CP04042K / CTF-writeupsLinks
Some CTF writeups written by meeeeeee
☆7Updated last year
Alternatives and similar repositories for CTF-writeups
Users that are interested in CTF-writeups are comparing it to the libraries listed below
Sorting:
- CTF challenges WriteUp☆14Updated 3 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆29Updated 3 years ago
- Slides and other material from various conference presentations.☆45Updated last month
- CVE-2022-21907 Vulnerability PoC☆28Updated 3 years ago
- Simple WebSocket fuzzer☆33Updated 2 years ago
- Lab To Pratice Web Hacking☆25Updated 6 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 5 months ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- a Ruby implementation of Java's ObjectInputStream and ObjectOutputStream.☆16Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆31Updated 4 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated last year
- Simple taint analyzer for PHP/WordPress using VKCOM/php-parser☆18Updated 3 years ago
- Application for showcasing Android Deep Link and WebView Vulnerabilities☆15Updated 2 years ago
- ☆38Updated 2 years ago
- [Confluence] CVE-2023-22527 realworld poc☆19Updated last year
- Web CTF CheatSheet 🐈☆25Updated 3 years ago
- GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit☆35Updated 5 months ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago
- ☆16Updated 2 years ago
- Unauthenticated Path Traversal in Nexus Repository 3☆2Updated last year
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆49Updated 2 years ago
- A collection of Burp Suite Lambda Filters ~ Bambdas☆26Updated 9 months ago
- ☆19Updated 4 months ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆26Updated 3 years ago
- ☆37Updated last year
- ☆22Updated 5 years ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆45Updated last year
- Server and avi file to exploit FFmpeg HLS parse☆21Updated 6 years ago