qll / shitLinks
Stego Helper Identification Tool
☆27Updated 7 years ago
Alternatives and similar repositories for shit
Users that are interested in shit are comparing it to the libraries listed below
Sorting:
- notes and code on past CTFs☆104Updated 4 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆81Updated 6 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆67Updated 6 years ago
- CTF writeups☆30Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Linux kernel exploits for local privilege escalation☆81Updated 7 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- Reverse Shell as a Service☆32Updated 5 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- encode a bash command with charset $, (, ), #, !, {, }, <, \, '.☆73Updated 6 years ago
- Linux privilege escalation via LXD☆140Updated 5 years ago
- research☆151Updated last year
- Reverse shell manager using tmux and ncat☆37Updated last year
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- My writeups of various CTFs & security challenges☆73Updated last month
- Where CTFs happen☆83Updated last year
- A cheat sheet for attacking SQLite via SQLi☆101Updated 9 years ago
- PoC for leaking text nodes via CSS injection☆35Updated 7 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆218Updated 2 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Pwn2Win 2020 Challenges☆55Updated 4 years ago
- Solutions and write-ups from security-based competitions also known as Capture The Flag competition☆102Updated 5 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- Our team's CTF writeups☆12Updated 5 years ago
- Bypassing FILTER_SANITIZE_EMAIL & FILTER_VALIDATE_EMAIL filters in filter_var for SQL Injection ( xD )☆32Updated 6 years ago
- Detailed writeups of how I solved infosec Capture The Flag (CTF) challenges☆48Updated 4 years ago
- List of Trusted Types bypasses☆102Updated last year
- ☆26Updated 4 years ago