qll / shitLinks
Stego Helper Identification Tool
☆27Updated 6 years ago
Alternatives and similar repositories for shit
Users that are interested in shit are comparing it to the libraries listed below
Sorting:
- notes and code on past CTFs☆103Updated 3 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- CTF writeups☆30Updated 3 years ago
- Reverse Shell as a Service☆32Updated 4 years ago
- ☆50Updated 3 years ago
- Writeups for all the HTB machines I have done☆62Updated last year
- Different writeups and solutions of all CTF Contests that we've played!☆16Updated 6 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆32Updated 8 years ago
- Cheatsheets on security vulnerabilities and exploits.☆32Updated 5 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆66Updated 6 years ago
- PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610☆77Updated 5 years ago
- Source code, descriptions and writeups of INS'hAck 2019 CTF challenges!☆33Updated 6 years ago
- POC for CVE-2020-10665 Docker Desktop Local Privilege Escalation☆53Updated 4 years ago
- A CTF platform used in IceCTF 2016☆68Updated 5 years ago
- Writeup for HackerOne H1-415 2020 CTF☆32Updated 5 years ago
- PoC for iTerm2 CVEs CVE-2024-38396 and CVE-2024-38395 which allow code execution☆19Updated 11 months ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- Linux kernel exploits for local privilege escalation☆77Updated 6 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 3 years ago
- XS-Leak Browser Test Suite☆81Updated last year
- ☆26Updated 3 years ago
- ☆13Updated 6 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆77Updated 5 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- redpwn's challenge deployment system☆28Updated last year
- YSOSERIAL Integration with burp suite☆41Updated 3 years ago
- Some guides about general topics on information security☆13Updated 6 years ago
- ☆36Updated 6 years ago
- Simple trick to increase readability of exceptions raised by Burp extensions written in Python☆43Updated 8 years ago
- DNS File EXfiltration☆46Updated last year