WesleyWong420 / iHack-Attack-Defense
Preparation of Attack & Defense CTF for iHack 2022
☆12Updated last year
Alternatives and similar repositories for iHack-Attack-Defense:
Users that are interested in iHack-Attack-Defense are comparing it to the libraries listed below
- Vulnerabilities Exploitation On Ubuntu 22.04☆38Updated last year
- his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulne…☆87Updated 2 weeks ago
- Challenges I wrote for various CTF competitions☆40Updated 8 months ago
- A script to download all the challenges and files from the CTFd instance.☆55Updated 8 months ago
- A python module to explore the object tree to extract paths to interesting objects in memory.☆91Updated 2 months ago
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 8 months ago
- A list of all Active Directory machines from HackTheBox☆57Updated 2 months ago
- Official writeups for University CTF 2023: Brains & Bytes☆101Updated 3 months ago
- some of the commands I usually use when doing HTB machines☆42Updated last year
- Some tips for Bug Bounty using LibreOffice☆46Updated last month
- Challenge of the HeroCTF v6 edition.☆19Updated 5 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆39Updated last year
- The Search Engine for Cybersecurity☆73Updated 5 months ago
- CVE-2023-33733 reportlab RCE☆114Updated last year
- ☆36Updated last year
- CVE-2023-4911☆15Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆49Updated 6 months ago
- CTF Writeups☆25Updated 7 months ago
- ☆58Updated last year
- A collection of pyjails!☆16Updated last week
- ☆94Updated last month
- Official writeups for Hack The Boo CTF 2023☆44Updated 3 months ago
- A collection of config files for linux focusing on hackthebox theme☆43Updated 3 months ago
- ☆38Updated last year
- Need any help bypassing CSP ?☆27Updated 4 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated last year
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- ☆27Updated 7 months ago
- Craft engaging XSS challenges effortlessly with CTF-XSS-BOT. This template simplifies setting up an environment for Capture The Flag comp…☆38Updated 2 weeks ago
- CVE-2023-2255 Libre Office☆57Updated last year