TeamGreyFang / CTF-WriteupsLinks
☆19Updated 5 years ago
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo☆39Updated 4 years ago
- AKA "Internet Chemotherapy"☆66Updated 8 years ago
- Let's brute force this hotel's tv.☆82Updated 6 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆50Updated 6 years ago
- Collaborative programming environment inside GitHub Actions – like Google Docs for hacking☆71Updated 2 years ago
- CLI tool for PKCS7 padding oracle attacks☆142Updated 4 years ago
- A stealth URL toolkit optimized for bypassing censorship filters and/or dropping malware☆111Updated last year
- Guide to buffer overflows☆59Updated 4 years ago
- A medium interaction printer honeypot 🍯☆203Updated 2 years ago
- An example chrome extension to demonstrate the dangers of injecting javascript and html into a page☆35Updated 8 years ago
- A DNS connectback shell executed by strings in payloads.txt☆102Updated 2 years ago
- CURRYFINGER - SNI & Host header spoofing utility.☆109Updated 6 years ago
- This repository contains a docker container dedicated to reverse engineering☆84Updated 7 years ago
- Crack SSH Password using Dictionary and Brute Force Method☆52Updated 6 years ago
- ☆182Updated 5 years ago
- collection of verified Linux kernel exploits☆191Updated 5 years ago
- 👀 🖥️ Golang rewrite of eyes.sh. Let's you perform domain/IP address information gathering. Wasn't it esr who said "With enough eyeballs…☆52Updated 5 years ago
- Modern Web Firewall: stop account takeovers, weak passwords, cloud IPs, DoS attacks, disposable emails☆120Updated 3 years ago
- Perform timing attacks against web applications☆125Updated 6 years ago
- CTF in a box. Minimal setup required. (not production-ready yet)☆83Updated 2 years ago
- Basic Electron Exploitation☆208Updated 6 years ago
- Vulnerable Web applications Generator☆84Updated 8 years ago
- Encryption tool that's heavily inspired by the Rubberhose file system (https://en.wikipedia.org/wiki/Rubberhose_(file_system)).☆52Updated 4 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 2 weeks ago
- A simple MBR hijack demonstration☆180Updated 3 years ago
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆623Updated 5 years ago
- ☆166Updated 6 years ago
- Program for extracting TLS keys from Oculus Runtime☆53Updated 5 years ago
- Some bash scripts that are useful when performing research on Google's Cloudshell☆44Updated last year
- I hacked Minesweeper into putting flags on all the mined squares when starting. Yoohoo.☆66Updated 7 years ago