j4k0m / secdojo-23jan
SecDojo 23jan CTF writeup.
☆13Updated 3 years ago
Alternatives and similar repositories for secdojo-23jan:
Users that are interested in secdojo-23jan are comparing it to the libraries listed below
- The Hacking Week☆2Updated 2 years ago
- A really good cybersec reading materials.☆13Updated 2 years ago
- ☆14Updated last year
- Akasec's CTF Writeups archive☆13Updated 2 years ago
- CTF Writeups☆60Updated 8 months ago
- Osint French People Location☆15Updated 2 years ago
- Cyber Odyssey 2024 : Qualifications Challenges.☆12Updated 4 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- CVE-2023-38831 winrar exploit generator and get reverse shell☆11Updated last year
- Collection of hacking tools, and ideas you might need to practice ethical hacking.☆28Updated 2 years ago
- POC for CVE-2021-41091☆65Updated last year
- The Hack3r News B'darija☆18Updated 2 years ago
- some of my IOCs from malware investigations☆10Updated 2 years ago
- My attempt to reverse the Discord nitro token generation function.☆29Updated 5 months ago
- Writeups of CTFs i play - this repository will also include POCs, RFCs and Related Resources to support the writeups.☆8Updated 2 years ago
- Mass exploitation of CVE-2021-24499 unauthenticated upload leading to remote code execution in Workreap theme.☆17Updated 3 years ago
- Piscine 1337 futureisloading-Juillet 2018☆26Updated 6 years ago
- ☆48Updated 2 years ago
- Source code for all the challenges posted in Akasec CTF 2024(with some writeups).☆29Updated 7 months ago
- Helper script for identifying bad characters based on (Immunity|edb)'s stack dump☆12Updated 2 years ago
- A docker image contains tools for developing and debuging your 42 projects.☆22Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- (0day) Local Privilege Escalation in IObit Malware Fighter☆116Updated 2 months ago
- The dining philosophers problem is an example problem often used in concurrent algorithm design to illustrate synchronization issues and …☆12Updated 3 years ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 5 months ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- Another pentest of a vulnerable windows server☆16Updated 3 years ago
- Open Redirect scanner☆18Updated 2 years ago
- 42 header for neovim made with lua☆11Updated 2 years ago
- Study materials for the Certified Red Team Pentesting (CRTP) exam, covering essential concepts in red teaming and penetration testing☆336Updated last year