qll / shitLinks
Stego Helper Identification Tool
☆27Updated 6 years ago
Alternatives and similar repositories for shit
Users that are interested in shit are comparing it to the libraries listed below
Sorting:
- notes and code on past CTFs☆102Updated 4 years ago
- Linux kernel exploits for local privilege escalation☆79Updated 7 years ago
- What do we say to JavaScript? Not today! motherfuckingwebsite.com inspired CTF platform.☆49Updated 6 years ago
- HTTP Desync Attack☆28Updated 5 years ago
- Where CTFs happen☆81Updated last year
- Challenges and vulnerabilities exploitation.☆59Updated 4 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆67Updated 6 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆80Updated 5 years ago
- ☆20Updated 3 years ago
- CTF writeups☆30Updated 3 years ago
- Some of my flag protected writeups☆11Updated 5 years ago
- A tool for automated analysis of ctf type crypto challenges☆29Updated 5 years ago
- Python Time Based Authentication Attack Tool☆22Updated 4 years ago
- SSRF to TCP Port Scanning, Banner and Private IP Disclosure by abusing the FTP protocol/clients☆70Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Reverse Shell as a Service☆32Updated 5 years ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- A functional exploit for CVE-2019-18634, a BSS overflow in sudo's pwfeedback feature that allows for for privesc☆58Updated 5 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆59Updated 4 years ago
- 🔓 CLI tool and library to execute padding oracle attacks easily, with support for concurrent network requests and an elegant UI.☆210Updated 2 years ago
- A PoC for CVE-2020-0601☆337Updated 2 years ago
- A bunch of my exploit development helper tools, collected in one place.☆142Updated 3 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- Query Oriented Programming (QOP) gadgets for SQLite-based exploitation☆50Updated 3 years ago
- My writeups of various CTFs & security challenges☆73Updated this week
- A red team emulation tool deveoped by CyCraft Technology☆25Updated last year
- Python implementation of Metasploit's pattern_create/pattern_offset.☆73Updated 5 years ago
- Website to Scrapping all writeup from http://ctftime.org/ and you can organize which to read first!☆35Updated 8 years ago
- Writeups for each ctf we have partecipated☆40Updated 2 years ago
- CTFd Dump - When you want to have an offline copy of a CTF.☆48Updated 3 months ago