aadityapurani / My-CTF-SolutionsLinks
Dump of codes for the challenges I attempted / solved in various Capture the Flag challenges. Not intended to be very tidy and clean.
☆33Updated 6 years ago
Alternatives and similar repositories for My-CTF-Solutions
Users that are interested in My-CTF-Solutions are comparing it to the libraries listed below
Sorting:
- A list of universities with vulnerability disclosure policies☆52Updated 4 years ago
- All CTF events☆75Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74Updated 4 years ago
- ☆45Updated 5 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- ☆64Updated last year
- A cheat sheet for attacking SQLite via SQLi☆102Updated 9 years ago
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- Finds the End-Points in JavaScript files☆97Updated 4 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106Updated 5 years ago
- GraphQL security workshop labs☆118Updated this week
- Vulnerable Banking Suite☆166Updated 3 months ago
- ☆43Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- This repository contains an example Python API that is vulnerable to several different web API attacks.☆70Updated last year
- Bruteforce a JWT against a list of passwords☆81Updated 8 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- Writeup for the challenges in NahamCon CTF 2020☆80Updated 5 years ago
- Resources I consider useful for security research of web applications☆61Updated 5 years ago
- ☆76Updated 5 years ago
- Detect exposed API keys on GitHub commits.☆35Updated 3 years ago
- Capture The Flag competition challenge write-ups☆22Updated 2 years ago
- Writeups of Capture The Flag Competitions☆123Updated 3 years ago
- This repository contains the source code of the web panel I have used in my book series of books: Cyber and Penetration Testing – Web Pen…☆48Updated 3 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- All Things Bug Bounty☆115Updated 3 years ago
- Capture The Flag | HackTheBox | OSCP | Bug Bounty Hunting | Jobs☆135Updated 5 years ago