intigriti / CTFLinks
Collection of all previous 1337UP CTF challenges.
☆77Updated 11 months ago
Alternatives and similar repositories for CTF
Users that are interested in CTF are comparing it to the libraries listed below
Sorting:
- A collection of Turbo Intruder scripts.☆66Updated 10 months ago
- A web CTF for training developers in bug hunting and secure coding!☆101Updated 11 months ago
- Search engine for CTF writeups with instant results.☆152Updated 9 months ago
- FrogPost: postMessage Security Testing Tool☆104Updated last week
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆85Updated 10 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆220Updated last year
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆149Updated 8 months ago
- ☆191Updated 7 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆188Updated 3 weeks ago
- An archive of 0day.today exploits☆314Updated 4 months ago
- A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.☆47Updated 2 years ago
- Tool to detect and monitor GitHub org users' public repositories for secrets and sensitive files☆228Updated 3 weeks ago
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- AI for Ethical Hacking - Workshop☆238Updated 2 weeks ago
- My personal collection of resources (mostly tools and training materials) for source code security audits.☆95Updated last year
- ☆39Updated 5 months ago
- Abuse trust-boundaries to bypass firewalls and network controls☆387Updated 4 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated 10 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 2 months ago
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆137Updated 3 years ago
- AIGoat: A deliberately Vulnerable AI Infrastructure. Learn AI security through solving our challenges.☆260Updated 2 months ago
- Verizon Burp Extensions: AI Suite☆141Updated 7 months ago
- PAYGoat is a banking application built for educational purposes, focused on exploring and understanding common business logic flaws in fi…☆183Updated 4 months ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆163Updated last month
- Dredging up secrets from the depths of the file system☆131Updated last year
- This repository contains information on the CVEs I found.☆51Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- Create honeypots for cloud environments☆107Updated 2 months ago