offensi / CTF-challengeLinks
An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.
☆18Updated 9 months ago
Alternatives and similar repositories for CTF-challenge
Users that are interested in CTF-challenge are comparing it to the libraries listed below
Sorting:
- CLI tool to get the links of original writeups from ctftime.org☆32Updated 5 years ago
- ☆21Updated 3 years ago
- Slack bot for challenge management in large teams☆60Updated 2 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- My solutions to some CTF challenges and a list of interesting resources about pwning stuff☆111Updated 5 years ago
- Facebook Bug Bounties☆102Updated 4 years ago
- Abusing Self-XSS and Clickjacking to trigger XSS☆135Updated 8 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- ReconJSON is a project dedicated to creating a flexible and consistent JSON format across popular recon tools.☆102Updated 6 years ago
- Fuzzing Payloads to Assist in Web Application Testing.☆166Updated 6 years ago
- ☆162Updated 7 years ago
- Hunting Bugs for Fun and Profit☆269Updated 4 years ago
- The Bug Bounty Wiki☆172Updated 6 years ago
- notes and code on past CTFs☆103Updated 4 years ago
- Setup for a pwning VM☆61Updated 6 years ago
- Good to know, easy to forget information about binaries and their exploitation!☆68Updated 7 years ago
- research☆151Updated last year
- Simple wrapper for meg that sieves through meg's output for you.☆60Updated 5 years ago
- Files for appsecwiki.com☆117Updated 4 years ago
- A tiny and cute URL fuzzer☆395Updated 2 years ago
- ☆88Updated 7 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆101Updated 4 years ago
- ☆71Updated 7 years ago
- Writeups for different CTF challenges☆69Updated 2 months ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- TLS Redirection☆120Updated 7 years ago
- ☆122Updated 7 years ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago