dusanlazic / fastLinks
π© Flag Acquisition and Submission Tool β Make writing exploits your only concern during A/D
β27Updated last year
Alternatives and similar repositories for fast
Users that are interested in fast are comparing it to the libraries listed below
Sorting:
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USAβ40Updated 2 years ago
- A (small) web exploit frameworkβ96Updated 3 weeks ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickβ¦β125Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hopeβ157Updated 10 months ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file readβ217Updated 6 months ago
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write aβ¦β60Updated 3 months ago
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.β49Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log fileβ71Updated 2 years ago
- POC for CVE-2021-41091β65Updated 2 years ago
- Command line client for HackTheBoxβ23Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.β102Updated 8 months ago
- Official writeups for Hack The Boo CTF 2023β45Updated 10 months ago
- StringCheese is a CTF tool to solve easy challenges automatically in many cases where a strings | grep is just not enoughβ86Updated 4 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,β¦β108Updated 4 months ago
- An automatic Blind ROP exploitation toolβ205Updated 2 years ago
- Docker Challenge creation for CTFd. Allows per team/user containers!β103Updated 5 months ago
- Web interface to explore Suricata EVE outputsβ72Updated 3 weeks ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege eβ¦β61Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmapβ66Updated 5 months ago
- This tool allows to automatically test for Content Security Policy bypass payloads.β44Updated last year
- β122Updated 2 years ago
- β35Updated 2 years ago
- Runs exploits, fast.β96Updated last week
- An Intrusion Prevention System for Attack-Defense CTFsβ51Updated last year
- Vulnerabilities Exploitation On Ubuntu 22.04β47Updated 2 years ago
- A script to download all the challenges and files from the CTFd instance.β58Updated 4 months ago
- Memory mapping profiles for forensic analysis using volatility 2β50Updated 3 years ago
- Python code to Serialize and Unserialize java binary serialization format.β26Updated 3 months ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.β140Updated 5 years ago
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β135Updated this week