d4rk007 / ctfsLinks
Collection of ctf write-up source codes.
☆16Updated 4 years ago
Alternatives and similar repositories for ctfs
Users that are interested in ctfs are comparing it to the libraries listed below
Sorting:
- Pentest stuff☆49Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 10 months ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆24Updated 3 weeks ago
- ☆49Updated 5 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- Critical Remote Code Execution Vulnerability (CVE-2018-11776) Found in Apache Struts.☆15Updated 5 years ago
- The objective of this Burp Suite extension is the flexible and dynamic extraction, correlation, and structured presentation of informatio…☆60Updated 2 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 6 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆59Updated 5 years ago
- XXE Injection Payloads☆28Updated 6 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- ☆36Updated 10 months ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- HTTP requests of FrontPage expolit☆26Updated 11 years ago
- InfluxDB CVE-2019-20933 vulnerability exploit☆41Updated 3 years ago
- Simple recon tool automates your recon process☆16Updated 2 years ago
- OSWE Preparation☆37Updated 6 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Advanced Recon Tool☆26Updated 5 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- ☆32Updated last year
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- bug bounty automation☆13Updated 4 years ago
- Collection of ProjectDiscovery wallpapers☆33Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Updated 2 years ago