This Repository Contains some of the solution of the task assigned during the KPMG_CTF 2023-07-28 to 2023-07-30
☆20Feb 2, 2024Updated 2 years ago
Alternatives and similar repositories for KPMG_CTF
Users that are interested in KPMG_CTF are comparing it to the libraries listed below
Sorting:
- ☆24Dec 3, 2025Updated 3 months ago
- Obsidian Vault for my Cybersecurity learning☆11Oct 20, 2024Updated last year
- A place to find the CPP/JAVA/PYTHON NOTES AND COMPETITIVE COMPETITION Solutions☆11Jul 21, 2023Updated 2 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆25Jan 17, 2026Updated last month
- ☆12Oct 21, 2024Updated last year
- CEH Practical Preparation☆11Oct 2, 2022Updated 3 years ago
- CEH v13 exam resources & Tips☆35Jun 24, 2025Updated 8 months ago
- Practicing PostgreSQL using real questions from FAANG interviews☆12Dec 12, 2021Updated 4 years ago
- ☆13Jun 12, 2023Updated 2 years ago
- ☆14May 9, 2023Updated 2 years ago
- Fast and customizable Firebase api and Project ID extractor .☆18Dec 10, 2023Updated 2 years ago
- A Repository to maintain short notes for my CEHv12 attempt. Give this repo a if it's useful to you☆19Sep 6, 2024Updated last year
- // Aesthetic, dynamic and minimal dots for Fedora hyprland☆16Mar 8, 2024Updated 2 years ago
- This repo hosts multiple codes, content, checklists etc which can help a penetration tester in a web application auditing.☆21Sep 14, 2023Updated 2 years ago
- Cool HackerOne Reports☆22Nov 16, 2022Updated 3 years ago
- Living Off The Land API☆59Feb 2, 2026Updated last month
- ☆25May 11, 2020Updated 5 years ago
- Practical labs, notes, and reports for CEH v13 modules — covering web hacking, network pentesting, malware analysis, social engineering, …☆69Jan 28, 2026Updated last month
- Certificate Generator app useful for generating certificates from a given template.☆19May 30, 2023Updated 2 years ago
- The Certified in Cybersecurity℠ (CC) is for anyone interested in gaining a basic understanding of cybersecurity concepts. This is an ent…☆25Mar 22, 2025Updated 11 months ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 3 years ago
- Some oneliners with descriptions and Regex that I frequently use while doing bug hunting. More to come 🚀🚀☆22Dec 24, 2022Updated 3 years ago
- Cisco Certified CyberOps Associate 200-201 Certification Guide, published by Packt☆29Jan 30, 2023Updated 3 years ago
- An open-source DNS resolver written in Go that can resolve IP addresses for domain names. This command-line tool allows users to easily l…☆26Apr 8, 2023Updated 2 years ago
- script python to check url list via cookies and Authorization☆19Feb 28, 2023Updated 3 years ago
- ☆22Apr 30, 2023Updated 2 years ago
- List of Google dorks to find VDPs and Bug Bounty Programs☆33Jan 3, 2023Updated 3 years ago
- This Is The Ultimate Bug Bounty Automation & Web Hacking Tool That I've Created.☆28Feb 27, 2023Updated 3 years ago
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Host Header Vulnerability Scanner Automated Tool☆28Apr 18, 2025Updated 10 months ago
- DSA roadmaps and their solutions☆36Nov 2, 2021Updated 4 years ago
- Mastering Linux Shell Scripting_Andrew Mallett☆32Oct 5, 2018Updated 7 years ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆52Feb 24, 2026Updated 2 weeks ago
- it's a script that generates a gnome wallpaper with the pc processes in a word cloud that looks like a picture.☆37May 18, 2024Updated last year
- Extract all employees from LinkedIn. Especially useful for companies with thousands of employees.☆32Feb 21, 2022Updated 4 years ago
- A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, metho…☆69May 18, 2025Updated 9 months ago
- This contains the content for the beginners to learn practically.☆49May 21, 2022Updated 3 years ago
- The purpose of this repository is to concentrate information, concepts and studies for the Certified in Cybersecurity (ISC²) exam.☆52Apr 18, 2023Updated 2 years ago