chrisandoryan / XSSPawn
XSSPawn is a flexible and customizable visitor bot for CTF challenges setup; mostly used as a CTF XSS Bot. Based on CTFTraining's base_image_xssbot.
☆12Updated 6 months ago
Alternatives and similar repositories for XSSPawn:
Users that are interested in XSSPawn are comparing it to the libraries listed below
- GLUFS allows you to automate the tedious process of finding leaks using format string vulnerabilities.☆25Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆81Updated 2 years ago
- XS-Leak Browser Test Suite☆78Updated last year
- ☆32Updated last month
- A Pwning Toolkit☆28Updated 2 months ago
- CTF scripts and writeups (mostly challenge + .py solving script)☆23Updated 3 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆20Updated last month
- CVE's we discovered along the way☆16Updated 3 years ago
- ☆20Updated 3 years ago
- CTF write-ups☆82Updated 4 months ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- A curated list of argument injection vectors☆40Updated 2 months ago
- ☆32Updated 2 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆24Updated 3 years ago
- Discord bot to display events and information about a CTFd instance (https://ctfd.io/)☆11Updated 8 months ago
- An example of a vulnerability in the early JWT token node.js library☆36Updated last year
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Updated 2 years ago
- CTF writeups☆30Updated 2 years ago
- This repository is used to teach you how to exploit basic binary vulnerabilities.☆29Updated 5 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Updated 5 years ago
- Informational Repository tracking times that real world bugs have come out of CTF challenges intentionally or otherwise☆58Updated last year
- Where CTFs happen☆81Updated 10 months ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 9 months ago
- Utility for exploiting the one-time pad (OTP) key reuse vulnerability.☆29Updated 7 years ago
- King-of-the-Hill game for the 2nd International Cybersecurity Challenge @ San Diego, California USA☆12Updated last year
- Command line client for HackTheBox☆22Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated last year
- Network traffic analysis tool for Attack & Defense CTF's☆50Updated last week
- Stego Helper Identification Tool☆26Updated 6 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆57Updated last year