Raz0r / defihackLinks
☆17Updated 4 years ago
Alternatives and similar repositories for defihack
Users that are interested in defihack are comparing it to the libraries listed below
Sorting:
- Challenges and vulnerabilities exploitation.☆60Updated 5 years ago
- Some of my public exploits☆52Updated 5 years ago
- #INFILTRATE19 raptor's party pack.☆33Updated 2 months ago
- ☆20Updated 11 years ago
- My attempt at writing exploit POCs for various CVEs☆16Updated 5 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Updated 5 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆19Updated 4 years ago
- Dockerfile for AFL++ and helpful other tools☆21Updated 5 years ago
- A python-based padding oracle tool☆20Updated last year
- eXtremely fast data eXtraction via blind SQL injection☆14Updated 13 years ago
- ☆26Updated last year
- This is an intentionally vulnerable smart contract truffle deployment aimed at allowing those interested in smart contract security to ex…☆120Updated 7 years ago
- Scripts I used during CTP☆68Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆65Updated 2 years ago
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- ☆21Updated 4 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- ☆26Updated 4 months ago
- Insecure Deserialization, PDF and lab☆18Updated 6 years ago
- ☆29Updated 9 years ago
- Some vulnerability research slides that I made☆12Updated 4 years ago
- Chrome extension to detect possible xsleaks☆12Updated 6 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated last year
- A framework for exploiting padding oracles in network-based applications☆26Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆45Updated 8 years ago
- An introduction course to system exploitation based on pwnable.kr challenges☆22Updated 11 months ago
- OAuth 2.0 Dynamic Security Scanner☆33Updated 4 years ago