Pwn2Win CTF 2019 platform client
☆26Aug 4, 2023Updated 2 years ago
Alternatives and similar repositories for 2019
Users that are interested in 2019 are comparing it to the libraries listed below
Sorting:
- Pwn2Win CTF 2019 flag submissions☆14May 28, 2020Updated 5 years ago
- Journey to conquer the OSCP!☆13Apr 18, 2019Updated 6 years ago
- ☆15Oct 9, 2021Updated 4 years ago
- Platform Test Edition☆17Mar 11, 2018Updated 7 years ago
- RCE Exploit PoC for Spring based RESTFul APIs using XStream as Unmarshaler☆20Dec 24, 2013Updated 12 years ago
- Wiki-like CTF write-ups repository, maintained by the community. 2016☆20Feb 10, 2025Updated last year
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- My OSCP report template in LaTex☆25Jan 31, 2020Updated 6 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Dec 20, 2021Updated 4 years ago
- Sensitive Data Discovery tool☆33Nov 2, 2018Updated 7 years ago
- Scanner For Nginx - Remote Integer Overflow Vulnerability☆36Mar 28, 2025Updated 11 months ago
- ☆31Feb 10, 2020Updated 6 years ago
- This repo will turn into a list of training materials for python starters with focus on security☆13Nov 21, 2018Updated 7 years ago
- A command line cheat sheet. (CLI is not a scary place!)☆13Apr 17, 2018Updated 7 years ago
- Pwn2Win CTF 2017☆27Nov 1, 2017Updated 8 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Official training ground for the OTA CTF team☆39Dec 7, 2022Updated 3 years ago
- "RansomPKP" proof of concept.☆11Aug 8, 2016Updated 9 years ago
- Creates a new list and adds all accounts you are following to that list, then unfollows them all☆12Dec 15, 2019Updated 6 years ago
- 이미지에서 흰색 영역을 투명하게 바꿔줍니다.☆10Jul 19, 2017Updated 8 years ago
- A real-time strategy city building game.☆11Jun 28, 2020Updated 5 years ago
- Attaches your (public) SSH key to your GitHub account☆11Feb 6, 2016Updated 10 years ago
- Kubernetes admission controller that validate image in deployment is vulnerability free☆11May 6, 2020Updated 5 years ago
- Demonstrating why Dynamic Method Invocation with unrestricted method names (the old default of Struts) is dangerous.☆12Sep 30, 2018Updated 7 years ago
- Decentralized open source slot game based on Ethereum blockchain☆14Dec 30, 2017Updated 8 years ago
- best tool for hacking via windows cmd☆13Jan 4, 2019Updated 7 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- ☆14Mar 8, 2018Updated 7 years ago
- A proof of concept for Metasploit's CVE-2019-5624 vulnerability (Rubyzip insecure ZIP handling RCE)☆13May 2, 2019Updated 6 years ago
- r2con 2020 CTF kernel challenge☆12Sep 13, 2020Updated 5 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Lab Material for the One-Day Web Application Penetration Testing Fundamentals Course☆10Jun 22, 2021Updated 4 years ago
- Get newest public disclosed HackerOne report notifications on your Desktop☆14Jan 29, 2020Updated 6 years ago
- 📈 An application that allows you to check the status of your Raspberry Pi☆10Jun 10, 2020Updated 5 years ago
- CSAW Embedded Security Challenge 2019☆37Nov 24, 2019Updated 6 years ago