BSidesSF / ctf-2022-releaseView external linksLinks
2022 CTF public release
☆23Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ctf-2022-release
Users that are interested in ctf-2022-release are comparing it to the libraries listed below
Sorting:
- Exploit for uTorrent vulnerability CVE-2020-8437 by mavlevin☆11Feb 1, 2026Updated last week
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- ☆16Nov 15, 2022Updated 3 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- Informer is a OSINT information gathering tool that gathers whois, Sub-domain ,DNS, geolocation and shodan information of the target.☆20Nov 8, 2022Updated 3 years ago
- Prototype Pollution - A detailed study + hands on lab.☆15Oct 11, 2022Updated 3 years ago
- 这是一个从黑暗搜索引擎 搜索查找存在此反序列化漏洞 的批量检测脚本☆11Feb 23, 2023Updated 2 years ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆23Aug 10, 2020Updated 5 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- ☆24Sep 13, 2022Updated 3 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- ☆66Aug 25, 2021Updated 4 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Aug 8, 2022Updated 3 years ago
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Dec 17, 2024Updated last year
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- Mass querying whois records☆29Dec 28, 2021Updated 4 years ago
- Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files☆31Jun 15, 2022Updated 3 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆208Dec 15, 2021Updated 4 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Jun 2, 2022Updated 3 years ago
- Tools for bug bounty☆29Jul 9, 2025Updated 7 months ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- cbReader - A simple web-based comic book reader (CBZ/CBR)☆10May 21, 2018Updated 7 years ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆36Jan 27, 2026Updated 2 weeks ago
- An intentionally vulnerable Android Application to demonstrate various vulnerabilities that airses in Android Components.☆42Apr 11, 2025Updated 10 months ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆15Mar 21, 2025Updated 10 months ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Ffuf output browser☆39Feb 25, 2023Updated 2 years ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago