jorgectf / Created-CTF-ChallengesLinks
☆12Updated 3 years ago
Alternatives and similar repositories for Created-CTF-Challenges
Users that are interested in Created-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- BurpSuite using the document and some extensions☆69Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆93Updated last year
- Workshop given at Hack in Paris 2019☆122Updated 2 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆1Updated 4 years ago
- ☆65Updated 2 years ago
- Detectify Crowdsource Challenge☆69Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆96Updated 2 years ago
- Misc bounty and vulndisc things☆84Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Preparation for OSWE☆42Updated 5 years ago
- OSWE Preparation☆37Updated 6 years ago
- Notes for CRTP☆41Updated 4 years ago
- ☆76Updated 4 years ago
- XSS Payload without Anything.☆105Updated 5 years ago
- Clientside vulnerability / reflected xss fuzzer☆150Updated last year
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆29Updated 2 years ago
- A Python API for Hack the Box platform interaction☆63Updated 4 years ago
- Some of the best web shells that you might need☆45Updated 6 years ago
- NotSoCereal: A Deserialization exploit playground☆52Updated 3 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated 2 years ago
- Penetration Test Methodology☆17Updated last month
- ☆40Updated last year
- Reestructured LemonBooster.☆47Updated 10 months ago
- ☆60Updated 3 years ago
- Wordlist to bruteforce for LFI☆123Updated 5 years ago