psmiraglia / ctfLinks
My solutions of CTFs
☆68Updated 9 years ago
Alternatives and similar repositories for ctf
Users that are interested in ctf are comparing it to the libraries listed below
Sorting:
- Custom tools and projects about security☆110Updated this week
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- Damn Vulnerable File Upload V 1.1☆101Updated 7 years ago
- Notes/Tools for pentesting☆82Updated last year
- XVWA on LAMP base docker image☆44Updated 6 years ago
- ☆121Updated 8 years ago
- Enyx SNMP IPv6 Enumeration Tool☆103Updated 2 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Hearbleed exploit to retrieve sensitive information CVE-2014-0160☆83Updated 4 years ago
- Linux Local Enumeration Script☆79Updated 5 years ago
- Walkthrough some CTFs☆50Updated 4 years ago
- ☆94Updated 7 years ago
- Simple PHP webshell with a JPEG header to bypass weak image verification checks☆63Updated 10 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆174Updated last year
- Purpose of this repository is to help all the beginner and experienced professionals to understand,learn and share new tricks for the com…☆32Updated 7 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 5 months ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- My writeups of various CTFs & security challenges☆73Updated last year
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- A collection of darkc0de old scripts (for education purposes only)☆85Updated 9 years ago
- Scripts to execute enumeration via LFI☆90Updated 6 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- A lab for playing with NoSQL Injection☆133Updated 4 years ago
- Damn Vulnerable eXtensive Training Environment☆105Updated 3 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Notes I've taken while working through various web app pentesting labs.☆93Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- ☆207Updated 4 years ago
- useful pentest note☆66Updated last week