wupco / PHP_INCLUDE_TO_SHELL_CHAR_DICT
☆327Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PHP_INCLUDE_TO_SHELL_CHAR_DICT
- dotnet 反序列化学习笔记☆436Updated last year
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆227Updated 5 months ago
- exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF☆215Updated 3 months ago
- Automatically converts Python source code to Pickle opcode☆130Updated 4 years ago
- 80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background serv…☆716Updated 4 months ago
- A plugin for CTFd which allow your users to deploy a standalone instance for challenges.☆230Updated 7 months ago
- CTF中任意文件读取的fuzz列表 (Arbitrary file read fuzz list in CTF)☆254Updated 2 years ago
- A rouge mysql server supports reading files from most mysql libraries of multiple programming languages.☆699Updated last year
- CTF-Java-Gadget专注于收集CTF中Java赛题的反序列化片段☆203Updated 2 months ago
- Deployment template for docker target machine in ctf for CTFd and other platforms that support dynamic flags☆254Updated 2 months ago
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆418Updated last month
- A repository to record my usual studies☆20Updated last year
- 【Hello-CTF labs】一个想帮你收集所有RCE技巧的靶场。☆175Updated 2 weeks ago
- Collections of CTF-WEB-challs mainly for review purpose.☆32Updated last year
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆684Updated 3 years ago
- ☆492Updated 2 years ago
- 专为CTF设计的Jinja2 SSTI全自动绕WAF脚本 | A Jinja2 SSTI cracker for bypassing WAF, designed for CTF☆718Updated this week
- Linux Eelvation(持续更新)☆392Updated 2 years ago
- Challenges of CTF Attack with Defense mode☆193Updated last year
- JNDI 注入利用工具, 支持 RMI, LDAP 和 LDAPS 协议, 包含多种高版本 JDK 绕过方式 | A JNDI injection exploit tool that supports RMI, LDAP and LDAPS protocols, inclu…☆332Updated last month
- javaDeserializeLabs☆63Updated last year
- JDBC Connection URL Attack☆390Updated 3 years ago
- ysoserial修改版,着重修改ysoserial.payloads.util.Gadgets.createTemplatesImpl使其可以通过引入自定义class的形式来执行命令、内存马、反序列化回显。☆633Updated 10 months ago
- CodeQL extractor for java, which don't need to compile java source☆322Updated last year
- Index of CTFHub Base Images☆82Updated 4 years ago
- Java RCE 回显测 试代码☆995Updated 4 years ago
- 记录学习codeql的过程☆363Updated last year
- Redis 4.x/5.x RCE☆528Updated 3 years ago
- A lab to help you learning SSTI☆96Updated last year