LiveOverflow / ctf-cryptowaf
Amazing CryptoWAF was a CTF challenge for ALLES! CTF 2021
☆35Updated 3 years ago
Alternatives and similar repositories for ctf-cryptowaf:
Users that are interested in ctf-cryptowaf are comparing it to the libraries listed below
- Security Research☆41Updated 2 years ago
- The authentication bypass vulnerability in GitHub Enterprise Server (GHES) allows an unauthorized attacker to access an instance of GHES …☆47Updated 7 months ago
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 3 years ago
- ☆24Updated 3 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 4 years ago
- pwncat module that automatically exploits CVE-2021-4034 (pwnkit)☆32Updated 2 years ago
- ☆46Updated 8 months ago
- Bypassing AWS WAF using a single ';'☆40Updated 6 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 3 years ago
- Cryptovenom: The Cryptography Swiss Army Knife☆9Updated 5 years ago
- The all-in-one Red Team extension for Web Pentester. Added more functionality☆16Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆42Updated 3 years ago
- Hover over cve id's on the website to get a helpful summary.☆10Updated 3 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 2 years ago
- The House of Rust is a heap exploitation technique that drops a shell against full PIE binaries that don’t leak any addresses.☆29Updated 3 years ago
- recon.cloud is website that scans AWS, Azure and GCP public cloud footprint this GO tool only utilize its API for getting result to termi…☆23Updated last year
- Reverse Shell troll software☆12Updated 5 years ago
- Remote Code Execution on Confluence Servers : CVE-2021-26084☆9Updated 2 years ago
- This script just implement a proxy over h2cSmuggler so you can navigate in your browser making requests to the back-end server.☆37Updated 2 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- BurpSuite Extension for performing scan via CLI.☆10Updated 7 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution