offensi / CTF-challenge
An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.
☆18Updated 7 months ago
Alternatives and similar repositories for CTF-challenge:
Users that are interested in CTF-challenge are comparing it to the libraries listed below
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 5 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆67Updated 7 years ago
- A thorough library database to assist with binary exploitation tasks.☆197Updated 2 years ago
- ☆160Updated 7 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- notes and code on past CTFs☆103Updated 3 years ago
- ☆87Updated 6 years ago
- ☆21Updated 3 years ago
- Useful tips by OTA CTF members☆140Updated 5 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- Official CTF for 44CON 2019☆17Updated last year
- research☆151Updated last year
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆87Updated 6 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 8 years ago
- Hunting Bugs for Fun and Profit☆267Updated 4 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆132Updated 8 years ago
- EmpireCTF – write-ups, capture the flag, cybersecurity☆131Updated 3 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 5 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- Some kernel exploits☆144Updated 7 years ago
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Official training ground for the OTA CTF team☆39Updated 2 years ago
- ☆152Updated 2 years ago
- TLS Redirection☆120Updated 7 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆164Updated 5 years ago
- A distributed fuzzer which aims to pull in the best technologies, make them play nicely together, and run on multiple O/Ses.☆194Updated 4 years ago
- Small Python library that makes it easy to exploit race conditions in web apps with Requests.☆158Updated last year
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Some security related notes☆460Updated 7 years ago