Official CTF for 44CON 2019
☆17Jul 22, 2023Updated 2 years ago
Alternatives and similar repositories for 44con-ctf-2019
Users that are interested in 44con-ctf-2019 are comparing it to the libraries listed below
Sorting:
- Boxer: A fast directory bruteforce tool written in Python with concurrency.☆14Feb 26, 2021Updated 5 years ago
- Find endpoints in archived versions of robots.txt☆14Nov 21, 2019Updated 6 years ago
- Insecure Deserialization, PDF and lab☆18Nov 19, 2019Updated 6 years ago
- web scanner☆23Jan 29, 2019Updated 7 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- Now use your favorite Google Dorks techniques to find vulnerabilities and earn Bounties.☆31Oct 1, 2020Updated 5 years ago
- Workshop on Git for NTU Open Source Society☆12Oct 19, 2018Updated 7 years ago
- WP-Hunter is a WordPress plugin/theme reconnaissance and static analysis (SAST) tool. It is designed for security researchers to evaluate…☆37Feb 27, 2026Updated last week
- retrive metadata endpoint data with these one liners.☆41Aug 11, 2020Updated 5 years ago
- Subdomain Scan With Ping Method.☆46Dec 12, 2020Updated 5 years ago
- USA based Information Security & I.T. Conferences☆32Aug 5, 2022Updated 3 years ago
- example files to follow the MOOC on RTL-SDR☆12Mar 18, 2017Updated 8 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 6 years ago
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- Fully automated SSL Secure Site activation☆20Jan 4, 2019Updated 7 years ago
- ☆11Jul 16, 2018Updated 7 years ago
- Collection of AWS Lambda functions in Python☆11Mar 13, 2019Updated 6 years ago
- An extremely minimal self-hosted pastebin for a small number of users☆11Nov 30, 2024Updated last year
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- Radamsa written in c ported to Rust☆11May 10, 2023Updated 2 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Bash one-liners for great justice!☆12Feb 9, 2019Updated 7 years ago
- This is a project I'm using to learn Rust and binary analysis.☆11Jan 20, 2022Updated 4 years ago
- Some setup scripts for security research tools.☆11May 10, 2015Updated 10 years ago
- A Burpsuite extension written in Python to perform basic validation fuzzing☆11Oct 7, 2022Updated 3 years ago
- Helps you to pull off a padding oracle attack.☆10Oct 29, 2018Updated 7 years ago
- TokyoWesterns CTF 4th 2018 shrine☆12Aug 23, 2019Updated 6 years ago
- Tool to scrape LinkedIn☆10Mar 16, 2017Updated 8 years ago
- A deliberately vulnerable website used to showcase Dastardly from Burp Suite☆10Oct 6, 2025Updated 5 months ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- a .js scanner, built in php. designed to scrape urls and other info☆13Jul 20, 2017Updated 8 years ago
- For finding secrets, tokens and other common mistakes made by developers.☆12Oct 21, 2025Updated 4 months ago
- ☆12Apr 21, 2020Updated 5 years ago
- Labs for Software Vulnerabilities: Exploitation and Mitigation university course.☆11Jul 5, 2019Updated 6 years ago
- Demonstrating a practical attack on the Diffie Hellman Key Exchange protocol, through breaking a secure chat system☆14Oct 23, 2015Updated 10 years ago
- A module that multiplexes interactions with lists of python objects.☆14Aug 24, 2022Updated 3 years ago
- SUCTF iCloudMusic 源码及writeup☆10Oct 12, 2022Updated 3 years ago