☆14Jan 16, 2020Updated 6 years ago
Alternatives and similar repositories for 35c3ctf_chals
Users that are interested in 35c3ctf_chals are comparing it to the libraries listed below
Sorting:
- D2R MapHack☆12Jun 10, 2022Updated 3 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- A Post-exploitation Toolset for Interacting with the Microsoft Graph API☆13Nov 1, 2023Updated 2 years ago
- 要是不做开源的话,我可能早就财务自由了吧?😅☆18Dec 20, 2021Updated 4 years ago
- ☆13Dec 15, 2024Updated last year
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- gosec动态规则修改版☆12Jun 29, 2021Updated 4 years ago
- Ransonware simples, criptografa arquivos e volta ao normal com a chave fornecida☆10Jan 28, 2021Updated 5 years ago
- ☆11Nov 5, 2018Updated 7 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- Repository for Binary Reverse Engineering exercises.☆12Jul 17, 2020Updated 5 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated last year
- YARA detection rule for CVE-2024-4367 arbitrary javascript execution in PDF.js☆11May 27, 2024Updated last year
- powerfull pentesting tool to checking email by smtp command☆10Feb 29, 2024Updated 2 years ago
- Just a git repo for the sleepmask detection rule i found in https://codex-7.gitbook.io/codexs-terminal-window/blue-team/detecting-cobalt-…☆16Jun 4, 2025Updated 9 months ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Nuclei POC 模板☆10Feb 17, 2023Updated 3 years ago
- Single-Clich-Proxy-Chains☆13Mar 29, 2021Updated 4 years ago
- Exploit for CVE-2024-0402 in Gitlab☆15Mar 18, 2025Updated 11 months ago
- ☆11Aug 31, 2023Updated 2 years ago
- PoC☆12Apr 7, 2025Updated 11 months ago
- keep watching new bug bounty (vulnerability) postings.☆13Apr 7, 2024Updated last year
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- Scripts developed to help in mobile forensics investigations☆10Jul 4, 2017Updated 8 years ago
- CVE-2023-20273 Exploit PoC☆14Apr 1, 2024Updated last year
- Yet Another Mac Changer!!!☆12Jan 26, 2023Updated 3 years ago
- GiveWP PHP Object Injection exploit☆12Oct 1, 2024Updated last year
- Track Kubernetes CVEs by native GitHub notifications!☆13May 7, 2024Updated last year
- Your bloodhound for hidden info in those JS files.☆17May 13, 2024Updated last year
- Voice Assistant module for magic mirror https://github.com/MichMich/MagicMirror☆10Dec 11, 2019Updated 6 years ago
- ✒️ Every cybersecurity CTF challenge I've ever authored! o(^▽^)o☆14May 14, 2024Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- Windows Event Log Killer☆12May 22, 2017Updated 8 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-7339☆16Aug 10, 2024Updated last year
- My-CTF-Challenge☆11Oct 23, 2020Updated 5 years ago
- Pay with payfort gateway in MENA.☆14Dec 3, 2022Updated 3 years ago