offensi / CTF-challenge
An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.
☆18Updated 2 months ago
Related projects ⓘ
Alternatives and complementary repositories for CTF-challenge
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 4 years ago
- Slack bot for challenge management in large teams☆60Updated last year
- Facebook Bug Bounties☆101Updated 3 years ago
- ☆86Updated 6 years ago
- notes and code on past CTFs☆100Updated 3 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- research☆150Updated 8 months ago
- The Bug Bounty Wiki☆169Updated 6 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆196Updated 5 years ago
- A thorough library database to assist with binary exploitation tasks.☆196Updated 2 years ago
- Hunting Bugs for Fun and Profit☆264Updated 4 years ago
- Files for appsecwiki.com☆114Updated 4 years ago
- ☆21Updated 2 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆162Updated 5 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Updated last year
- Useful tips by OTA CTF members☆135Updated 5 years ago
- Actarus is a custom tool for bug bounty☆75Updated 5 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 5 years ago
- Exploitation challenges for CTF☆62Updated 6 years ago
- Writeups for different CTF challenges☆68Updated 7 months ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆130Updated 7 years ago
- A cheat sheet for attacking SQLite via SQLi☆95Updated 8 years ago
- Fuzz testing: Beginner's guide☆77Updated 7 months ago
- Official CTF for 44CON 2019☆17Updated last year
- Wiki-like CTF write-ups repository by ByteBandits☆101Updated last year
- a repo of links to useful writeups of pwn challenges☆25Updated 6 years ago
- ☆122Updated 6 years ago
- Created by High-Tech Bridge, the Purposefully Insecure and Vulnerable Android Application (PIVAA) replaces outdated DIVA for benchmark of…☆106Updated 4 years ago
- ☆159Updated 6 years ago