CTF writeups
☆30May 27, 2022Updated 3 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆26Feb 16, 2021Updated 5 years ago
- Same Origin XSS challenge☆64Apr 7, 2022Updated 3 years ago
- A JavaScript sandbox using proxies☆20Jul 18, 2020Updated 5 years ago
- XS-Leaks Wiki☆178Mar 13, 2026Updated last week
- ☆10Dec 8, 2022Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Evergrowing compilation of challenges I authored for various CTF's and my Intended solutions☆13Oct 7, 2022Updated 3 years ago
- Companion to the "Introduction to VirtualBox security research" Blog Post☆35Apr 26, 2022Updated 3 years ago
- A Simple VM-based challenge created using the academic tigress obfuscator☆19Jun 30, 2022Updated 3 years ago
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- ☆15May 1, 2023Updated 2 years ago
- PWNable pyjail☆13Jan 13, 2025Updated last year
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- ☆20Feb 26, 2025Updated last year
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆23Apr 28, 2019Updated 6 years ago
- CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP☆22Feb 23, 2025Updated last year
- A collection of pure Python crypto implementations. All modules are standalone. Available in Python 2 and Python 3 flavors!☆10Mar 2, 2013Updated 13 years ago
- Challenge of qualifications for PwnMe 2025☆15May 2, 2025Updated 10 months ago
- Writeups for some CTF challenges. I keep the copy of task files in case you would like to try them yourself.☆12Oct 4, 2021Updated 4 years ago
- CVE-2024-37081: Multiple Local Privilege Escalation in VMware vCenter Server☆10Jul 6, 2024Updated last year
- Spring Framework RCE via Data Binding on JDK 9+ / spring4shell / CVE-2022-22965☆14Apr 4, 2022Updated 3 years ago
- Collection of quirky behaviours of code and the CTF challenges that I made around them.☆27Jan 27, 2021Updated 5 years ago
- ☆27Apr 28, 2023Updated 2 years ago
- A NodeJS implementation of the Nilsimsa hash☆10Mar 16, 2026Updated last week
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- A collection of browser-based side channel attack vectors.☆760Mar 19, 2024Updated 2 years ago
- A repository for CTF writeups☆10Oct 8, 2016Updated 9 years ago
- Slides, exploits and PoCs :)☆94Jan 12, 2019Updated 7 years ago
- HTTP parameter discovery suite.☆93Apr 16, 2020Updated 5 years ago
- CLI tool to get the links of original writeups from ctftime.org☆31Mar 22, 2020Updated 6 years ago
- ☆10Nov 23, 2021Updated 4 years ago
- ☆32Apr 14, 2023Updated 2 years ago
- Spring Cloud Function Vulnerable Application / CVE-2022-22963☆19Apr 1, 2022Updated 3 years ago
- JavaScript source map parser and extractor written in Python☆24Aug 6, 2019Updated 6 years ago
- CVE PoCs☆21Jul 16, 2020Updated 5 years ago
- Dell Driver EoP (CVE-2021-21551)☆26Feb 3, 2023Updated 3 years ago
- Content-Type Research☆658Jun 29, 2025Updated 8 months ago