jaamesd / EverWingHax
This fully automated hack/cheat script will get you everything you need so you can focus on getting that high score! It'll even unlock perfect sidekicks for you!
☆19Updated 8 years ago
Alternatives and similar repositories for EverWingHax:
Users that are interested in EverWingHax are comparing it to the libraries listed below
- Source files and writeups for UTCTF 2019☆14Updated 4 years ago
- A multi-platform chat bot☆43Updated 4 years ago
- ☆13Updated 7 years ago
- Erised Reverse Engineering and Exploitation Training Sessions☆36Updated 9 years ago
- ☆26Updated 6 years ago
- JavaScript exploit : Firefox version 41 - 50 are affected. Easy fix by disabling JavaScript (use NoScript for better leverage). Victim mu…☆19Updated 8 years ago
- Nmap results are a semigroup☆13Updated 3 years ago
- A website outlining my bounty hunt game.☆11Updated 5 years ago
- Github Desktop RCE PoC☆28Updated 6 years ago
- CTF(x) 2016 problem statements, files, and writeups☆16Updated 6 years ago
- All challenges I created for CTF☆12Updated 3 years ago
- Experiments with git blobs☆9Updated 6 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- Includes implementation of common data structures along with specific algorithmic operations.☆9Updated 9 years ago
- Writeup from Google Capture The Flag 2018 competition☆9Updated 6 years ago
- Docker based Wargame Platform - To practice your CTF skills☆32Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Exploit script for Apache Struts2 REST Plugin XStream RCE (CVE-2017-9805)☆16Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Updated 7 years ago
- ☆9Updated last year
- Detect embedded cryptocurrency miners based on CPU usage☆20Updated 7 years ago
- A platform for jeopardy CTF (capture-the-flag) competitions written in Django.☆14Updated 6 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆18Updated 7 years ago
- A repo to make our changes more transparent to bug bounty researchers in our program (so they can see commits, etc).☆29Updated 5 years ago
- Solving IOLI-crackme with Dynamic Binary Modification☆28Updated 10 years ago
- Windows 10 Exploit☆30Updated 6 years ago
- ☆19Updated 6 years ago
- A small collection of Burp Suite extensions, written in Python☆10Updated 8 years ago
- Generate two PDFs with different contents but identical SHA1 hashes.☆22Updated 8 years ago