kcsc-club / ctfs
repository for kscs-ctfs
☆8Updated 2 years ago
Alternatives and similar repositories for ctfs:
Users that are interested in ctfs are comparing it to the libraries listed below
- Simple portforwarder for monitor traffic, detect patterns and replace response.☆23Updated 2 years ago
- Things help you get started with Java Vulnerability☆70Updated last year
- CTF Challenge by me☆9Updated 2 years ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆79Updated 6 years ago
- ElasticBurp-NG☆23Updated last year
- A collection of Server-Side Prototype Pollution gadgets and exploits☆160Updated 5 months ago
- My CTF writeups☆17Updated 5 years ago
- Challenges I wrote for various CTF competitions☆40Updated 6 months ago
- Writeup CTF☆22Updated 2 years ago
- Collection of my capture-the-flag web challenge in any levels☆109Updated 2 years ago
- LFI to RCE via phpinfo() assistance or via controlled log file☆60Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated last year
- This repository contains various XXE labs set up for different languages and their different parsers. This may alternatively serve as a p…☆104Updated 10 months ago
- ☆35Updated 2 years ago
- Need any help bypassing CSP ?☆25Updated 4 years ago
- ☆4Updated 3 months ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆98Updated 3 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆121Updated 5 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆195Updated 3 months ago
- ImageMagick LFI PoC [CVE-2022-44268]☆52Updated last year
- Becoming the spider, crawling through the webs to catch the fly.☆73Updated 3 years ago
- jolokia-exploitation-toolkit☆284Updated last month
- This repository stores some of my custom BCheck Scan configurations. Its goal is to identify intriguing elements that warrant further man…☆89Updated 11 months ago
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆53Updated 2 years ago
- Ghostscript command injection vulnerability PoC (CVE-2023-36664)☆117Updated last year
- Bunch of CTF writeups.☆35Updated 3 years ago
- ☆14Updated 4 years ago
- Aspx reverse shell☆100Updated 4 years ago
- Enumerate / Dump Docker Registry☆166Updated 9 months ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago