zdresearch / OWASP-ZSC-API
OWASP ZSC API http://api.z3r0d4y.com/v2
☆9Updated 8 years ago
Alternatives and similar repositories for OWASP-ZSC-API:
Users that are interested in OWASP-ZSC-API are comparing it to the libraries listed below
- Collection of somewhat useful stuff for CTF events☆36Updated 9 years ago
- Memory awesomeness.☆29Updated 10 years ago
- RECon 2017 IDA skin & color scheme☆28Updated 7 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆24Updated 9 years ago
- A collection of vulnerable web applications in Node.js to practice security fundamentals☆13Updated 8 years ago
- A better SSL cipher checker using gnutls☆28Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Updated 7 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Updated 7 years ago
- IDA plugin for software reverse-engineering and visualization.☆7Updated 9 years ago
- ☆15Updated 2 years ago
- Catfish is a tool used ease the process of finding ROP gadgets and creating payloads with them.☆30Updated 10 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 8 years ago
- Reverse Engineering and Exploit Development stuff☆31Updated 7 years ago
- Network and USB protocol fuzzing toolkit.☆35Updated 7 years ago
- Customizable lazy exploit pattern utility.☆13Updated 2 years ago
- CVE-2017-5005 for Quick Heal Antivirus☆15Updated 8 years ago
- ☆36Updated 12 years ago
- Here are my writeups about various reverse engineering and exploitation problems, mostly on unix/linux and using open source tools☆39Updated 8 years ago
- ☆50Updated 7 years ago
- Write Up I write for different CTFs☆12Updated 7 years ago
- CryptoGuy is a tool usefull to find out various decryptions of a string☆25Updated 10 years ago
- LLDB engine based tool to instrument OSX apps and triage crashes☆27Updated 8 years ago
- Practice and learning in the world of C RE and exploit analysis☆32Updated 7 years ago
- Writeups for PicoCTF2017 Challenges☆10Updated 7 years ago
- A simple python script to dump data from memcached servers.☆11Updated 10 years ago
- ctf101 systems security repository☆25Updated 3 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago