Security challenges and CTFs created by the Penultimate team.
☆13Feb 22, 2018Updated 8 years ago
Alternatives and similar repositories for challenges
Users that are interested in challenges are comparing it to the libraries listed below
Sorting:
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Jan 10, 2019Updated 7 years ago
- funky fun fuzzer☆11Jul 6, 2021Updated 4 years ago
- Take a QEMU binary, copy the dependencies into a chroot☆11Oct 5, 2022Updated 3 years ago
- Various tools for managing bug bounty recon and exploration.☆48Dec 8, 2022Updated 3 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- LibAFLGo: Evaluating and Advancing Directed Greybox Fuzzing☆25Mar 4, 2026Updated 2 weeks ago
- QEMU to drcov trace file☆12Nov 21, 2020Updated 5 years ago
- ☆10May 25, 2023Updated 2 years ago
- Evolving fuzzers with large language models☆17Dec 14, 2023Updated 2 years ago
- A Centralized Wiki for CTF Organization☆10Sep 22, 2021Updated 4 years ago
- 针对PHP网马的正则查杀☆13Jan 10, 2018Updated 8 years ago
- Fuzz-introspector has moved (but is actively maintained) - please follow the project here https://github.com/ossf/fuzz-introspector☆14Dec 3, 2021Updated 4 years ago
- A balanced unbounded interval-tree in Rust with associated values in the nodes☆13Nov 22, 2022Updated 3 years ago
- ☆17Aug 31, 2023Updated 2 years ago
- X-Hub-Signature signer for Node.js☆12Feb 26, 2026Updated 3 weeks ago
- This is an example library to show how to fuzz with AFL++ only the code modified by the last commit.☆17Mar 2, 2020Updated 6 years ago
- ☆14Dec 26, 2022Updated 3 years ago
- A 10Gbps UDP Reverse Proxy for Realtime Processing☆10Oct 29, 2013Updated 12 years ago
- u-boot addon image for the AVM FritzBox 4040☆11Mar 8, 2026Updated last week
- An AFL scaling benchmarking tool☆18May 29, 2020Updated 5 years ago
- UNMAINTAINED: I am now developing and using https://github.com/GhidraJupyter/ghidra-jupyter-kotlin instead, PRs still welcome☆16May 6, 2020Updated 5 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Find subfolders in the Windows folder which have bad ACL and allow write and execute☆14Oct 20, 2015Updated 10 years ago
- Binary matching with Binary Ninja☆22Jul 8, 2024Updated last year
- PoC for an adaptive parallelised DNS prober☆44Oct 4, 2017Updated 8 years ago
- pwning challenge with a minimal hypervisor on apple hypervisor framework☆13May 13, 2019Updated 6 years ago
- A Reflected / Stored / DOM XSS Scanner based on Headless Chrome Node API via Puppeteer☆40Jan 7, 2023Updated 3 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- Writeup of what I'm learning with PentesterLab's Bootcamp☆10May 13, 2017Updated 8 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- check redos, reverse text from regular expression.☆12Mar 1, 2020Updated 6 years ago
- Flopz - Firmware Liberation on Python☆14Jun 22, 2024Updated last year
- My Python WorkSpace☆11Mar 30, 2018Updated 7 years ago
- CTF (Capture The Flag) writeups, code snippets, scripts☆16Oct 18, 2018Updated 7 years ago
- ☆11Jun 25, 2016Updated 9 years ago
- 一个HIDS agent端的demo☆17Feb 29, 2020Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Jul 2, 2018Updated 7 years ago
- ☆10Dec 28, 2015Updated 10 years ago