gluckzhang / ctf-jwt-tokenLinks
An example of a vulnerability in the early JWT token node.js library
☆37Updated 2 years ago
Alternatives and similar repositories for ctf-jwt-token
Users that are interested in ctf-jwt-token are comparing it to the libraries listed below
Sorting:
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆26Updated 6 months ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 10 months ago
- My writeups of various CTFs & security challenges☆73Updated 2 months ago
- XXE Injection Payloads☆28Updated 6 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆33Updated 3 years ago
- Random Exploits☆50Updated 2 years ago
- CVE, reports, research☆15Updated 4 years ago
- ☆32Updated 5 months ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Updated 3 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆58Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆58Updated 5 years ago
- ☆66Updated 4 years ago
- ☆21Updated 3 months ago
- Searcher for cross-site leaks (XS-Leaks)☆83Updated 2 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Updated 3 years ago
- ☆72Updated 4 years ago
- A cheatsheet for exploiting server-side SVG rasterization.☆30Updated 3 years ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆75Updated 7 years ago
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 4 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆62Updated 2 years ago
- Insecure Deserialization, PDF and lab☆18Updated 6 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆29Updated 3 years ago
- A PoC exploit for CVE-2022-41622 - a CSRF in F5 BIG-IP control plane that leads to remote root☆21Updated 3 years ago