rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.
☆10Apr 13, 2019Updated 6 years ago
Alternatives and similar repositories for rlyCTF
Users that are interested in rlyCTF are comparing it to the libraries listed below
Sorting:
- ☆14Jan 12, 2018Updated 8 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Extracting Clear Text Passwords from mstsc.exe using API Hooking.☆18Nov 17, 2019Updated 6 years ago
- ☆11Sep 26, 2021Updated 4 years ago
- Threat hunting repo for my independent study on threat hunting with OSQuery☆27Jan 16, 2018Updated 8 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- CRUD básico em PHP com um sistema de cadastro de clientes.☆13May 19, 2021Updated 4 years ago
- Online diary is a PHP app by which you can write your feeling and keep it private or share with people and you can also read other post o…☆10Jul 5, 2015Updated 10 years ago
- ☆33Jun 12, 2024Updated last year
- The Damn Vulnerable Router Firmware Project☆30Feb 5, 2018Updated 8 years ago
- Código fonte da calculadora de IMC☆13Oct 16, 2019Updated 6 years ago
- ☆11Feb 21, 2026Updated last week
- ☆11Aug 17, 2025Updated 6 months ago
- ☆15Aug 21, 2021Updated 4 years ago
- 50 React projects for beginners from easy to hard. Practice all of these projects to excel your React skills.☆12Sep 5, 2022Updated 3 years ago
- intern☆10Sep 25, 2018Updated 7 years ago
- A vulnerable LDAP based web app written in Golang☆83Oct 31, 2023Updated 2 years ago
- ☆10Feb 25, 2019Updated 7 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- vscode-extension-highlight☆14Jul 18, 2020Updated 5 years ago
- Eclipse plugin suite providing integration with security testing tools.☆11Apr 23, 2016Updated 9 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Bash & Python scripts for daily life☆16Nov 27, 2018Updated 7 years ago
- ☆10Aug 12, 2024Updated last year
- ☆12Jan 31, 2020Updated 6 years ago
- Some YARA rules i will add from time to time☆12May 31, 2019Updated 6 years ago
- For the 2:5 Scale KENBAK-1 Personal Computer Reproduction☆12Jul 6, 2025Updated 7 months ago
- ☆10May 9, 2019Updated 6 years ago
- Blog do grupo gufers☆12Sep 30, 2022Updated 3 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- 2D Platformer made using the Pygame Library☆10Jan 6, 2021Updated 5 years ago
- ☆10Dec 7, 2015Updated 10 years ago
- Chequea si tu firewall es vulnerable a CVE-2024-21762 (RCE sin autenticación)☆15Jun 29, 2025Updated 8 months ago
- ☆11Jan 31, 2017Updated 9 years ago
- ☆11Mar 12, 2020Updated 5 years ago
- Deception implementation through analysis of BloodHound data☆53Oct 9, 2025Updated 4 months ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Mar 27, 2019Updated 6 years ago
- Wrapper tool to identify the remote device and push device specific frida-server binary.☆10Jun 1, 2017Updated 8 years ago
- This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).☆13Jul 19, 2019Updated 6 years ago