Challenges & author writeups from ZeroDays CTF 2025.
☆170Mar 24, 2025Updated last year
Alternatives and similar repositories for ZeroDaysCTF_2025_Public
Users that are interested in ZeroDaysCTF_2025_Public are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of various exploits☆29Sep 17, 2024Updated last year
- ☆10Apr 13, 2025Updated 11 months ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 10 months ago
- ☆24Jan 27, 2026Updated 2 months ago
- Certipy in Docker☆13Mar 28, 2024Updated 2 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- CVE-2025-1974☆90Apr 2, 2025Updated last year
- NailaoLoader: Hiding Execution Flow via Patching☆23Feb 27, 2025Updated last year
- Keycloak admin API allows low privilege users to use administrative functions☆29Oct 12, 2024Updated last year
- An advanced scanner for exposed secrets in web pages, APIs, and source code.☆13Apr 22, 2025Updated 11 months ago
- ☆17Dec 2, 2025Updated 4 months ago
- A tool for analyzing vulnerabilities in JWT tokens. Advanced JWT Vulnerability Scanner & Exploitation Toolkit☆43Nov 24, 2025Updated 4 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Oct 9, 2024Updated last year
- ☆44Jul 9, 2024Updated last year
- BINARLY Research Tools and PoCs☆39Sep 27, 2024Updated last year
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆13Dec 2, 2024Updated last year
- Sentinel 是一个功能强大AI赋能的跨平台(Windows/Linux)应急响应自动化分析工具,专注于威胁检测、恶意软件分析和安全评估。☆98Dec 30, 2025Updated 3 months ago
- BugBoard: A comprehensive open-source cybersecurity tool for vulnerability detection and bug hunting.☆40Jan 26, 2026Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆37Nov 12, 2025Updated 4 months ago
- ☆14Jul 14, 2020Updated 5 years ago
- ☆20Sep 24, 2025Updated 6 months ago
- AWD 文件监控☆29Sep 14, 2023Updated 2 years ago
- Jeopardy challenges for #ECSC2024 held in Turin, Italy from 8th to 11th October 2024☆42Oct 24, 2024Updated last year
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆30Aug 24, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A POC exploit for CVE-2024-5836 and CVE-2024-6778, allowing for a sandbox escape from a Chrome extension.☆97Oct 17, 2024Updated last year
- Impacket is a collection of Python classes for working with network protocols.☆13Oct 29, 2022Updated 3 years ago
- 腾讯安全沙龙 一 二 三 期PPT集合☆19May 24, 2025Updated 10 months ago
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆132Dec 16, 2024Updated last year
- Docker container for running CobaltStrike 4.10☆38Sep 18, 2024Updated last year
- Hands-on challenges for learning how to reverse engineer Flutter applications.☆43Jan 31, 2026Updated 2 months ago
- Privilege Escalation using Passwd - April Fools prank☆37Apr 3, 2025Updated last year
- Deobfuscation of XorStringsNet☆14Nov 5, 2024Updated last year
- 2015.11.12 三个白帽一题的源码☆18Nov 12, 2015Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆15Aug 12, 2024Updated last year
- Multi-layered malware detection system using static analysis, dynamic browser automation, and external APIs for accurate website threat i…☆14Jun 3, 2025Updated 10 months ago
- Remote buffer overflow over wifi_stack in wpa_supplicant binary in android 11, platform:samsung a20e, stock options so like works out of …☆48Feb 12, 2024Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated 2 months ago
- This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).☆248Mar 26, 2025Updated last year
- A Pwn2Own 2024 SpiderMonkey JIT Bug: From Integer Range Inconsistency to Bound Check Elimination then RCE☆95Feb 12, 2025Updated last year
- Top passwords as per HaveIBeenPwned☆34Mar 12, 2026Updated 3 weeks ago