aadityapurani / My-CTF-SolutionsLinks
Dump of codes for the challenges I attempted / solved in various Capture the Flag challenges. Not intended to be very tidy and clean.
☆32Updated 6 years ago
Alternatives and similar repositories for My-CTF-Solutions
Users that are interested in My-CTF-Solutions are comparing it to the libraries listed below
Sorting:
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- A list of universities with vulnerability disclosure policies☆51Updated 4 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- Resources I consider useful for security research of web applications☆59Updated 4 years ago
- An app with really insecure crypto. To be used to see/test/exploit weak cryptographic implementations as well as to learn a little bit mo…☆84Updated 2 years ago
- ☆43Updated 6 years ago
- Top 100 Hacking & Security E-Books (Free Download)☆44Updated 6 years ago
- ☆76Updated 4 years ago
- ☆64Updated last year
- A XSS mind map ;)☆57Updated 9 years ago
- Detectify Crowdsource Challenge☆70Updated 3 years ago
- GraphQL security workshop labs☆116Updated last month
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆87Updated 4 years ago
- BurpSuite using the document and some extensions☆71Updated 5 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- A cheat sheet for attacking SQLite via SQLi☆101Updated 9 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- ☆45Updated 5 years ago
- List of domains in scope for bug bounties (HackerOne, Bugcrowd, etc.)☆74Updated 4 years ago
- Hands-on content for Humla/Puliya sessions at null community☆92Updated 4 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆67Updated 6 years ago
- All Things Bug Bounty☆116Updated 3 years ago
- Recon for Department of Defense HackerOne program☆46Updated 7 years ago
- All CTF events☆75Updated 4 years ago
- My writeups of various CTFs & security challenges☆73Updated last month
- someone needs help☆65Updated 3 years ago
- ☆49Updated 5 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆65Updated 4 years ago
- ☆38Updated 6 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆93Updated 4 years ago