qll / shit
Stego Helper Identification Tool
☆26Updated 6 years ago
Alternatives and similar repositories for shit:
Users that are interested in shit are comparing it to the libraries listed below
- notes and code on past CTFs☆103Updated 3 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Updated 5 years ago
- Reverse Shell as a Service☆32Updated 4 years ago
- CTF writeups☆30Updated 2 years ago
- HTTP Desync Attack☆28Updated 4 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆76Updated 5 years ago
- Writeups for all the HTB machines I have done☆62Updated last year
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- ☆51Updated 2 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- Some guides about general topics on information security☆13Updated 6 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 10 months ago
- A collection of tools that deal with crypto and cryptanalysis. For educational purposes only. These tools are likely not a good substitut…☆23Updated 6 years ago
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Updated 5 years ago
- ☆10Updated 3 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- ☆36Updated 6 years ago
- ☆104Updated 4 years ago
- This is a concept poc of command and control server implemented over blockchain☆52Updated 5 years ago
- Writeups/exploit code for CTFs I've done☆13Updated 3 years ago
- gpp-decrypt☆26Updated 8 years ago
- Cheatsheets on security vulnerabilities and exploits.☆32Updated 5 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆33Updated 8 years ago
- ☆50Updated 4 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- ☆26Updated 3 years ago
- A XPath injection demonstration application☆22Updated 4 years ago