pogTeam / writeupsLinks
Solutions from multiple CTFs we have played.
☆11Updated 7 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- CSV injection Vulnerable Script.☆29Updated 8 years ago
 - PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
 - Extreme Vulnerable Node Application☆95Updated 6 years ago
 - BSidesCBR CTF docker compose files☆66Updated 5 years ago
 - Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
 - Exploits and research stuffs☆55Updated 3 weeks ago
 - Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
 - An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
 - Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
 - Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
 - ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
 - Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
 - The Internetwache CTF 2016 repository☆74Updated 4 years ago
 - CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
 - Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
 - Practice Web App written in python with some vulnerabilities.☆34Updated 4 years ago
 - It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
 - ☆90Updated 8 years ago
 - Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
 - A lightweight CSRF Toolkit for easy Proof of concept☆172Updated 11 years ago
 - Demo server for testing Java deserialization payloads☆15Updated 9 years ago
 - Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
 - Hackerone disclosed report URL Aggregator☆30Updated 7 years ago
 - Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
 - Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
 - A deliberately vulnerable modern day app with lots of DOM related bugs☆35Updated 6 years ago
 - This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
 - HackerOne Public Disclosure Slack Bot☆20Updated 3 years ago
 - Various tools for managing bug bounty recon and exploration.☆49Updated 2 years ago
 - ☆50Updated 8 years ago