pogTeam / writeupsLinks
Solutions from multiple CTFs we have played.
☆11Updated 7 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- ☆72Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 5 years ago
- ☆51Updated 8 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 11 years ago
- Advanced virtual host bruteforcer☆31Updated 10 years ago
- This test suite contains over 40 different test cases that have proven to work with different mobile browsers in my research or testing S…☆30Updated 6 years ago
- Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- "What To" guide for finding vulnerabilities in sites.☆21Updated 8 years ago
- ☆90Updated 8 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 3 years ago
- AutoTriageBot automatically verifies, deduplicates, and suggests payouts for incoming HackerOne reports.☆57Updated 3 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- ActionScript Proof of Concept to perform cross-domain reads☆43Updated 12 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 10 years ago