Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups
☆25May 21, 2025Updated 10 months ago
Alternatives and similar repositories for security-writeups
Users that are interested in security-writeups are comparing it to the libraries listed below
Sorting:
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆19Dec 20, 2023Updated 2 years ago
- ☆12Apr 10, 2023Updated 2 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Experience the power of a PHP webshell designed to overcome the limitations of blacklisted system/exec functions.☆25Jul 14, 2024Updated last year
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 4 years ago
- ☆14Jul 21, 2023Updated 2 years ago
- A demo exploit for CVE-2021-44026, a SQL injection in Roundcube☆13Dec 22, 2023Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 5 years ago
- Red Teaming tools and techniques☆56Feb 18, 2023Updated 3 years ago
- Playground for Race Condition attack☆24Mar 18, 2023Updated 3 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Dec 21, 2020Updated 5 years ago
- Challenge repository for the 2023 CSAW CTF Qualifiers☆31Sep 18, 2023Updated 2 years ago
- ASCII-ART to make someone smile ♡☆11Jul 3, 2022Updated 3 years ago
- Pipeline implementation based on n3534☆21Jan 31, 2015Updated 11 years ago
- Resources for Students in the Practical Webapp Security and Testing course☆23Oct 15, 2025Updated 5 months ago
- ☆119Jan 30, 2024Updated 2 years ago
- Script for generating write-ups templates for CTF challenges 🗃️☆15Feb 5, 2022Updated 4 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Read data from ascii tables☆11May 4, 2018Updated 7 years ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆33Dec 12, 2025Updated 3 months ago
- OSCP tools and notes☆40Jan 21, 2019Updated 7 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Write-Ups for Huntress 2023 CTF☆12Nov 1, 2023Updated 2 years ago
- ☆47Nov 16, 2023Updated 2 years ago
- The objective of Smart File Hunter (SFH) is the efficient identification of files containing sensitive information like passwords or priv…☆14Sep 3, 2022Updated 3 years ago
- Ethical Hacking - A Hands-On Approach to Ethical Hacking [Video], published by Packt☆14May 10, 2023Updated 2 years ago
- A more reliable way of resolving syscall numbers in Windows☆54Feb 12, 2024Updated 2 years ago
- A collection of red blue team staff☆48Jun 1, 2023Updated 2 years ago
- Docker setup and creation for OpenDevin https://github.com/OpenDevin/OpenDevin☆11Apr 15, 2024Updated last year
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- A Man in the Middle proof of concept using docker containers☆21Jul 11, 2021Updated 4 years ago
- Documents Exfiltration project for fun and educational purposes☆144Oct 10, 2023Updated 2 years ago
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆26Feb 18, 2026Updated last month
- ☆11Aug 3, 2022Updated 3 years ago
- ☆53Aug 11, 2024Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆15Apr 29, 2022Updated 3 years ago
- A starter project to create Arc jobs using the Jupyter Notebook interface☆22Mar 25, 2021Updated 4 years ago