sarperavci / ctf-writeups-searchLinks
Search engine for CTF writeups with instant results.
☆151Updated 9 months ago
Alternatives and similar repositories for ctf-writeups-search
Users that are interested in ctf-writeups-search are comparing it to the libraries listed below
Sorting:
- The most complete code auditing platform with thousands of real-world challenges☆134Updated 6 months ago
- Collection of all previous 1337UP CTF challenges.☆77Updated 11 months ago
- tool designed for identifying vulnerabilities in open source codebases at scale. It can gather and filter on key repository metrics such …☆234Updated 10 months ago
- An archive of 0day.today exploits☆321Updated 5 months ago
- A web CTF for training developers in bug hunting and secure coding!☆101Updated 11 months ago
- Scripts and examples for "From Day Zero to Zero Day" by Eugene Lim.☆191Updated last month
- An experimental project exploring the use of Large Language Models (LLMs) to solve HackTheBox machines autonomously.☆187Updated this week
- A research project to add some brrrrrr to Burp☆196Updated 10 months ago
- The resources for glibc Malloc heap exploitation course by Maxwell Dulin and Security Innovation.☆170Updated last year
- ☆194Updated 2 weeks ago
- FrogPost: postMessage Security Testing Tool☆104Updated 3 weeks ago
- Offensive Web is a documentation website about security research, difficult concepts, bypass and new exploitation techniques.☆30Updated 7 months ago
- ☆314Updated 5 months ago
- AI-powered workflow automation and AI Agents platform for AppSec, Fuzzing & Offensive Security. Automate vulnerability discovery with int…☆660Updated last month
- Burp Suite extension for testing Passkey systems.☆75Updated 8 months ago
- A sandbox environment designed for loading, running and profiling a wide range of files, including machine learning models, ELFs, Pickle,…☆338Updated last week
- Dredging up secrets from the depths of the file system☆131Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆102Updated 10 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆150Updated 8 months ago
- Secrets Ninja is an GUI tool for validating & investigating API keys discovered during pentesting & bug bounty hunting.☆157Updated 3 weeks ago
- Abuse trust-boundaries to bypass firewalls and network controls☆385Updated 5 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆74Updated 3 months ago
- A LLM explicitly designed for getting hacked☆165Updated 2 years ago
- Learn AI security through a series of vulnerable LLM CTF challenges. No sign ups, no cloud fees, run everything locally on your system.☆310Updated last year
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆102Updated 4 months ago
- gRPC Goat is a "Vulnerable by Design" lab created to provide an interactive, hands-on playground for learning and practicing gRPC securit…☆50Updated 3 months ago
- Certainly is a offensive security toolkit to capture large amounts of traffic in various network protocols in bitflip and typosquat scena…☆221Updated last year
- Hands-on MCP security lab: 10 real incidents reproduced with vulnerable/secure MCP servers, pytest regressions, and Claude/Cursor battle-…☆61Updated 3 weeks ago
- 🔍A cutting edge context aware GraphQL API fuzzing tool!☆155Updated last week
- Official writeups for Business CTF 2024: The Vault Of Hope☆155Updated last year