sea5kg / ctf01dLinks
Jury System for attack-defence ctf game (ctf-scoreboard). Or you can use it for training.
☆26Updated last month
Alternatives and similar repositories for ctf01d
Users that are interested in ctf01d are comparing it to the libraries listed below
Sorting:
- HTTP redirection service designed to help bypass SSRF filters. Integrated with Burp Suite.☆52Updated 4 months ago
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- Tool for finding URLs, paths, secrets and generating raw HTTP requests and OpenApi specifications from config files and annotations used …☆228Updated 4 months ago
- A PoC for the CVE-2022-44268 - ImageMagick arbitrary file read☆217Updated 7 months ago
- Pure-python distributable Attack-Defence CTF platform, created to be easily set up.☆173Updated last year
- Attack & Defense CTF Farm based on DestructiveFarm☆117Updated 3 months ago
- Some nuclei templates for pentest CMS Bitrix☆36Updated 5 months ago
- PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
- Deriving RSA public keys from message-signature pairs☆354Updated last year
- Damn Vulnerable Thick Client App developed in C# .NET☆163Updated 2 years ago
- A source code static analysis platform for AppSec enthusiasts.☆263Updated 8 months ago
- Official writeups for Business CTF 2024: The Vault Of Hope☆156Updated 11 months ago
- Vulnerable code snippets with fixes for Web2, Web3, API, iOS, Android and Infrastructure-as-Code (IaC)☆163Updated last year
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆126Updated last year
- This tool is for letting you know how strong your disable_functions is and how you can bypass that.☆140Updated 6 years ago
- Black box fuzzer for web applications☆434Updated 3 months ago
- C4T BuT S4D Attack-Defence CTF☆12Updated 3 years ago
- Find authentication (authn) and authorization (authz) security bugs in web application routes.☆280Updated last month
- A (small) web exploit framework☆97Updated last month
- Enumerate / Dump Docker Registry☆180Updated last year
- Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
- A collection of Server-Side Prototype Pollution gadgets and exploits☆212Updated 9 months ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆284Updated last year
- CSTC is a Burp Suite extension that allows request/response modification using a GUI analogous to CyberChef☆251Updated this week
- A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery☆334Updated 11 months ago
- A python based minimal DNS server to test/verify DNS rebinding attacks☆66Updated 2 years ago
- Generates a `php://filter` chain that adds a prefix and a suffix to the contents of a file.☆228Updated last year
- WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 4 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆162Updated 11 months ago
- Generates a DEBUG PIN for flask applications based on Werkzeug☆15Updated last year