justcatthefish / ctfplatform
CTF platform we wrote and used for justCTF 2019
☆13Updated 2 years ago
Alternatives and similar repositories for ctfplatform:
Users that are interested in ctfplatform are comparing it to the libraries listed below
- justCTF 2019 challenges sources☆37Updated 3 years ago
- PoC for leaking text nodes via CSS injection☆36Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Updated 6 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆32Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 7 years ago
- ☆70Updated 7 years ago
- My fuzzing workshop from PHDays9☆27Updated 5 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- WCTF2019 challenge: Gyotaku The Flag☆41Updated 5 years ago
- XSS payloads for edge cases☆34Updated 6 years ago
- CTF Writeups☆37Updated 6 years ago
- Some of my public exploits☆51Updated 4 years ago
- Those are my challenges for multiple CTF!☆10Updated last year
- CTF writeup for learning☆22Updated 3 years ago
- Some exploits to bypass Safer Mode in Ghostscript☆15Updated 4 years ago
- CTF writeups☆30Updated 2 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- Scripts and auxiliary files for fuzzing PHP's unserialize function☆43Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- ☆46Updated 6 years ago
- Materials from Fuzzing Bay Area meetups☆68Updated 5 years ago
- CTFd Challenge Type which decreases its value after every solve☆18Updated 6 years ago
- CVE-2019-6467 (BIND nxdomain-redirect)☆26Updated 5 years ago
- ☆15Updated 8 years ago
- Exploit code for CVE-2019-11707 on Firefox 66.0.3 running on Ubuntu☆42Updated 5 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Updated 4 years ago
- WinDbg script to spoof origin and url of a renderer process in Chrome☆25Updated 4 years ago
- ☆34Updated 5 years ago
- ☆13Updated 5 years ago