Flask Session Cookie Decoder/Encoder.
Dependencies
Installation
# pacman -S flask-session-cookie-manager{3,2}
Git
Both python3 etn python2:
$ git clone https://github.com/noraj/flask-session-cookie-manager.git && cd flask-session-cookie-manager
# makepkg -sic
Other Distros
Find your way with your package manager, use pip in a virtual environment or use pyenv.
Eg.
$ git clone https://github.com/noraj/flask-session-cookie-manager.git && cd flask-session-cookie-manager
$ python -m venv venv
$ source venv/bin/activate
$ python setup.py install
Usage
Use flask_session_cookie_manager3.py
with Python 3 and flask_session_cookie_manager2.py
with Python 2.
Usage: flask_session_cookie_manager{2,3}.py [-h] {encode,decode} …
Flask Session Cookie Decoder/Encoder
Positional Arguments:
{encode,decode} sub-command help
encode encode
decode decode
Optional Arguments:
-h, –help show this help message and exit
Usage: flask_session_cookie_manager{2,3}.py encode [-h] -s -t
Optional Arguments:
-h, –help show this help message and exit
-s , –secret-key
Secret key
-t , –cookie-structure
Session cookie structure
Usage: flask_session_cookie_manager.py decode [-h] [-s ] -c
Optional Arguments:
-h, –help show this help message and exit
-s , –secret-key
Secret key
-c , –cookie-value
Session cookie value
Examples
$ python{2,3} flask_session_cookie_manager{2,3}.py encode -s ‘.{y]tR&sp&77RdO~u3@XAh#TalD@Oh~yOF_51H(QV};K|ghT^d’ -t ‘{“number”:”326410031505″,”username”:”admin”}’ eyJudW1iZXIiOnsiIGIiOiJNekkyTkRFd01ETXhOVEExIn0sInVzZXJuYW1lIjp7IiBiIjoiWVdSdGFXND0ifX0.DE2iRA.ig5KSlnmsDH4uhDpmsFRPupB5Vw
Note: the session cookie structure must be a valid python dictionary
Decode
$ python{2,3} flask_session_cookie_manager{2,3}.py decode -c ‘eyJudW1iZXIiOnsiIGIiOiJNekkyTkRFd01ETXhOVEExIn0sInVzZXJuYW1lIjp7IiBiIjoiWVdSdGFXND0ifX0.DE2iRA.ig5KSlnmsDH4uhDpmsFRPupB5Vw’ -s ‘.{y]tR&sp&77RdO~u3@XAh#TalD@Oh~yOF_51H(QV};K|ghT^d’ {u’username’: ‘admin’, u’number’: ‘326410031505’}
$ python{2,3} flask_session_cookie_manager{2,3}.py decode -c ‘eyJudW1iZXIiOnsiIGIiOiJNekkyTkRFd01ETXhOVEExIn0sInVzZXJuYW1lIjp7IiBiIjoiWVdSdGFXND0ifX0.DE2iRA.ig5KSlnmsDH4uhDpmsFRPupB5Vw’ {“number”:{” b”:”MzI2NDEwMDMxNTA1″},”username”:{” b”:”YWRtaW4=”}}
Docker is a powerful open-source containerization platform that allows developers to build, test, and deploy…
Docker is one of the most widely used containerization platforms. But there may come a…
Introduction Google Dorking is a technique where advanced search operators are used to uncover information…
Introduction In cybersecurity and IT operations, logging fundamentals form the backbone of monitoring, forensics, and…
What is Networking? Networking brings together devices like computers, servers, routers, and switches so they…
Introduction In the world of Open Source Intelligence (OSINT), anonymity and operational security (OPSEC) are…