spaze / hashesLinks
Magic hashes – PHP hash "collisions"
☆787Updated 5 months ago
Alternatives and similar repositories for hashes
Users that are interested in hashes are comparing it to the libraries listed below
Sorting:
- Deriving RSA public keys from message-signature pairs☆340Updated last year
- A ready to use JSONP endpoints/payloads to help bypass content security policy (CSP) of different websites.☆724Updated last year
- Simple DNS Rebinding Service☆686Updated 5 years ago
- Herramienta para evadir disable_functions y open_basedir☆448Updated 2 years ago
- Command line tool to fetch, decode, brute-force and craft session cookies of a Flask application by guessing secret keys.☆576Updated 9 months ago
- ☆898Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,022Updated 4 years ago
- CTFNote is a collaborative tool aiming to help CTF teams to organise their work.☆582Updated last month
- ☆1,145Updated 7 months ago
- List of XSS Vectors/Payloads☆1,321Updated 8 months ago
- A semi-interactive PHP shell compressed into a single file.☆980Updated 7 years ago
- Perfect Blue's CTF Writeups☆684Updated last year
- detect stegano-hidden data in PNG & BMP☆1,461Updated last month
- Simple websites vulnerable to Server Side Template Injections(SSTI)☆401Updated 2 years ago
- A script to automatically install Peda+pwndbg+GEF plugins for gdb☆456Updated 2 years ago
- Prototype Pollution and useful Script Gadgets☆1,522Updated last year
- Files + Writeups for DownUnderCTF 2022 Challenges☆250Updated 2 years ago
- ☆1,167Updated 8 years ago
- A DNS rebinding attack framework.☆1,183Updated 2 months ago
- A tool to dump a git repository from a website☆2,270Updated 3 weeks ago
- Automated script for performing Padding Oracle attacks☆791Updated last year
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,585Updated 5 months ago
- Yet another Stego Tool☆389Updated 2 years ago
- Client Side Prototype Pollution Scanner☆519Updated 2 years ago
- My CTF journey since 2015. Stats, writeups, code snippets, notes, challenges.☆559Updated last month
- ☆697Updated 9 months ago
- Files + Writeups for DownUnderCTF 2020 Challenges☆168Updated 4 years ago
- Predict python's random module generated values.☆419Updated 9 months ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆893Updated 3 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆734Updated 2 years ago