nullcon / hackim-2019
Sources for challenges of Nullcon's HackIM 2019
☆62Updated 4 years ago
Alternatives and similar repositories for hackim-2019:
Users that are interested in hackim-2019 are comparing it to the libraries listed below
- WCTF2019 challenge: Gyotaku The Flag☆41Updated 5 years ago
- CTF Writeups☆37Updated 6 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Updated 6 years ago
- Challenges I created for 35c3☆48Updated 6 years ago
- Repo for CSAW CTF 2018 Quals challenges☆38Updated 6 years ago
- ☆67Updated 4 years ago
- 2 web tasks from ZeroNights HackQuest 2016☆50Updated 8 years ago
- PoC for CVE-2019-19844(https://www.djangoproject.com/weblog/2019/dec/18/security-releases/)☆101Updated 5 years ago
- Python Web framework P0wner☆75Updated 12 years ago
- A Java serializer in JavaScript☆81Updated 6 years ago
- Challenge Sources & Exploits for the 34C3 CTF☆115Updated 7 years ago
- Repository to hold materials for DefCon_RESTing presentation by Dinis, Abe and Alvaro☆52Updated 11 years ago
- Exploiting Python PIL Module Command Execution Vulnerability☆53Updated 3 years ago
- cve-2019-0604 SharePoint RCE exploit☆40Updated 5 years ago
- Exploit PoC for Spring RCE issue (CVE-2011-2894)☆43Updated last year
- My Real World CTF challenges☆114Updated 5 years ago
- Slides/Demos from the BSides Munich 2019 talk "Attacking Java RMI in 2019"☆101Updated 5 years ago
- Full TTY reverse shell over SSH☆58Updated 4 years ago
- CTF stuff☆40Updated 2 years ago
- X41 BeanStack - Stack Trace Fingerprinting BETA☆52Updated 4 years ago
- Sources for challenges of Nullcon's HackIM 2020☆57Updated 2 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Updated 8 years ago
- CVE-2018-7600 Drupal RCE☆116Updated 7 years ago
- ☆98Updated 3 years ago
- poison and relay NTLM credentials☆174Updated 6 years ago
- An example project that exploits the default typing issue in Jackson-databind via Spring application contexts and expressions☆122Updated 7 years ago
- Proof of concept showing how java byte code can be injected through InitialContext.lookup() calls☆42Updated 9 years ago
- ☆55Updated 8 years ago
- ☆27Updated 4 years ago
- Learn binary exploitation from angelboy's hitcon-training☆36Updated 7 years ago