pogTeam / writeups
Solutions from multiple CTFs we have played.
☆11Updated 6 years ago
Alternatives and similar repositories for writeups:
Users that are interested in writeups are comparing it to the libraries listed below
- PoC for an adaptive parallelised DNS prober☆44Updated 7 years ago
- ☆15Updated 2 years ago
- Cross Distribution Exploit Testing☆28Updated 9 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Updated 4 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- ☆24Updated 10 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- A simple steganalysis script writen in Python☆26Updated 11 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆53Updated 6 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- ☆29Updated 8 years ago
- badbucket checks your s3 bucket for common misconfigurations☆23Updated 7 years ago
- ☆89Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- A scripted library of hacking techniques.☆18Updated 6 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- Exploits and research stuffs☆54Updated last year
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆63Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆75Updated 9 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago