superkojiman / writeupsLinks
Musings from the brainpan.
☆10Updated 6 years ago
Alternatives and similar repositories for writeups
Users that are interested in writeups are comparing it to the libraries listed below
Sorting:
- Offline Digital Forensics Tool for Binary Files☆38Updated 7 years ago
- packetstormsecurity.net exploit archive 133ch3r☆24Updated 14 years ago
- OverTheWire Wargames write-ups☆25Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- ☆25Updated 10 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Updated 10 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- A Custom Scanner for Burp☆31Updated 11 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- ☆48Updated 2 months ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Updated 8 years ago
- BurpJDSer-ng☆29Updated this week
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- A scoreboard for Security CTF events☆37Updated 12 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- cisco-global-exploiter : This tool detects 14 different vulnerabilities on Cisco routers and switches☆44Updated 6 years ago
- Pentesting Tools☆22Updated last month
- Damn Vulnerable Node Application☆20Updated 9 years ago
- We collect many tools used in buffer overflow development in one place, repeating with new idea is not a shame - thanks China :)☆35Updated 12 years ago
- DEPRECATED, Nozzlr is a bruteforce framework, trully modular and script-friendly☆63Updated 2 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Updated 9 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago