2022 CTF public release
☆23Jun 15, 2022Updated 3 years ago
Alternatives and similar repositories for ctf-2022-release
Users that are interested in ctf-2022-release are comparing it to the libraries listed below
Sorting:
- Grab unsaved Notepad contents with a Beacon Object File☆11Jun 19, 2022Updated 3 years ago
- A handy plugin for copying requests/responses directly from Burp, some extra magic included.☆13Oct 15, 2021Updated 4 years ago
- ☆16Nov 15, 2022Updated 3 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Generate lua call graph☆16Apr 23, 2023Updated 2 years ago
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- Informer is a OSINT information gathering tool that gathers whois, Sub-domain ,DNS, geolocation and shodan information of the target.☆20Nov 8, 2022Updated 3 years ago
- Prototype Pollution - A detailed study + hands on lab.☆15Oct 11, 2022Updated 3 years ago
- Poc script for ProxyShell exploit chain in Exchange Server☆24Feb 24, 2022Updated 4 years ago
- ☆25Aug 21, 2023Updated 2 years ago
- Resource Dump For Learning Cybersec-related Concepts☆25Jul 30, 2020Updated 5 years ago
- My fuzz repo!☆22Jul 28, 2023Updated 2 years ago
- tetctf2020_amf_writeups☆23Jan 3, 2021Updated 5 years ago
- CVE-2024-11477 7Zip Code Execution Writeup and Analysis☆65Dec 4, 2024Updated last year
- Designed and implemented a custom CNN learning architecture for deep fake image detection using a pre-trained Xception model and achieved…☆10Feb 7, 2023Updated 3 years ago
- ☆24Sep 28, 2022Updated 3 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆60May 10, 2022Updated 3 years ago
- nativeRasp that can hook native methods☆24Apr 24, 2023Updated 2 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- ☆66Aug 25, 2021Updated 4 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- A set of Gitlab pipelines and Github workflows to automate and ease on BugBounty and Penetration Testing engagements☆28Dec 18, 2022Updated 3 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Nov 11, 2022Updated 3 years ago
- My attempt to teach others about microprocessors and programming in IA-32 and IA-64 assembly, and to spread the word of how awesome it is…☆29Aug 8, 2022Updated 3 years ago
- Mass querying whois records☆28Dec 28, 2021Updated 4 years ago
- Tools for bug bounty☆29Jul 9, 2025Updated 7 months ago
- Using fibers to execute shellcode in a local process via csharp☆28Jan 2, 2022Updated 4 years ago
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆38Feb 14, 2026Updated 3 weeks ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Nov 17, 2022Updated 3 years ago
- ☆27Feb 7, 2023Updated 3 years ago
- Your NTDLL vaccine from modern direct syscall methods.☆36Apr 5, 2022Updated 3 years ago
- ☆14Dec 5, 2025Updated 3 months ago
- Dependencies with Log4j2 Checklist☆35Dec 14, 2021Updated 4 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- Cannabis strain information☆10Feb 20, 2016Updated 10 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- Ffuf output browser☆39Feb 25, 2023Updated 3 years ago
- Malware detonation platform Polygon integration☆10Aug 1, 2023Updated 2 years ago