xiosec / CTF-writeups
Writeup Challenges I have solved in CTF competitions
☆24Updated 2 years ago
Alternatives and similar repositories for CTF-writeups:
Users that are interested in CTF-writeups are comparing it to the libraries listed below
- Transition form local file inclusion attacks to remote code exection☆58Updated 4 years ago
- ☆36Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 10 months ago
- ☆41Updated 3 years ago
- XSS Bypass☆29Updated last year
- You don't need wires to be connected☆40Updated 5 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆78Updated last year
- PHP 8.1.0-dev Backdoor System Shell Script☆91Updated 3 years ago
- Write-ups / walkthroughs of 'boot to root' Capture The Flag (CTF) challenges☆44Updated 2 years ago
- Active Directory Wordlists☆94Updated 4 years ago
- A wordlist repository with human-curated and reviewed content.☆104Updated last year
- ☆66Updated 3 years ago
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- ☆75Updated 9 months ago
- ☆48Updated 10 months ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆40Updated 4 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆25Updated 9 months ago
- SSTI Payload Generator☆89Updated 2 years ago
- Offensive Security Web Assessor Resources Repo☆23Updated last year
- Bad scripts I made doing CTF's☆21Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆63Updated 2 months ago
- Repository of my CTF writeups☆59Updated 4 months ago
- This is my personal Enumeration Handbook that I used for the OSCP 2023☆22Updated last year
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆150Updated last year
- Here Are Some Bug Bounty Resource From Twitter☆90Updated 2 months ago
- Collection of username lists for enumerating kerberos domain users☆91Updated 7 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆82Updated last year
- HTTP parameter discovery suite.☆61Updated 4 years ago
- Create a list of possible usernames for bruteforcing☆64Updated last year