shoebpate1 / Web-CTF-ChallengesLinks
Collection of quirky behaviours of code and the CTF challenges that I made around them.
☆28Updated 4 years ago
Alternatives and similar repositories for Web-CTF-Challenges
Users that are interested in Web-CTF-Challenges are comparing it to the libraries listed below
Sorting:
- Client-Side Prototype Pollution Tools☆85Updated 4 years ago
- ☆75Updated last year
- Workshop given at Hack in Paris 2019☆125Updated 2 years ago
- ☆73Updated 3 years ago
- ☆95Updated 4 years ago
- ☆84Updated last year
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆31Updated 2 years ago
- ☆76Updated 4 years ago
- Custom scripts for the PIPER Burp extensions.☆98Updated 2 years ago
- ☆169Updated 4 years ago
- A Burp extension adding a passive scan check to flag parameters whose name or value may indicate a possible insertion point for SSRF or L…☆131Updated 4 years ago
- ☆60Updated last year
- Detects request smuggling via HTTP/2 downgrades.☆94Updated 3 years ago
- WordPress Plugin Update Confusion☆66Updated 3 years ago
- Extract relative urls from a heap snapshot☆87Updated 4 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated 2 years ago
- ☆56Updated 4 years ago
- ☆57Updated 8 months ago
- Dependency Confusion Security Testing Tool☆51Updated 3 years ago
- A tool to perform permutations, mutations and alteration of subdomains in golang.☆158Updated last year
- WILSON Cloud Respwnder is a Web Interaction Logger Sending Out Notifications with the ability to serve custom content in order to appropr…☆50Updated last year
- Adds a customizable "Send to..."-context-menu to your BurpSuite.☆163Updated 2 years ago
- A Burp Suite Extension for parsing Project Files from the CLI.☆87Updated last year
- ☆44Updated 3 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Updated 5 years ago
- HTTP request smuggling tools☆18Updated 5 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Updated 5 years ago
- A collection of code for interacting with API sources directly to improve your understanding of those services.☆66Updated 4 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- Expand urls into one url for each path depth☆33Updated 5 years ago