VIEWSTATE module and decoder was copied from https://github.com/yuvadm/viewstate.git and all kudos go to yuvadm.
I just wrote a small tool to easily decode ASP.NET __VIEWSTATE variables without having
to install the viewstate module into the system with administrative privileges and be able to decode the variables with a small script using a terminal, without writting python code.
Sometimes when doing webpentesting against a ASP web application is useful a tool like this.
$ ./decoder.py "/wEPDwUKMTU5MTA2ODYwOWRkoCvvBWgUOH7PD446qvEOF6GTCq0="
** ASP.NET __VIEWSTATE decoder **
[*] Decoding __VIEWSTATE:
/wEPDwUKMTU5MTA2ODYwOWRkoCvvBWgUOH7PD446qvEOF6GTCq0=
(('1591068609', None), None)
To protect against this attacks turn EnableViewStateMac property to True in the machine.config file.
To encrypt turn property validation to 3DES.
Use at your own risk in an environment that you are allowed to attack.
~ (c) defensahacker