A collection of hacking / penetration testing resources to make you better!
-
Updated
Aug 26, 2020
{{ message }}
A collection of hacking / penetration testing resources to make you better!
CTF framework and exploit development library
A curated list of CTF frameworks, libraries, resources and softwares
Course materials for Modern Binary Exploitation by RPISEC
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
GEF - GDB Enhanced Features for exploit devs & reversers
Tl;dr: Use the workaround from https://github.com/pwndbg/pwndbg/pull/322/files only for broken gdb versions
This will help reduce some copy pasted boiler plate code.
Wiki-like CTF write-ups repository, maintained by the community. 2017
Monitor linux processes without root permissions
This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.
Automatic SSRF fuzzer and exploitation tool
Writeups for HacktheBox 'boot2root' machines
China's first CTFTools framework.中国国内首个CTF工具框架,旨在帮助CTFer快速攻克难关
Venom - A Multi-hop Proxy for Penetration Testers
Library consisting of explanation and implementation of all the existing attacks on various Encryption Systems, Digital Signatures, Key Exchange, Authentication methods along with example challenges from CTFs
Add a description, image, and links to the ctf topic page so that developers can more easily learn about it.
To associate your repository with the ctf topic, visit your repo's landing page and select "manage topics."
Describe the bug
When running Ciphey on a base64-encoded file using the
-command-line parameter, Ciphey picks up and decodes the base64-encoded file's contents, and prints the decoded content like normal. When running Ciphey on a base64-encoded file using the-icommand-line parameter, Ciphey finds no results.To Reproduce
Steps to reproduce the behavior: