dreadlocked / ctf-writeups
CTF Write-ups
☆26Updated 6 years ago
Alternatives and similar repositories for ctf-writeups:
Users that are interested in ctf-writeups are comparing it to the libraries listed below
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆45Updated 6 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- ☆70Updated 7 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆99Updated 5 years ago
- Simple Server Side Request Forgery services enumeration tool.☆55Updated 6 years ago
- All about CVE-2018-14667; From what it is to how to successfully exploit it.☆50Updated 6 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Study about HQL injection exploitation.☆51Updated 8 years ago
- Extension adds a new tab in Burp Suite called Extractor☆42Updated 6 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆38Updated 7 years ago
- ZIP File Raider - Burp Extension for ZIP File Payload Testing☆71Updated 4 years ago
- CORS checking☆34Updated 6 years ago
- .NET Deserialization Passive Scanner☆45Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- intentionally vulnerable API☆29Updated 7 months ago
- ☆38Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 6 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- WhiteBox CMS analysis☆69Updated last year
- ☆34Updated 5 years ago
- Proof-of-concept CORS exploitation tool.☆35Updated 5 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆48Updated 4 years ago