vital-information-resource-under-siege / PWN-ChallengesView external linksLinks
Writeups of some of the Binary Exploitation challenges that I have solved during CTF.
☆21Feb 8, 2025Updated last year
Alternatives and similar repositories for PWN-Challenges
Users that are interested in PWN-Challenges are comparing it to the libraries listed below
Sorting:
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- ☆70Nov 19, 2021Updated 4 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Nov 17, 2022Updated 3 years ago
- A simple CLI tool to check WebDAV vulnerability☆14Aug 13, 2021Updated 4 years ago
- A configurable colourful terminal clock☆15Jan 13, 2021Updated 5 years ago
- An Bug Hunters tool to find many Vulnerabilities using Google dorks☆19Nov 18, 2020Updated 5 years ago
- https://www.nu11secur1ty.com☆22Feb 9, 2026Updated last week
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Wing FTP Server Remote Code Execution (RCE) Exploit (CVE-2025-47812)☆43Jul 14, 2025Updated 7 months ago
- An Automated udemy coupons scraper which scrapes coupons and autopost the result in blogspot post☆23Nov 2, 2021Updated 4 years ago
- Bybit API client library for Go (ByBit API connector)☆10Dec 19, 2025Updated last month
- domain name/brand infringement detector. pulls newly registered domains daily, searches variations of your company domain names and alert…☆23Feb 22, 2022Updated 3 years ago
- This BOT retweets everything related to Cyber Security,☆26Jan 20, 2022Updated 4 years ago
- ☆64Apr 20, 2022Updated 3 years ago
- All Files, Scripts, and exploits can be found here☆74Apr 16, 2021Updated 4 years ago
- In this repository I'll host my research and methodologies for auditing vulnerabilities☆29Jan 7, 2020Updated 6 years ago
- Numbeo Unofficial API☆15Oct 16, 2022Updated 3 years ago
- ☆12Mar 19, 2023Updated 2 years ago
- A remapper for Touhou Project☆12Mar 24, 2023Updated 2 years ago
- Metasploit framework via HTTP services☆10Jul 31, 2021Updated 4 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- This repository provides examples that demonstrates how to develop PSoC 4 MCU based analog designs. These examples help you to use periph…☆15Oct 27, 2018Updated 7 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10May 3, 2024Updated last year
- Final year project in Magshimim, focusing on Python development and Web Exploitation.☆10Apr 29, 2023Updated 2 years ago
- Jenkins WebInspect Plugin Publisher provides the ability to upload a WebInspect scan file, from your Jenkins server to your Fortify Softw…☆11Dec 23, 2025Updated last month
- Users can submit orders to milady pool and have their orders only execute at optimal prices☆10Sep 17, 2024Updated last year
- ☆10Feb 28, 2023Updated 2 years ago
- An Exploitation script developed to exploit the CVE-2023-4966 bleed citrix information disclosure vulnerability☆10Oct 29, 2023Updated 2 years ago
- Simple terminal interface for chatgpt☆10Dec 6, 2022Updated 3 years ago
- Quake Command-Line Application With Golang☆10Jul 20, 2023Updated 2 years ago
- Tools that run inside the guest☆11Jan 2, 2020Updated 6 years ago
- top usernames from azure survey 2025☆14Apr 25, 2025Updated 9 months ago
- Control a Fanimation Slinger V2 RF Fan via an ESP8266 and a TI CC1101 chip over MQTT☆11Jan 29, 2025Updated last year
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Counter-Strike 1.6 Dedicated Server☆10Dec 31, 2022Updated 3 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Feb 1, 2023Updated 3 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- A SHA-3 finalist hash (BLAKE) reversal using rainbow tables.☆15Jul 1, 2017Updated 8 years ago
- ARL使用代理池联动nuclei,xray通过企业微信机器人告警☆10Oct 28, 2022Updated 3 years ago