mzfr / notesLinks
A miscellany of thoughts.
☆48Updated last year
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- ☆49Updated 5 years ago
- ☆13Updated 3 years ago
- Writeups for CTF challenges.☆78Updated 2 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆30Updated 3 years ago
- ☆23Updated 4 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆66Updated 4 years ago
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆86Updated 4 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- Target practice for ffuf☆70Updated 4 years ago
- security.txt collection of most popular world-wide domains☆55Updated 2 years ago
- someone needs help☆66Updated 3 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 4 years ago
- Source for Pentester Land☆39Updated 3 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Updated 3 years ago
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆21Updated 11 months ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14Updated 4 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Updated 7 months ago
- Jumpstart multiple WebSocket servers quickly☆32Updated 4 years ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- Pentest stuff☆50Updated 2 years ago
- Tools and Scripts used in CRTP☆12Updated 5 years ago
- An example of a vulnerability in the early JWT token node.js library☆37Updated 2 years ago
- Static and dynamic Android application security analysis☆75Updated last year
- Binary Exploitation and Reverse-Engineering (from assembly into C)☆28Updated 4 years ago
- Bug bounty bot for channel☆16Updated 3 years ago
- CLI tool that extracts a regex pattern from a list of urls ( Rust )☆61Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago