PlayExploits / CTF-S----challenges-pico-htb-ringzer0-etcLinks
This is the ringzer0 writeup of web exploitation catagery. The name is "Word mean something"
☆14Updated last year
Alternatives and similar repositories for CTF-S----challenges-pico-htb-ringzer0-etc
Users that are interested in CTF-S----challenges-pico-htb-ringzer0-etc are comparing it to the libraries listed below
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Updated 3 months ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆21Updated last year
- ☆7Updated last year
- Wordpress Plugin Canto < 3.0.5 - Remote File Inclusion (RFI) and Remote Code Execution (RCE)☆12Updated last year
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Updated last year
- bypassing the twitter safety link firewall :)☆11Updated last month
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- Nuclei template for CVE-2024-23897 (Jenkins LFI Vulnerability)☆18Updated last year
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆31Updated 11 months ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆17Updated last year
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Auto exploitation tool for CVE-2024-24401.☆36Updated 9 months ago
- There were no proper POCs for CVE-2023-30533 so I made one. (Reported by Vsevolod Kokorin)☆9Updated last year
- Burp extension used to snip any header from all the requests.☆22Updated last year
- ☆14Updated 3 months ago
- ☆35Updated last year
- SSH & FTP brute-forcing tool written in python☆11Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated last year
- CVE-2023-6063 (WP Fastest Cache < 1.2.2 - UnAuth SQL Injection)☆29Updated last year
- aiohttp LFI (CVE-2024-23334)☆27Updated last year
- Powershell Scripts for Blue Team members☆11Updated last year
- CVE-2024-34102: Unauthenticated Magento XXE☆13Updated 5 months ago
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- ☆13Updated last year
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated last year
- Jasmin ransomware web panel path traversal PoC☆21Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 8 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year