HHousen / PicoCTF-2022Links
Hayden Housen's solutions to the 2022 PicoCTF Competition
☆10Updated 3 years ago
Alternatives and similar repositories for PicoCTF-2022
Users that are interested in PicoCTF-2022 are comparing it to the libraries listed below
Sorting:
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆25Updated last month
- Hackthebox tools☆12Updated 6 years ago
- ☆12Updated 10 months ago
- Write-Ups for TryHackMe☆24Updated 4 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆48Updated last year
- Mobile Application Vulnerability Scanner☆25Updated 9 months ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF☆19Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 3 years ago
- ☆24Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆21Updated last year
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've …☆60Updated 5 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated 2 years ago
- A collection of pentesting web scanners☆35Updated last year
- ☆22Updated 3 years ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- A small binary exploitation challenge to demonstrate a typical return2libc attack☆32Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 6 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Updated last year
- A purposely vulnerable application in order to demonstrate PHP payload smuggling techniques for PNG files.☆43Updated 3 years ago