nvd_feed_api
A simple ruby API/library for managing NVD CVE feeds. The API will help you to download and manage NVD Data Feeds, search for CVEs, build your vulnerability assessment platform or vulnerability database.
nvd_feed_api
A simple ruby API/library for managing NVD CVE feeds. The API will help you to download and manage NVD Data Feeds, search for CVEs, build your vulnerability assessment platform or vulnerability database.
RABID
A CLI tool and library allowing to simply decode all kind of BigIP cookies.
ctf-party
A library to enhance and speed up script/exploit writing for CTF players (or security researchers, bug bounty hunters, pentesters but mostly focused on CTF) by patching the String class to add a short syntax of usual code patterns.
PixelChart
Map binary data into a beautiful chart.
Pass Station
CLI & library to search for default credentials among thousands of Products / Vendors.
TLS map
CLI & library for mapping TLS cipher algorithm names: IANA, OpenSSL, GnuTLS, NSS.
DC Detector
Spot all domain controllers in a Microsoft Active Directory environment. Find computer name, FQDN, and IP address(es) of all DCs.
kh2hc
Convert OpenSSH known_hosts file hashed with HashKnownHosts to hashes crackable by Hashcat.
hivexcavator
Extracting the contents of Microsoft Windows Registry (hive) and display it as a colorful tree but mainly focused on parsing BCD files to extract WIM files path for PXE attacks.
Flask Session Cookie Decoder/Encoder
A simple python script that let you encode and decode a Flask session cookie.
HAITI
Hash type identifier (CLI & lib).
itdis
Is a small tool that allows you to check if a list of domains you have been provided is in the scope of your pentest or not.
VBSmin
VBScript minifier CLI tool and library
vrt-cli
A simple tool to visualize VRT (Vulnerability Rating Taxonomy) from the CLI.
BQM
Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.
miniss
Displays a list of open listening sockets. It is a minimal alternative to ss or netstat to offer a static binary that can be deployed on containers or hardened environnement where the classical binaries have been removed.
unisec
A CLI tool and library to play with Unicode security.
Umbraco RCE
Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
OpenEMR RCE
OpenEMR <= 5.0.1 - (Authenticated) Remote Code Execution
Fuel CMS RCE
Fuel CMS 1.4 - Remote Code Execution
OpenNetAdmin RCE
OpenNetAdmin 8.5.14 <= 18.1.1 - Remote Command Execution
OpenEMR CVE-2019-14530
OpenEMR < 5.0.2 - (Authenticated) Path Traversal - Local File Disclosure
Easy!Appointments CVE-2022-0482
Easy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure
Joomla! CVE-2023-23752
Joomla! < 4.2.8 - Unauthenticated information disclosure
AtMail Exploit toolchain
AtMail Email Server Appliance 6.4 - Exploit toolchain (XSS > CSRF > RCE)
Bludit Auth BF mitigation bypass
Bludit <= 3.9.2 - Authentication Bruteforce Mitigation Bypass
CMSUno RCE
CMSUno 1.6.1 <= 1.6.2 - Remote Code Execution (Authenticated)
Monitorr exploit toolkit
Multiple exploits for Monitorr (unsecure file upload, authorization bypass, technical information leakage)
OpenEMR CVE-2018-15139
OpenEMR < 5.0.1.4 - (Authenticated) File upload - Remote command execution
iTop CVE-2022-24780
iTop < 2.7.6 - (Authenticated) Remote command execution
Kirby XXE CVE-2023-38490
Kirby < 3.9.6 XML External Entity
Offensive Security Exam Report Template in Markdown
Markdown Templates for Offensive Security OSCP, OSWE, OSCE, OSEE, OSWP exam report.
Bug Bounty légal en FRANCE [FR]
Quelques conseils autour des obligations légales, fiscales et juridique pour la pratique du Bug Bounty en France
XSS classification model
XSS classification model - Types of Cross-Site Scripting
ACCEIS Vulnerable Code Snippets
Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.
Bitmap
TheBlackSide challenge: image steganography
Red Stone One Carat
TryHackMe room: First room of the Red Stone series. Hack ruby using ruby.
Men in black box
A web challenge that was available during SigSegV1 CTF (2018). It was a Boolean-based Blind SQLi with WAF.
Fat
A web challenge that was available during SigSegV2 CTF (2019). It was a Slim SSTI combined with a Sinatra/Rack session cookie forgery.
Image Checker 2
A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG combined with a SSRF port scan and a SSRF localhost bypass.
Une porte peut en cacher une autre
A web challenge that was available during SigSegV2 CTF (2019). It was a b374k.php webshell with c99 style PHP backdoor authentication bypass.
The long way
A misc challenge that was available during SigSegV2 CTF (2019). It was a extra long file path on exFAT FS, scripting was mandatory to retrieve the whole path.
Matz 2.3
A reverse challenge that was available during SigSegV2 CTF (2019). Ruby bytecode reverse engineering/disassembly making use of RubyVM class.
ffuf
TryHackMe room: (Walkthrough) Enumeration, fuzzing, and directory brute forcing using ffuf.
Crack The Hash Level 2
TryHackMe room: Advanced cracking hashes challenges and wordlist generation.
Sensory Domination Droid
A programming challenge that was available during SigSegV1 CTF (2018). It was an IRC bot, the goal was to parse private IRC messages.
Image Checker 1
A web challenge that was available during SigSegV2 CTF (2019). It was a XXE OOB via SVG rasterization and a local file read.
10 questions about my system
A forensics challenge that was available during SigSegV2 CTF (2019). It was a Volatility profile creation and 10 basic questions on the memory dump.
noraj secret zone
A web/misc/reverse/network challenge that was available during SigSegV2 CTF (2019). It was an eepsite (I2P website) containing obfuscated JavaScript.
Drugs: crack & hash
A cracking challenge that was available during SigSegV2 CTF (2019). Password hash cracking with custom dictionary/wordlist. There were 10 hashes to crack.