Aug 15, 2021Updated 4 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- A Security Scanner for Go☆26Feb 11, 2019Updated 7 years ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated last month
- NSE script to detect ProxyOracle☆13Aug 30, 2021Updated 4 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Spring4Shell RCE exploit☆13Apr 4, 2022Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆16Apr 6, 2021Updated 5 years ago
- This is a complete set of HTB academy CBBH path cheatsheets and skills assesment solutions☆10May 10, 2024Updated last year
- My Personal Notes of OSEP☆42Jun 1, 2023Updated 2 years ago
- http 302 redirect iptables module☆11Aug 26, 2017Updated 8 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- 🔍 A collection of interesting, funny, and depressing search queries to plug into shodan.io 👩💻☆12Nov 8, 2022Updated 3 years ago
- PoC for dumping and decrypting cookies in the latest version of Microsoft Teams☆130Nov 12, 2023Updated 2 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- A proving grounds for young and aspiring BBOT modules☆15Apr 1, 2026Updated last week
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- project-blacklist3r☆640Oct 3, 2025Updated 6 months ago
- Exploit ONLYOFFICE Implementations☆28Nov 25, 2022Updated 3 years ago
- PoC of injecting code into a running Linux process☆23Sep 11, 2019Updated 6 years ago
- Capture the flag Game☆17Apr 14, 2025Updated 11 months ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- This is a simple program that allows you to bruteforce a protected web page where the authentication type is Basic Authentication☆11Dec 8, 2022Updated 3 years ago
- Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration feature…☆303Apr 25, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- AspXVenom automates the process of generating encoded shellcode and embedding it into ASPX webshells, providing a smooth workflow for pen…☆18Mar 19, 2025Updated last year
- Certificate based authentication example using Docker and NGINX☆10Jan 28, 2021Updated 5 years ago
- Burp extension that performs a passive scan to identify cloud buckets and then test them for publicly accessible vulnerabilities☆14Jan 17, 2023Updated 3 years ago
- ☆18Dec 23, 2024Updated last year
- Demos of Donut used in conferences, etc. Mostly for my use, but free for others to use as a reference.☆31Nov 6, 2019Updated 6 years ago
- An example pattern in C# for using WMI to monitor process creation and termination events.☆53Aug 13, 2018Updated 7 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago