karma9874 / CTF-WriteupsLinks
Writeups for NoobCTF 0x1, Dark-PreCTF, Zh3ro-CTF
☆19Updated 4 years ago
Alternatives and similar repositories for CTF-Writeups
Users that are interested in CTF-Writeups are comparing it to the libraries listed below
Sorting:
- This Tool bypass 403/401. This script contain all the possible techniques to do the bypass☆44Updated last year
 - A collection of hacks and one-off scripts☆18Updated 4 years ago
 - Seamlessly Detect and Construct Exploit POCs for ClickJacking Vulnerability using this Automated tool☆45Updated last year
 - CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆65Updated 6 years ago
 - LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 10 months ago
 - Many script that can be modified according to your needs for Information Gathering and Asset discovery in Bug Bounty Hunting (Pull reques…☆59Updated last year
 - Proof of concept denial of service over TOR stress test tool☆41Updated 7 years ago
 - A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
 - PyIntruder: A Python fuzzer boasting multithreading for accelerated performance, a user-friendly tkinter GUI interface, and a wide array …☆55Updated 3 years ago
 - Bypassing File Upload Restriction using Magic Bytes☆21Updated 3 years ago
 - originip finds origin ip from dig, shodan, censys, securitytrails, viewdns, hunter how, fofa, zoomeye.☆10Updated last year
 - Lab Website For Practicing Different Types of SQL Injection Vulnerabilities☆21Updated 2 years ago
 - Bash script for CTF automating basic enumeration☆43Updated 3 years ago
 - Small python script to look for common vulnerabilities on SMTP server.☆50Updated last year
 - Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
 - XSS Bypass☆30Updated last year
 - [EN] BETA: Layla - recon tool for bug bounty☆76Updated 3 years ago
 - Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
 - Writeups for Hack The Box machines/challenges☆25Updated 3 years ago
 - ☆66Updated 5 years ago
 - ☆108Updated last year
 - Cross Site Scripting ( XSS ) Vulnerability Payload List☆24Updated 4 years ago
 - 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
 - A purposely vulnerable application in order to demonstrate PHP payload smuggling techniques for PNG files.☆43Updated 3 years ago
 - Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
 - https://www.nu11secur1ty.com☆22Updated this week
 - A list of viruses from Windows 3.1, and the 16 bit binaries associated.☆47Updated 3 years ago
 - Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 weeks ago
 - ☆25Updated 2 years ago
 - Bash script to generate reverse shell payloads☆20Updated 2 years ago