Corb3nik / Hackfest2017-ChallengesLinks
All of my Hackfest 2017 CTF challenges
☆8Updated 7 years ago
Alternatives and similar repositories for Hackfest2017-Challenges
Users that are interested in Hackfest2017-Challenges are comparing it to the libraries listed below
Sorting:
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Hackfest Talk - Abusing PHP 7’s OPcache to Spawn Webshells☆10Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- ☆70Updated 7 years ago
- Duncan - Blind SQL injector skeleton☆56Updated 3 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 11 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Chrome Extension for XSS Hunter Payloads☆41Updated 8 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆26Updated 7 years ago
- A horizontal and vertical web content enumerator☆52Updated 6 years ago
- CTF Write-ups☆26Updated 6 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Immunio's XSS Fuzzer tool☆25Updated 9 years ago
- Demo server for testing Java deserialization payloads☆15Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Exploit insecure crossdomain.xml files.☆26Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- intentionally vulnerable API☆29Updated 8 months ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 5 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- OAuth Security Cheatsheet☆40Updated 11 years ago
- A Firefox extension and WebSocket handler that checks S3/Google/Azure buckets while your browse.☆37Updated 4 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago