BSidesSF / ctf-2022-release
2022 CTF public release
☆23Updated 2 years ago
Alternatives and similar repositories for ctf-2022-release:
Users that are interested in ctf-2022-release are comparing it to the libraries listed below
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆29Updated 6 months ago
- OSED Practice binary☆24Updated last year
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 2 years ago
- S3 bucket enumerator☆29Updated 5 years ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Burp extension to generate multi-step CSRF POC.☆29Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 10 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- Perform Windows domain enumeration via LDAP☆36Updated 2 years ago
- ☆16Updated 2 years ago
- ☆9Updated 10 months ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆23Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 9 months ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆43Updated last year
- ☆26Updated 2 years ago
- ☆30Updated 11 months ago
- Noob Penetration tester☆11Updated 10 months ago
- Simple WebSocket fuzzer☆32Updated last year
- AI Powered Sensitive Information Detection☆18Updated last year
- ☆27Updated 2 years ago
- ☆19Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆70Updated 3 years ago