BSidesSF / ctf-2022-release
2022 CTF public release
☆24Updated 2 years ago
Alternatives and similar repositories for ctf-2022-release:
Users that are interested in ctf-2022-release are comparing it to the libraries listed below
- ☆34Updated 3 weeks ago
- ☆29Updated 9 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆25Updated 5 months ago
- Simple WebSocket fuzzer☆31Updated last year
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆14Updated 3 years ago
- Query various sources for CVE proof-of-concepts☆49Updated last year
- ☆26Updated 2 years ago
- OSED Practice binary☆24Updated last year
- A Simple CVE-2022-39299 PoC exploit generator to bypass authentication in SAML SSO Integrations using vulnerable versions of passport-sam…☆18Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆11Updated 9 months ago
- NSE script to detect ProxyOracle☆14Updated 3 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- Slides and other material from various conference presentations.☆40Updated 3 years ago
- CTF challenges WriteUp☆14Updated 2 years ago
- Subdomain finder☆10Updated 2 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Updated 2 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 4 years ago
- an Evil Java RMI Registry.☆48Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆30Updated 3 years ago
- DLL to open up calc.exe to demonstrate that you injected DLLs☆23Updated 4 years ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Updated 8 months ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 2 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆12Updated last year
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Writeup of CVE-2020-15906☆46Updated 4 years ago
- Insecure Deserialization, PDF and lab☆17Updated 5 years ago
- ☆9Updated 9 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago
- ☆16Updated 2 years ago