dusanlazic / fastLinks
π© Flag Acquisition and Submission Tool β Make writing exploits your only concern during A/D
β27Updated last year
Alternatives and similar repositories for fast
Users that are interested in fast are comparing it to the libraries listed below
Sorting:
- PyHackTheBox is an unofficial Python library to interact with the Hack The Box API.β50Updated 2 years ago
- A python module to explore the object tree to extract paths to interesting objects in memory.β102Updated 10 months ago
- Official writeups for Business CTF 2024: The Vault Of Hopeβ155Updated last year
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpickβ¦β124Updated 2 years ago
- Slip is a CLI tool to create malicious archive files containing path traversal payloads. It supports zip, tar, 7z and zip-like (jar, war,β¦β112Updated 6 months ago
- Web interface to explore Suricata EVE outputsβ84Updated 3 weeks ago
- A (small) web exploit frameworkβ97Updated 2 months ago
- LFI to RCE via phpinfo() assistance or via controlled log fileβ73Updated 2 years ago
- Attack/Defense services for the 2nd International Cybersecurity Challenge @ San Diego, California USAβ40Updated 2 years ago
- Challenges of the HeroCTF v4 edition.β35Updated 2 years ago
- Command line client for HackTheBoxβ24Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write aβ¦β60Updated 5 months ago
- An automatic Blind ROP exploitation toolβ208Updated 2 years ago
- saarCTF infrastructure | Attack-defense CTF gameserver developed by saarsecβ17Updated last month
- Official writeups for Hack The Boo CTF 2023β45Updated last year
- GTFOArgs is a curated list of programs and their associated arguments that can be exploited to gain privileged access or execute arbitrarβ¦β138Updated 2 months ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file readβ217Updated 8 months ago
- An Intrusion Prevention System for Attack-Defense CTFsβ51Updated last year
- β32Updated 5 months ago
- A blazing fast and fully configurable Blind SQL Injection optimization and automation framework.β137Updated 6 months ago
- Python code to Serialize and Unserialize java binary serialization format.β30Updated 3 weeks ago
- Blog about HTTP Request Smuggling, including a demo application.β33Updated 3 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1β58Updated 2 years ago
- Tool to enable blind sql injection attacks against websockets using sqlmapβ66Updated 7 months ago
- C4T BuT S4D Attack-Defence CTFβ12Updated 3 years ago
- A collection of pyjails!β24Updated this week
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege eβ¦β62Updated 3 years ago
- Official and Community CTFd themesβ95Updated 3 years ago
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSONβ114Updated last year
- Memory mapping profiles for forensic analysis using volatility 2β51Updated 3 years ago