aadityapurani / My-CTF-SolutionsLinks
Dump of codes for the challenges I attempted / solved in various Capture the Flag challenges. Not intended to be very tidy and clean.
☆32Updated 6 years ago
Alternatives and similar repositories for My-CTF-Solutions
Users that are interested in My-CTF-Solutions are comparing it to the libraries listed below
Sorting:
- A list of universities with vulnerability disclosure policies☆52Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆68Updated 7 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74Updated 4 years ago
- Writeups of Capture The Flag Competitions☆123Updated 3 years ago
- All CTF events☆75Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- XSS Payload without Anything.☆104Updated 6 years ago
- Writeup for the challenges in NahamCon CTF 2020☆80Updated 5 years ago
- CTF scripts and writeups (mostly challenge + .py solving script)☆23Updated 2 months ago
- ☆76Updated 5 years ago
- Resources I consider useful for security research of web applications☆60Updated 5 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Capture The Flag competition challenge write-ups☆22Updated 2 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- ☆64Updated last year
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- GraphQL security workshop labs☆116Updated 3 weeks ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆133Updated 5 years ago
- Webapp to search tips on Twitter through #bugbountytips☆72Updated 3 years ago
- ☆45Updated 5 years ago
- API Key/Token Exploitation Made easy.☆91Updated 4 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 3 years ago
- ☆42Updated 6 years ago
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆85Updated 4 years ago
- A XSS mind map ;)☆57Updated 9 years ago
- How to prepare for OSCP complete guide☆128Updated 6 years ago
- ☆25Updated 5 years ago