miguelpduarte / SINFCTF2020-publicLinks
Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)
☆13Updated 4 years ago
Alternatives and similar repositories for SINFCTF2020-public
Users that are interested in SINFCTF2020-public are comparing it to the libraries listed below
Sorting:
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Updated 5 years ago
- Collection of my slide decks, conference videos and research white papers☆27Updated last month
- ☆47Updated 5 years ago
- Clickjacking PoC Generator☆35Updated 5 years ago
- Unofficial api for cve.mitre.org☆40Updated 4 years ago
- A tool to evaluate Content Security Policies.☆71Updated 5 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- ☆38Updated 5 years ago
- Common Wordlists☆54Updated 9 years ago
- Selenium based web scraper to generate passwords list☆51Updated 5 years ago
- A sub-domain enumeration tool☆20Updated 5 years ago
- Credentials Checking Framework☆54Updated 2 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Updated 2 years ago
- notorious BIG IP☆15Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆39Updated 5 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Updated 7 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 8 years ago
- DNS Enumeration with Asynchronicity☆45Updated 7 years ago
- Free and open cyber-security auditing tool with collective intelligence☆21Updated 6 years ago
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Updated 5 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Updated 4 years ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago