Raz0r / defihackLinks
☆16Updated 4 years ago
Alternatives and similar repositories for defihack
Users that are interested in defihack are comparing it to the libraries listed below
Sorting:
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- BlockChain-Security-List☆103Updated 7 years ago
- Pythonize Intruder Payload☆13Updated 4 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago
- ☆50Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- CircleCI log and security configuration automations☆22Updated 4 years ago
- ☆38Updated 3 years ago
- TAODOS stands for The Art of Denial-of-Service☆16Updated 4 years ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆26Updated 3 years ago
- Some vulnerability research slides that I made☆12Updated 3 years ago
- ☆26Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Insecure Deserialization, PDF and lab☆18Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆63Updated 2 years ago
- ☆29Updated 8 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆32Updated 8 years ago
- Some of my public exploits☆51Updated 4 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 4 years ago
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆119Updated 6 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆14Updated 3 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆11Updated 4 years ago
- A Simple command line tool that helps checking web applications to identify insecure deserialization vulnerabilities.☆24Updated 6 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- CTF writeups☆30Updated 3 years ago
- ☆16Updated 3 years ago
- XXE Injection Payloads☆28Updated 5 years ago
- Just a simple SMTP server, implementation of @corpix smtpd library☆15Updated 5 years ago