HeroCTF / HeroCTF_v4
☆37Updated 2 years ago
Alternatives and similar repositories for HeroCTF_v4:
Users that are interested in HeroCTF_v4 are comparing it to the libraries listed below
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 3 months ago
- ☆16Updated 2 years ago
- ☆9Updated 2 years ago
- ☆45Updated 3 years ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆25Updated this week
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Gonna share my writeups and resources here☆65Updated 3 months ago
- Challenges I wrote for various CTF competitions☆41Updated 9 months ago
- ☆32Updated 3 months ago
- ☆51Updated 6 months ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 2 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆53Updated 8 months ago
- Occasional write-ups from Capture the Flag (CTF) competitions (mostly pwn).☆18Updated 10 months ago
- RE / Binary Exploitation Resources☆71Updated 7 years ago
- ✨ Build a beautiful and simple website in literally minutes. Demo at https://beautifuljekyll.com☆21Updated 2 years ago
- Official writeups for Hack The Boo CTF 2023☆44Updated 5 months ago
- Challenges and write-ups for GCC-CTF 2024☆19Updated last year
- This tool allows to automatically test for Content Security Policy bypass payloads.☆43Updated 8 months ago
- Collection of CTF Writeups for various ctfs. Mostly focused on reverse engineering, and contains all source files if they were available.☆52Updated last year
- A bunch of resources to prepare for the OSEE certification, Offensive Security's hardest course.☆97Updated 3 years ago
- Awesome MXSS ??☆49Updated 7 months ago
- A list of weird comparison in SQL☆14Updated 2 years ago
- All Files, Scripts, and exploits can be found here☆64Updated 4 years ago
- A series of writes about “Binary Exploitation”.☆85Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions …☆64Updated 6 months ago
- A collection of pyjails!☆16Updated last month
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆39Updated last year
- A python script to dump all the challenges locally of a CTFd-based Capture the Flag.☆143Updated 5 months ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆15Updated 2 years ago
- Source code and writeups for all challenges☆16Updated 2 years ago