aadityapurani / My-CTF-Solutions
Dump of codes for the challenges I attempted / solved in various Capture the Flag challenges. Not intended to be very tidy and clean.
☆31Updated 5 years ago
Alternatives and similar repositories for My-CTF-Solutions
Users that are interested in My-CTF-Solutions are comparing it to the libraries listed below
Sorting:
- All CTF events☆75Updated 3 years ago
- ☆76Updated 4 years ago
- Bunch of CTF writeups.☆35Updated 4 years ago
- Writeups for all the HTB machines I have done☆62Updated last year
- XXE Injection Payloads☆28Updated 5 years ago
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- Pentest stuff☆49Updated last year
- Capture The Flag competition challenge write-ups☆20Updated last year
- Misc bounty and vulndisc things☆84Updated 4 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- A list of Awesome Bughunting oneliners , collected from the various sources☆68Updated last year
- Git repo for challenges of encryptCTF 2019☆24Updated 6 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆86Updated 2 years ago
- ☆20Updated last year
- ☆44Updated 4 years ago
- ☆48Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆66Updated 2 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆30Updated 5 years ago
- Resources I consider useful for security research of web applications☆58Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆25Updated 4 years ago
- A miscellany of thoughts.☆46Updated last year
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆72Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated last year
- HTTP request smuggling tools☆18Updated 4 years ago
- ☆43Updated 6 years ago
- A list of universities with vulnerability disclosure policies☆50Updated 3 years ago
- ☆100Updated last year
- You don't need wires to be connected☆40Updated 5 years ago
- A extension for collecting parameters☆25Updated 4 years ago