CP04042K / CTF-writeupsLinks
Some CTF writeups written by meeeeeee
☆7Updated last year
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- [Confluence] CVE-2023-22527 realworld poc☆19Updated last year
- Challenges I wrote for various CTF competitions☆43Updated 11 months ago
- Blog about HTTP Request Smuggling, including a demo application.☆27Updated 3 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- ☆32Updated last month
- A collection of Burp Suite Lambda Filters ~ Bambdas☆26Updated 8 months ago
- Server and avi file to exploit FFmpeg HLS parse☆21Updated 6 years ago
- ☆21Updated last month
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- A curated GitHub repository that's in-scope and eligible for bounty.☆20Updated 2 years ago
- Web CTF CheatSheet 🐈☆25Updated 3 years ago
- CVE-2022-21907 Vulnerability PoC☆28Updated 3 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- This Lab contain the sample codes Basic Labs related to Server-Side Request Forgery attack☆20Updated 4 years ago
- Web Application Attack☆14Updated 5 years ago
- Lab To Pratice Web Hacking☆25Updated 6 years ago
- ☆42Updated 4 months ago
- Query various sources for CVE proof-of-concepts☆51Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- ☆19Updated 3 months ago
- This repository presents a proof-of-concept of CVE-2024-23897☆16Updated last year
- An intentionally-vulnerable application for demonstrating the hazards of SpEL expression composition☆28Updated 7 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- ☆22Updated 5 years ago
- PoC for CVE-2021-3129 (Laravel)☆13Updated 3 years ago
- My CTF writeups☆17Updated 5 years ago
- A collection of utilities for building extensions using Burp's Montoya API☆50Updated last year
- HTTP request smuggling tools☆18Updated 4 years ago
- XSS reflector vulnerabilities exploitation extended.☆27Updated 3 years ago
- ☆28Updated 3 years ago