karma9874 / CTF-WriteupsLinks
Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF
☆19Updated 4 years ago
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below
Sorting:
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- https://www.nu11secur1ty.com☆22Updated last month
- Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆60Updated last year
- ☆65Updated 6 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆67Updated 6 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Code and notes for the 2021 HackTheBox Business CTF☆37Updated 4 years ago
- Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆47Updated last year
- PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆56Updated 4 years ago
- ☆49Updated 5 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 months ago
- Compress a Python script to a command-line one-liner☆77Updated 3 years ago
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆45Updated last year
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Writeups for Hack The Box machines/challenges☆25Updated 4 years ago
- Javascript payload that inject a malicious payload into the copy-buffer of the victim☆36Updated 7 years ago
- Cross Site Scripting ( XSS ) Vulnerability Payload List☆23Updated 4 years ago
- Magicspoofing it's a python script that checks & test SPF/DMARC DNS records an tries to spoof a domain with a open relay mail system.☆53Updated 9 months ago
- A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client.☆41Updated last month
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated last year
- Script for generating write-ups templates for CTF challenges 🗃️☆15Updated 3 years ago
- simple recon tool to help you for searching vulnerability on web server☆75Updated last week
- [EN] BETA: Layla - recon tool for bug bounty☆75Updated 3 years ago
- A reverse shell in PHP using Unicode encoding as variable assignment☆19Updated 4 years ago
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆76Updated 3 years ago