wupco / PHP_INCLUDE_TO_SHELL_CHAR_DICTLinks
☆348Updated 2 years ago
Alternatives and similar repositories for PHP_INCLUDE_TO_SHELL_CHAR_DICT
Users that are interested in PHP_INCLUDE_TO_SHELL_CHAR_DICT are comparing it to the libraries listed below
Sorting:
- dotnet 反序列化学习笔记☆511Updated 2 years ago
- Automatically converts Python source code to Pickle opcode☆158Updated 11 months ago
- A plugin for CTFd which allow your users to deploy a standalone instance for challenges.☆241Updated last year
- Collections of CTF-WEB-challs mainly for review purpose.☆30Updated 2 years ago
- CTF中任意文件读取的fuzz列表 (Arbitrary file read fuzz list in CTF)☆274Updated 3 years ago
- 自动化的 Python 沙箱逃逸 payload bypass 框架 / Automated Python Sandbox Escape Payload Bypass Framework☆98Updated 11 months ago
- 关于我在CTF中的所有东西☆416Updated 2 months ago
- A CLI to exploit parameters vulnerable to PHP filter chain error based oracle.☆323Updated last year
- ☆159Updated last year
- JDBC Connection URL Attack☆435Updated 4 years ago
- exec BashCommand with only ! # $ ' ( ) < \ { } just 10 charset used in Bypass or CTF☆255Updated last year
- CodeQL extractor for java, which don't need to compile java source☆347Updated 3 years ago
- spring boot Fat Jar 任意写文件漏洞到稳定 RCE 利用技巧☆747Updated 4 years ago
- 80+ Gadgets(30 More than ysoserial). JNDI-Injection-Exploit-Plus is a tool for generating workable JNDI links and provide background serv…☆856Updated last year
- A tiny project for generating SnakeYAML deserialization payloads☆622Updated last month
- ZKar is a Java serialization protocol analysis tool implement in Go.☆630Updated 9 months ago
- javaDeserializeLabs☆70Updated 2 years ago
- A rouge mysql server supports reading files from most mysql libraries of multiple programming languages.☆745Updated 3 years ago
- CTFd plugin that allows your users to have exclusive environments for each challenge, with dynamic flags.☆162Updated 10 months ago
- docker container escape check || Docker 容器逃逸检测☆645Updated 3 years ago
- Linux Eelvation(持续更新)☆406Updated 3 years ago
- A lab to help you learning SSTI☆117Updated 2 years ago
- ysoserial修改版,着重修改ysoserial.payloads.util.Gadgets.createTemplatesImpl使其可以通过引入自定义class的形式来执行命令、内存马、反序列化回显。☆747Updated last year
- Exploits for CNEXT (CVE-2024-2961), a buffer overflow in the glibc's iconv()☆497Updated last year
- ☆519Updated 3 years ago
- 记录学习codeql的过程☆389Updated 2 years ago
- 闭源系统半自动漏洞挖掘工具,针对 jar/war/zip 进行静态代码分析,输出从source到sink的可达路径。LLM将验证路径可达性,并根据上下文给出该路径可信分数☆484Updated 5 months ago
- ☆20Updated 5 years ago
- ☆105Updated 2 weeks ago
- Index of CTFHub Base Images☆83Updated 5 years ago