SynAckPwn23 / SCTF
Security Capture the Flag Platform
☆32Updated 2 years ago
Alternatives and similar repositories for SCTF:
Users that are interested in SCTF are comparing it to the libraries listed below
- ☆32Updated 4 years ago
- Jira未授权SSRF漏洞☆31Updated 5 years ago
- Webshell for Razor Syntax (C#)☆20Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆34Updated 5 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 4 years ago
- ☆35Updated 2 years ago
- Linux AV tests☆13Updated 5 years ago
- A simple Burp extension for scanning stuffs in CTF☆30Updated 7 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆70Updated 4 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- Unified repository for different Metasploit Framework payloads☆48Updated 5 years ago
- Another plugin for CRLF vulnerability detection☆26Updated 8 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆29Updated 3 years ago
- A framework that help to create CTF Attack with Defense competition quickly☆26Updated 6 years ago
- Metasploit Framework☆31Updated 5 years ago
- ☆23Updated 5 years ago
- ☆30Updated 5 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Updated 5 years ago
- POC for CVE-2018-1273☆24Updated 6 years ago
- ☆17Updated 6 years ago
- A simple scanner to find and brute force tomcat manager logins☆28Updated 5 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 3 years ago
- Slide deck for DefCon Beijing☆39Updated 6 years ago
- Security Research☆36Updated 3 years ago
- A Burp Extender plugin, that will take deserialized AMF objects and encode them in XML using the Xtream library☆28Updated 9 years ago
- guest→system(UAC手动提权)☆74Updated 5 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆30Updated 9 years ago