pogTeam / writeupsLinks
Solutions from multiple CTFs we have played.
☆11Updated 6 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- ☆50Updated 8 years ago
- ParrotNG is a tool capable of identifying Adobe Flex applications (SWF) vulnerable to CVE-2011-2461☆48Updated 10 years ago
- BSidesCBR CTF docker compose files☆66Updated 5 years ago
- ☆90Updated 8 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- The Internetwache CTF 2016 repository☆74Updated 4 years ago
- Exploits and research stuffs☆56Updated this week
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- Capture the flag - security challenges☆13Updated 9 years ago
- Everything you need to exploit overly permissive crossdomain.xml files☆86Updated 10 years ago
- 🏴 Collection of CTF solutions☆75Updated 6 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- A lightweight CSRF Toolkit for easy Proof of concept☆173Updated 11 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- ☆15Updated 2 years ago
- proxy poc implementation of STARTTLS stripping attacks☆168Updated 3 years ago
- Cross Distribution Exploit Testing☆28Updated 10 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆64Updated 9 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- Subdomain Analyzer☆77Updated 8 years ago
- radare, angr, pwndbg, binjitsu, ect in a box ready for pwning☆74Updated 9 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆102Updated 8 years ago