☆17Jun 9, 2021Updated 4 years ago
Alternatives and similar repositories for CTF-2019
Users that are interested in CTF-2019 are comparing it to the libraries listed below
Sorting:
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 3 years ago
- AXFR all the things!☆29Sep 21, 2025Updated 5 months ago
- 基于 puppeteer-core + chromium 的 XSS 机器人☆26Jun 27, 2019Updated 6 years ago
- ☆27Jun 17, 2021Updated 4 years ago
- Apache ShardingSphere UI YAML解析远程代码执行漏洞☆31Mar 11, 2020Updated 5 years ago
- My answers to http://4clojure.com/☆13Jun 21, 2013Updated 12 years ago
- See more current version at https://github.com/ElectionDataAnalysis/election_data_analysis/☆10Jul 6, 2023Updated 2 years ago
- Automated discovery and exploitation of security vulnerabilities using natural language and LLMs.☆19Oct 24, 2025Updated 4 months ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Standardizing Security Titles☆13Dec 31, 2025Updated 2 months ago
- Automated Reverse TCP tunneling using a digitalocean instance and aploium's shootback repo (https://github.com/aploium/shootback)☆13Oct 30, 2018Updated 7 years ago
- Python C2 with JScript Implant☆15Nov 15, 2023Updated 2 years ago
- Template to detect some malware☆14Aug 7, 2023Updated 2 years ago
- Expand CIDRs or wrangle a list of IPs back to its smallest CIDR blocks possible☆10Apr 5, 2020Updated 5 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆11Jul 11, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- Fully automated SSL Secure Site activation☆20Jan 4, 2019Updated 7 years ago
- ☆10Dec 31, 2024Updated last year
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- 我的演讲 ppt or pdf 归档库☆10Mar 28, 2021Updated 4 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- Application Security Mind Maps☆11Apr 10, 2021Updated 4 years ago
- x64 Windows package of the shellcode2exe tool☆14Nov 23, 2020Updated 5 years ago
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago
- ☆10Jun 11, 2018Updated 7 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Feb 26, 2026Updated last week
- VMware Workspace ONE Access and Identity Manager RCE via SSTI - Test script for shodan, file or manual.☆16Feb 13, 2024Updated 2 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Simple UDP server built with Reactor and Spring Boot.☆14Nov 18, 2014Updated 11 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- JVM runtime class loading protection agent.(JVM类加载保护agent)☆48Mar 25, 2021Updated 4 years ago
- Megagrep helps beginning a code review by searching for keywords in the code using "grep". It does not search for vulnerabilities directl…☆15Aug 8, 2022Updated 3 years ago
- Maturity Model Collaborative project☆15Feb 27, 2023Updated 3 years ago
- Automatic DNS Enumeration Tool with various functions☆13Sep 28, 2021Updated 4 years ago
- ☆33Feb 26, 2026Updated last week