sea5kg / ctf01dLinks
Jury System for attack-defence ctf game (ctf-scoreboard). Or you can use it for training.
☆26Updated 4 months ago
Alternatives and similar repositories for ctf01d
Users that are interested in ctf01d are comparing it to the libraries listed below
Sorting:
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆168Updated last year
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆217Updated 5 months ago
- Attack & Defense CTF Farm based on DestructiveFarm☆106Updated 3 weeks ago
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆47Updated 2 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆177Updated last year
- Some nuclei templates for pentest CMS Bitrix☆34Updated 3 months ago
- Root shell PoC for CVE-2021-3156☆69Updated 4 years ago
- Deriving RSA public keys from message-signature pairs☆338Updated last year
- Official writeups for Business CTF 2024: The Vault Of Hope☆153Updated 8 months ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆118Updated last year
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆61Updated 2 years ago
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆134Updated 5 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆204Updated 6 months ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆274Updated this week
- A python based minimal DNS server to test/verify DNS rebinding attacks☆51Updated 2 years ago
- ☆182Updated 2 months ago
- Challenges I wrote for various CTF competitions☆44Updated last year
- A source code static analysis platform for AppSec enthusiasts.☆257Updated 6 months ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆164Updated last year
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆247Updated last week
- Docker image to exploit RCE, try for pentest methods and test container security solutions (trivy, falco and etc.)☆90Updated 4 years ago
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆318Updated 9 months ago
- Enumerate / Dump Docker Registry☆180Updated last year
- CVE-2022-39227 : Proof of Concept☆21Updated last year
- A (small) web exploit framework☆94Updated 3 weeks ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆154Updated 3 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆225Updated 10 months ago
- XXE techniques☆11Updated 3 years ago
- Sonar is a security researcher's Swiss army knife for finding and exploiting vulnerabilities that require out-of-band interactions☆15Updated last week