tghack / tg19hackLinks
☆19Updated 2 years ago
Alternatives and similar repositories for tg19hack
Users that are interested in tg19hack are comparing it to the libraries listed below
Sorting:
- ☆32Updated 2 months ago
- A cheat sheet for attacking SQLite via SQLi☆99Updated 9 years ago
- Here, have some candy. Useful tools and cheat sheet for Captures The Flag (CTF) contests. And also for Computer Security in general.☆67Updated 6 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- A python module that accepts an HTTP request file and returns a dictionary of headers and post data☆44Updated 5 years ago
- notes and code on past CTFs☆102Updated 4 years ago
- Bunch of CTF writeups.☆35Updated 4 years ago
- Workshop given at Hack in Paris 2019☆124Updated 2 years ago
- Searcher for cross-site leaks (XS-Leaks)☆82Updated 2 years ago
- Blog about HTTP Request Smuggling, including a demo application.☆29Updated 3 years ago
- PoC + Docker Environment for Python PIL/Pillow Remote Shell Command Execution via Ghostscript CVE-2018-16509☆59Updated 4 years ago
- Web Exploitation Workflow for CTF Challenges☆51Updated 8 years ago
- ☆169Updated 3 years ago
- Cyber Jawara 2018 Final - Attack & Defense CTF services environments based on Docker.☆74Updated 6 years ago
- XS-Leak Browser Test Suite☆85Updated last year
- CTF write-ups☆98Updated last week
- Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago
- Curated knowledge base of exploitation techniques, reverse engineering workflows, and fuzzing insights — built for repeatable, real-world…☆52Updated 4 months ago
- Materials from different CTFs for later reuse☆26Updated 2 years ago
- A Pwning Toolkit☆28Updated 8 months ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆77Updated 5 years ago
- ☆106Updated 10 months ago
- Peas create serialized payload for deserialization RCE attack on python driven applications where pickle ,pyYAML, ruamel.yaml or jsonpick…☆122Updated last year
- Writeup for HackerOne H1-415 2020 CTF☆32Updated 5 years ago
- List of Trusted Types bypasses☆102Updated last year
- ☆88Updated last year
- LFI to RCE via phpinfo() assistance or via controlled log file☆71Updated 2 years ago
- Burp Extension that copies a request and builds a FFUF skeleton☆111Updated last year
- Where CTFs happen☆81Updated last year
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago