LiveOverflow / ctf-screenshotterLinks
a CTF web challenge about making screenshots
☆224Updated 4 years ago
Alternatives and similar repositories for ctf-screenshotter
Users that are interested in ctf-screenshotter are comparing it to the libraries listed below
Sorting:
- Prototype Pollution using `flat` with Next.js☆105Updated last month
- Proof of concept for pwnkit vulnerability☆344Updated 2 years ago
- Small example repo for looking into log4j CVE-2021-44228☆71Updated 3 years ago
- log4j rce test environment and poc☆311Updated 3 years ago
- ☆36Updated 4 years ago
- CVE-2021-3156 - Sudo Baron Samedit☆221Updated 3 years ago
- Security Research☆39Updated 3 years ago
- Web Application Secure Coding Handbook resource.☆348Updated 2 years ago
- A Python3 script to decode an encoded VBScript file, often seen with a .vbe file extension☆196Updated 3 years ago
- ImaginaryCTF is a platform that brings the beauty of CTF Competitions to discord, releasing a challenge every day☆44Updated 4 months ago
- Compress a Python script to a command-line one-liner☆77Updated 2 years ago
- Write-ups for CTF challenges.☆17Updated 4 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆832Updated 4 years ago
- Example pwnable challenge hosted with docker☆227Updated last year
- A Discord bot that provides ctf tools for collaboration in Discord servers!☆140Updated 3 years ago
- redpwn's CTF platform☆274Updated 8 months ago
- CTF programs and writeups☆21Updated 3 years ago
- Fake msfconsole for the use in demonstrations☆20Updated 5 years ago
- ☆149Updated last month
- Writeup for the challenges in NahamCon CTF 2020☆81Updated 5 years ago
- ctfcli is a tool to manage Capture The Flag events and challenges☆197Updated last month
- An experimental server for the CSCG game "Maze"☆25Updated 4 years ago
- An aggregation of CTF challenges and write-ups for csictf 2020!☆55Updated 2 years ago
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- ☆64Updated last year
- PoC for CVE-2021-3156 (sudo heap overflow)☆436Updated 3 years ago
- Jaws is an invisible programming language! Inject invisible code into other languages and files! Created for security research -- see blo…☆234Updated 6 months ago
- Rick Roll website that has hidden code.☆410Updated 3 years ago
- PoC exploits for software vulnerabilities☆681Updated 4 years ago
- Google Compute Engine (GCE) VM takeover via DHCP flood - gain root access by getting SSH keys added by google_guest_agent☆535Updated 4 years ago