Web CTF CheatSheet 🐈
☆11Jun 12, 2019Updated 6 years ago
Alternatives and similar repositories for Web-CTF-Cheatsheet
Users that are interested in Web-CTF-Cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- ☆18Jun 24, 2021Updated 4 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Jenkins pre-auth RCE exploit. More info at https://jenkins.io/security/advisory/2019-01-08/#SECURITY-1266 https://blog.orange.tw/2019/02/…☆10Mar 15, 2019Updated 7 years ago
- Convert your masscan/subdomain-scan results (80,443,8080) into screenshots for better analysis☆36Jul 10, 2018Updated 7 years ago
- buffer-overflow☆15Feb 2, 2022Updated 4 years ago
- RepoToStoreBugBountyInfo☆11Mar 11, 2020Updated 6 years ago
- Confluence(<install-directory>/confluence/WEB-INF/)文件读取漏洞☆17Sep 2, 2019Updated 6 years ago
- Semgrep rules to identify GWT attack surface☆12Apr 28, 2022Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Nov 5, 2020Updated 5 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆15Aug 27, 2023Updated 2 years ago
- ☆24Dec 28, 2024Updated last year
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Oct 16, 2020Updated 5 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Feb 16, 2021Updated 5 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆22Aug 6, 2022Updated 3 years ago
- Network Policy Helper☆30Apr 26, 2026Updated last week
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆12Jan 4, 2022Updated 4 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 5 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- Pentest tool. Conviniently invoke RCE on many PostgreSQL servers in network☆16Jan 14, 2019Updated 7 years ago
- Packaging audit toolkit using vulners.com vulnerability database☆20Apr 9, 2018Updated 8 years ago
- miscellaneous stuff☆21Mar 31, 2015Updated 11 years ago
- Cmdlets for capturing Windows Events☆14Mar 11, 2022Updated 4 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- File system enumerator and monitor for Android and Ubuntu.☆17Sep 25, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Python's handling of NaN is....interesting?broken?...this project illustrates the issue☆13Dec 28, 2021Updated 4 years ago
- Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container☆15Dec 16, 2017Updated 8 years ago
- A powerful Burp extension to make bounty rain☆14Feb 1, 2022Updated 4 years ago