miguelpduarte / SINFCTF2020-publicLinks
Challenges and official solutions for SINF CTF 2020 (companion CTF of SINF, for students, which I organized by myself)
☆13Updated 4 years ago
Alternatives and similar repositories for SINFCTF2020-public
Users that are interested in SINFCTF2020-public are comparing it to the libraries listed below
Sorting:
- Unofficial api for cve.mitre.org☆40Updated 3 years ago
- Slides for my Levelup0x05 talk, "Hardware Hacking for the Masses (and you!)"☆30Updated 5 years ago
- Shell script for testing DNS zone transfer (AXFR query) on domains and subdomains recursively.☆50Updated 4 years ago
- Serpico-NG https://github.com/LUTECH-TMS-CERT/EHAT-NG☆11Updated 7 years ago
- A sub-domain enumeration tool☆19Updated 5 years ago
- A tool to evaluate Content Security Policies.☆72Updated 5 years ago
- ☆47Updated 5 years ago
- A web application for generating custom XSS payloads☆78Updated 5 years ago
- Rogue Access Point Detector☆36Updated 11 months ago
- ☆38Updated 5 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- A ping detection tool for linux☆24Updated 5 years ago
- Red Team Resources☆60Updated 6 years ago
- ☆47Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 5 years ago
- A modular framework designed to chain and automate security tests.☆44Updated 4 years ago
- A tool written in python for scraping firebase data☆43Updated 5 years ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Updated 7 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- ☆27Updated 5 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆85Updated 5 years ago
- ☆69Updated 10 months ago
- notorious BIG IP☆15Updated 6 years ago
- Tool that checks for path traversal traces in a given web application url, plus it is capable of multi-threading, set timeout and 5-layer…☆46Updated 7 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- ☆92Updated 2 years ago