mzfr / notesLinks
A miscellany of thoughts.
☆47Updated last year
Alternatives and similar repositories for notes
Users that are interested in notes are comparing it to the libraries listed below
Sorting:
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆61Updated 2 years ago
- ☆48Updated 4 years ago
- Source for Pentester Land☆35Updated 2 years ago
- Lucideus CyberGym is the internal CTF event we organise for our security professionals to grow and learn together. Now everyone can acces…☆85Updated 3 years ago
- This repo contains resources that a beginner would need to get started in Web application penetration testing and bug hunting.☆18Updated 3 years ago
- A table containing CTF challenge links and their corresponding walkthroughs from different platforms.☆11Updated 2 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆13Updated 4 years ago
- Learning source code review, spot vulnerability, find some ways how to fix it.☆28Updated 2 years ago
- Target practice for ffuf☆67Updated 4 years ago
- An example of a vulnerability in the early JWT token node.js library☆37Updated 2 years ago
- Penetration Testing Interview Questions☆45Updated 3 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Updated 3 years ago
- Slides and other material from various conference presentations.☆45Updated 3 months ago
- Writeups for all the HTB machines I have done☆64Updated 2 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Updated 3 years ago
- Writeups for CTF challenges.☆78Updated last year
- A curated list of different pentesting resources☆29Updated 3 years ago
- ☆19Updated 4 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆20Updated last year
- A series of writes about “Binary Exploitation”.☆85Updated 2 years ago
- Vuldroid is a Vulnerable Android Application made with security issues in order to demonstrate how they can occur in code☆65Updated 3 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15Updated 3 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- Static and dynamic Android application security analysis☆73Updated last year
- Writeups of some of the Binary Exploitation challenges that I have solved during CTF.☆22Updated 6 months ago
- Identifies vulnerabilities in network_security_config.xml, AndroidManifest.xml and if Firebase URL are accessible publicly☆49Updated 2 years ago
- One liner regex match to search inside JS files, using curl and grep!☆29Updated 3 years ago
- Curated lists of InfoSec on Twitter. Find out who's awesome to follow!☆90Updated 4 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Updated 3 years ago