Web Exploitation Workflow for CTF Challenges
☆54Dec 11, 2016Updated 9 years ago
Alternatives and similar repositories for Web-Exploitation-Workflow
Users that are interested in Web-Exploitation-Workflow are comparing it to the libraries listed below
Sorting:
- Setup for a pwning VM☆62Nov 3, 2018Updated 7 years ago
- A distributed experimentation platform using kubernetes.☆13Apr 20, 2021Updated 4 years ago
- CTF writeups☆13Jul 2, 2017Updated 8 years ago
- x86 / x64 Processor Manual for Binary Ninja☆16Mar 7, 2019Updated 7 years ago
- ☆13Mar 12, 2026Updated last week
- PoC for extracting office files into PDF file metadata☆11Sep 11, 2019Updated 6 years ago
- ☆22Dec 1, 2021Updated 4 years ago
- General tips and advice for becoming interested in research, finding a suitable topic, and setting goals.☆28Mar 17, 2021Updated 5 years ago
- ☆30Mar 31, 2017Updated 8 years ago
- This repository contains information on the CVEs I found.☆52Mar 10, 2024Updated 2 years ago
- Windows Keylogger in C++☆19Nov 2, 2022Updated 3 years ago
- Diapositivas, tareas, código de ejemplo y página del curso de aprendizaje automatizado impartido en el PCIC de la UNAM☆16Updated this week
- Writeups for CTF challenges.☆78Oct 10, 2023Updated 2 years ago
- Script to crawl crbugs (Chromium Issues).☆10Jul 15, 2021Updated 4 years ago
- A curated list of awesome Web3 Security.☆27Aug 5, 2025Updated 7 months ago
- Windows - Privilege Escalation Checklist☆21Aug 28, 2020Updated 5 years ago
- DursVuln - Nmap Scripting Engine (NSE)☆21Jul 16, 2025Updated 8 months ago
- ☆28Jan 27, 2017Updated 9 years ago
- Various tools, scripts, and techniques☆19May 13, 2020Updated 5 years ago
- Build a database of libc offsets and ld.so files to simplify exploitation☆13Sep 13, 2018Updated 7 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.☆11Mar 13, 2024Updated 2 years ago
- ☆13Jan 6, 2020Updated 6 years ago
- This Burp extension helps you to find usages of postMessage and recvMessage☆14Feb 20, 2020Updated 6 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Write ups to the CTF problems online.☆15Mar 17, 2022Updated 4 years ago
- ☆43Dec 2, 2021Updated 4 years ago
- Vulnerable docker images for CVE-2021-41773☆23Oct 6, 2021Updated 4 years ago
- Materials from the previous MCC trainers☆18Jan 16, 2026Updated 2 months ago
- Simple script to get your private/public or both programs using the Hackerone graphql.☆22Jan 24, 2020Updated 6 years ago
- CTF pwnable cheatsheet☆20Feb 15, 2018Updated 8 years ago
- A simple C program acting as Keylogger.☆18Apr 15, 2018Updated 7 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- Fuzzing for LFI using Burpsuite☆67Oct 4, 2016Updated 9 years ago
- ☆19Oct 27, 2018Updated 7 years ago
- Tool to get the top android apps for bug bounty purpose☆17Sep 10, 2020Updated 5 years ago
- A collection of tools, notes, & resources I've created during my OSCP certification journey.☆10Apr 25, 2021Updated 4 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago
- Files to build Docker image of Capture the Flags (CTF) game☆19Jan 25, 2018Updated 8 years ago