jorgectf / Created-CTF-Challenges
☆12Updated 3 years ago
Alternatives and similar repositories for Created-CTF-Challenges:
Users that are interested in Created-CTF-Challenges are comparing it to the libraries listed below
- BurpSuite using the document and some extensions☆68Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- ☆31Updated 4 years ago
- ☆76Updated 4 years ago
- Detectify Crowdsource Challenge☆67Updated 2 years ago
- Buffer Overflows☆29Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆51Updated 2 years ago
- Updated 4 years ago
- ☆65Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- ☆48Updated 10 months ago
- Reestructured LemonBooster.☆47Updated 8 months ago
- XSS Payload without Anything.☆103Updated 5 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- Notes for CRTP☆40Updated 4 years ago
- HTTP parameter discovery suite.☆61Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 3 years ago
- ☆18Updated 2 years ago
- XSS Bypass☆29Updated last year
- ☆17Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- Tools and Scripts used in CRTP☆12Updated 4 years ago
- Preparation for OSWE☆42Updated 4 years ago
- ☆20Updated last year
- xss development frameworks, with the goal of making payload writing easier.☆141Updated 7 months ago
- Wordlist to bruteforce for LFI☆123Updated 5 years ago
- For my Try Hack Me room: Intro To Pwntools☆26Updated 3 years ago
- Find subdomains and takeovers.☆84Updated 2 years ago
- Checks if files is accessible based on the source code.☆16Updated last year