BlackFan / ctfsLinks
CTF writeups
☆30Updated 3 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below
Sorting:
- HTTP Desync Attack☆28Updated 5 years ago
- PoC for leaking text nodes via CSS injection☆35Updated 7 years ago
- Compiled dataset of Java deserialization CVEs☆60Updated 5 years ago
- A web server designed to shut off on command to exploit DNS rebinding in Chromium-based browsers☆14Updated 2 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- ☆12Updated 2 years ago
- ☆26Updated 4 years ago
- ☆111Updated 3 years ago
- ☆60Updated 2 years ago
- My CTF Challenges☆23Updated 2 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- List of Trusted Types bypasses☆102Updated last year
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- ☆34Updated 3 years ago
- Same Origin XSS challenge☆64Updated 3 years ago
- ☆56Updated 4 years ago
- ☆51Updated 5 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆81Updated 6 years ago
- '>"><img src=x onerror=alert(1) /><b>asd</b>☆47Updated 3 years ago
- Some of my public exploits☆51Updated 5 years ago
- Unsafe Unpacking Vulnerability: Lab Code, Semgrep Rules and Secure Implementation Guide☆42Updated 10 months ago
- Playground☆56Updated last month
- My CTF challenges (2018~)☆28Updated 2 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Updated 5 years ago
- A proof-of-concept tool for detection and exploitation Object Injection Vulnerabilities in .NET applications☆63Updated 4 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- A malicious LDAP server for JNDI injection attacks☆75Updated 11 months ago
- ☆15Updated 4 years ago