Red-Cadets / VKACTF-2023
VKACTF-2023 Writeups
☆9Updated last year
Alternatives and similar repositories for VKACTF-2023:
Users that are interested in VKACTF-2023 are comparing it to the libraries listed below
- For the most part, these are RUS tg channels and assembled manually in channels.txt. The list of subscribers is updated every 12 hours.☆31Updated 5 months ago
- Attack & Defense CTF Farm based on DestructiveFarm☆89Updated 5 months ago
- C4T BuT S4D Attack-Defence CTF☆13Updated 3 years ago
- HTML Universal Identifier☆64Updated 4 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆146Updated 4 months ago
- ☆131Updated 3 years ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆117Updated this week
- Attack-defense CTF training organized by dtl on 23 Jul, 2023☆11Updated last year
- Check bitrix vulnerabilities☆73Updated last year
- Search for all leaked keys/secrets using one regex! bugbounty☆121Updated 3 weeks ago
- some of the commands I usually use when doing HTB machines☆42Updated last year
- About PIVOting☆10Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆51Updated 7 months ago
- Reverse Engineering and Malware Analysis Roadmap☆120Updated 2 weeks ago
- Preparation of Attack & Defense CTF for iHack 2022☆12Updated last year
- Some nuclei templates for pentest CMS Bitrix☆25Updated 2 months ago
- ☆16Updated 5 months ago
- Useful scripts from past CTF challenges☆33Updated last week
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 9 months ago
- A free data collection and YARA scanning tool for cybersecurity incident investigation, compromise assessment and threat hunting☆15Updated 5 months ago
- A monster cheatsheet on MITM attacks☆347Updated 3 weeks ago
- Centralized resource for listing and organizing known injection techniques and POCs☆441Updated this week
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 6 months ago
- ☆19Updated 2 years ago
- list of organizations offering vulnerability research/reverse engineering jobs☆63Updated 3 weeks ago
- 10–11 января 2024 ⋅ Олимпиада по защите информации☆16Updated 11 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆86Updated last week
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- https://t.me/+V6d8SvKVFXo2MjIy☆44Updated 2 years ago
- A list of all Active Directory machines from HackTheBox☆58Updated 3 weeks ago