BSidesSF / ctf-2024-releaseLinks
☆19Updated last year
Alternatives and similar repositories for ctf-2024-release
Users that are interested in ctf-2024-release are comparing it to the libraries listed below
Sorting:
- Challenges I wrote for various CTF competitions☆44Updated last year
- Awesome MXSS ??☆52Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆151Updated 8 months ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Some tips for Bug Bounty using LibreOffice☆48Updated 5 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆105Updated this week
- ☆27Updated 2 months ago
- A collection of pyjails!☆19Updated 2 weeks ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆113Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆197Updated 6 months ago
- ☆82Updated last month
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 6 months ago
- RCE PoC for Tensorflow using a malicious Lambda layer☆46Updated 2 weeks ago
- ☆87Updated last year
- This is the data that powers the PortSwigger URL validation bypass cheat sheet.☆51Updated 3 months ago
- Fast exfiltration of text using only CSS and Ligatures☆55Updated 3 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆132Updated 4 months ago
- TheHulk is a dynamic analysis tool designed to detect and exploit DOM Clobbering vulnerabilities.☆41Updated last week
- ☆37Updated 2 years ago
- PP-finder Help you find gadget for prototype pollution exploitation☆166Updated last year
- My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!☆79Updated 3 weeks ago
- ☆179Updated 9 months ago
- HTTP/2 Last Frame Synchronization (also known as Single Packet Attack) low Level Library / Tool based on Scapy + Exploit Timing Attacks☆185Updated 2 months ago
- Notes on Preparing for Offsec☆25Updated 2 years ago
- ☆16Updated 2 years ago
- ☆95Updated 5 months ago
- CVEs and Techniques used PDF as an attack vector.☆93Updated 3 years ago
- 🤖 LLM-powered agent for automated Google Dorking in bug hunting & pentesting.☆60Updated 2 months ago
- Review of AWAE.OSWE☆31Updated 3 years ago
- This repository is a collection of JavaScript gadgets that can be used to bypass XSS mitigations such as Content Security Policy (CSP) an…☆81Updated 2 weeks ago