psmiraglia / ctfLinks
My solutions of CTFs
☆67Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- XVWA on LAMP base docker image☆44Updated 7 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆176Updated 4 months ago
- Penetration testing scripts☆145Updated 7 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Custom tools and projects about security☆110Updated 5 months ago
- Albatar is a SQLi exploitation framework in Python☆138Updated 10 months ago
- Linux Local Enumeration Script☆79Updated 5 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆101Updated last year
- ☆218Updated 3 years ago
- Local File Inclusion Exploitation Tool (mirror)☆128Updated 8 years ago
- A Metasploit auto auxiliary script☆103Updated 3 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆263Updated 2 years ago
- Exfiltrate data with ICMP☆101Updated 7 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆84Updated 4 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆268Updated 7 years ago
- Damn Vulnerable eXtensive Training Environment☆108Updated 3 years ago
- ☆121Updated 8 years ago
- Bash simulator to control a server using PHP system functions.☆100Updated 5 years ago
- Notes/Tools for pentesting☆79Updated 2 years ago
- Web Application Security☆129Updated 2 weeks ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆44Updated 5 years ago
- Walkthrough some CTFs☆51Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆202Updated 4 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- ☆208Updated 4 years ago
- Scripts to execute enumeration via LFI☆90Updated 6 years ago
- A lab for playing with NoSQL Injection☆134Updated 5 years ago
- The Hacker Playbook 3 - Web Commands☆85Updated 7 years ago