jorgectf / Created-CTF-ChallengesLinks
☆12Updated 3 years ago
Alternatives and similar repositories for Created-CTF-Challenges
Users that are interested in Created-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- xss development frameworks, with the goal of making payload writing easier.☆153Updated last year
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- A python based blind SQL injection exploitation script☆141Updated 5 years ago
- BurpSuite using the document and some extensions☆72Updated 5 years ago
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- Detectify Crowdsource Challenge☆72Updated 3 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Updated 5 years ago
- XSS Payload without Anything.☆104Updated 6 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A command line tool to search AttackerKB.☆53Updated 5 years ago
- Clientside vulnerability / reflected xss fuzzer☆149Updated 2 years ago
- ☆17Updated 4 years ago
- A LateX template for penetration testing reports☆108Updated 6 years ago
- Enhanced fork with logging, OpenAPI 3.0 and Python 3 for security monitoring workshops☆44Updated last year
- ☆32Updated 5 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- A script that you can run in the background!☆184Updated 6 years ago
- ☆154Updated 2 years ago
- Simple Python Script For Performing XMLRPC Dictionary Attack☆134Updated 5 years ago
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆93Updated 3 years ago
- ☆42Updated 2 years ago
- ☆66Updated 3 years ago
- Don't expect much :) Just expect to learn new things!☆64Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆94Updated 2 years ago
- ☆38Updated 11 months ago
- HTTP parameter discovery suite.☆64Updated 5 years ago
- ☆76Updated 5 years ago
- Buffer Overflows☆29Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- A blind XSS detection and XSS data capture framework☆175Updated last month