jorgectf / Created-CTF-Challenges
☆12Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Created-CTF-Challenges
- Detectify Crowdsource Challenge☆63Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆0Updated 3 years ago
- BurpSuite using the document and some extensions☆68Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆48Updated last year
- Workshop given at Hack in Paris 2019☆121Updated last year
- Reestructured LemonBooster.☆44Updated 3 months ago
- XSS Payload without Anything.☆102Updated 5 years ago
- ☆18Updated 2 years ago
- ☆30Updated 4 years ago
- ☆65Updated last year
- Material from CTF machines I have attempted☆31Updated 3 years ago
- A natural evolution of Burp Suite's Repeater tool☆91Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆117Updated 2 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆88Updated last year
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆130Updated 3 years ago
- mainRecon is an automated reconnaissance docker image for bugbounty hunter write in bash script.☆85Updated 2 years ago
- ☆121Updated 3 years ago
- ☆22Updated 4 years ago
- ☆9Updated last year
- Preparation for OSWE☆39Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆97Updated last year
- Buffer Overflows☆29Updated 3 years ago
- Checks if files is accessible based on the source code.☆16Updated 8 months ago
- This repo contains the code for my secure code review challenges☆69Updated 2 months ago
- A list of "secrets" from JWT sample code and readme files.☆51Updated 4 years ago
- ☆36Updated this week
- ☆47Updated 3 years ago
- ☆39Updated 11 months ago