A handfull of writeups
☆15Jul 1, 2021Updated 4 years ago
Alternatives and similar repositories for WRITEUPS
Users that are interested in WRITEUPS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Cleo Unrestricted file upload and download PoC (CVE-2024-50623)☆25Dec 11, 2024Updated last year
- A simple Bash script to discover all domains associated with a specific Microsoft 365 tenant - new replacement for check_mdi☆45Sep 23, 2025Updated 6 months ago
- ☆28Jun 27, 2020Updated 5 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- ☆11Sep 6, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.☆12Aug 10, 2023Updated 2 years ago
- ☆12Aug 1, 2022Updated 3 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Simple Python3 port scanner☆15Dec 17, 2020Updated 5 years ago
- 31 Tips for pentesters & security engineers☆86Aug 20, 2021Updated 4 years ago
- ☆16Jul 30, 2024Updated last year
- Front end (UI) plugin to support security-analytics☆16Mar 13, 2026Updated 2 weeks ago
- Vulnerable demo application for the race condition☆22Apr 27, 2021Updated 4 years ago
- Elastic Ingest Documentation☆15Updated this week
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- 🔍 Improve your files enumeration with specific extensions!☆17Jan 11, 2022Updated 4 years ago
- ☆16Updated this week
- Scanner for Log4j RCE CVE-2021-44228☆11Jul 6, 2022Updated 3 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- ☆10Mar 29, 2022Updated 4 years ago
- A curated collection of resources for the zero-trust security model.☆20Jun 10, 2021Updated 4 years ago
- Repository of various scripts related to Mobile PT. Copyrights and Licensing terms belong to respective owners.☆12Nov 4, 2019Updated 6 years ago
- RATs library 2003 to present☆16Oct 14, 2023Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- JIT extensions for AsmResolver☆14May 19, 2019Updated 6 years ago
- Showcase of DNS Exfiltration and Infiltration☆61Feb 26, 2021Updated 5 years ago
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- A simple and universal .NET proxy remover☆11Jun 14, 2020Updated 5 years ago
- Universal stack-based buffer overfow exploitation tool☆23May 7, 2014Updated 11 years ago
- Conquer the deep ocean, host an .onion site fast!☆16Oct 12, 2022Updated 3 years ago
- ☆49Oct 28, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Parse disassembly files using tree-sitter☆14Dec 3, 2023Updated 2 years ago
- Kamus Besar Bahasa Indonesia☆11Aug 26, 2025Updated 7 months ago
- Public repository of 2026 crackmes.one CTF RE challenge☆28Mar 10, 2026Updated 2 weeks ago
- Automated Mass Exploiter☆11Apr 14, 2019Updated 6 years ago
- ☆63Feb 2, 2025Updated last year
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago