HeroCTF / HeroCTF_v4
☆36Updated last year
Alternatives and similar repositories for HeroCTF_v4:
Users that are interested in HeroCTF_v4 are comparing it to the libraries listed below
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆25Updated 4 months ago
- Gonna share my writeups and resources here☆64Updated 3 months ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 4 months ago
- ☆16Updated last year
- ☆44Updated 3 years ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆51Updated 7 months ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- ☆9Updated 2 years ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- Some tips for Bug Bounty using LibreOffice☆46Updated last month
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- Challenges I wrote for various CTF competitions☆41Updated 8 months ago
- A collection of pyjails!☆16Updated 3 weeks ago
- Awesome MXSS ??☆49Updated 6 months ago
- A complete table of results of types comparison in multiple languages☆28Updated 2 years ago
- A tool designed to exploit bad implementations of decryption mechanisms in Laravel applications.☆40Updated 5 months ago
- ☆32Updated 2 months ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated 2 months ago
- CTF challenges WriteUp☆14Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆31Updated last week
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆18Updated 10 months ago
- Blog about HTTP Request Smuggling, including a demo application.☆25Updated 3 years ago
- DCTF 2022 Challenge and infrastructure repository☆10Updated 11 months ago
- Github repository which contains a functional exploit for CVE-2021-39165☆21Updated 2 years ago
- ☆51Updated 6 months ago
- This repository offers insights and a proof-of-concept tool to exploit two significant deserialization vulnerabilities in Inductive Autom…☆44Updated last year
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year