This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
-
Updated
Jun 15, 2024 - HTML
This repository contains writeups for various CTFs I've participated in (Including Hack The Box).
Daily archiver & triage issue creator for new releases of CISA's Known Exploited Vulnerabilities list
Gather and update all available and newest CVEs with their PoC.
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
An exploit for Safari 17.4 and lower that enables fingerprinting Safari users using OffscreenCanvas and SharedWorkers even if fingerprinting protections are enabled.
PatrOwl - Open Source, Smart and Scalable Security Operations Orchestration Platform
Some simple charts for listing CVSS by version for various packages.
A deliberately vulnerable website used to showcase Dastardly from Burp Suite
📧 [Research] E-Mail Injection: Vulnerable applications
Repository for information about 0-days exploited in-the-wild.
record some ctf challenges and security research
A Web Vulnerability Scanner and Patcher
Hi!, this is my blog where I will post all my notes about my everyday learning, thanks for being here.
Examples of different vulnerabilities, in a variety of languages, shapes and sizes.
A vulnerable version of Rails that follows the OWASP Top 10
📑 Snyk API powered licenses attribution report tool. Generate licenses information per Snyk Organization with license name, text, dependencies data and copyright information
The OWASP NodeGoat project provides an environment to learn how OWASP Top 10 security risks apply to web applications developed using Node.js and how to effectively address them.
Constraint-based model vulnerabilities analysis - Python analysis tool http://contrabass.unizar.es
In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we can get partial private key values and restore a Bitcoin Wallet within 5-15 minutes using “Sagemath pollard rho function: (discrete_log_rho)” and “ Chinese Remainder Theorem” .
Add a description, image, and links to the vulnerabilities topic page so that developers can more easily learn about it.
To associate your repository with the vulnerabilities topic, visit your repo's landing page and select "manage topics."