This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
-
Updated
Dec 30, 2022 - PHP
This is a elborate CTF that involves WordPress explotations and uploading PHP Shell Scripts to gain access to the server!
A complex CTF game that allows us to download & setup a Virtual Machine that we need to crack into and get intel on sensitive data.
Functional version of LFIsuite for python2
All you need is INTERNET, So use this script and have fun with it. This script is only for linux os. THIS IS ONLY FOR EDUCATION PURPOSE
01076629 BASIC PENETRATION TESTING AND ETHICAL HACKING
Midnight is bash script that conducts subdomain enumeration and attack surface mapping and then tests for XSS with payload injection and reflection verification, it also tests for local file inclusion and SQL injection with a comprehensive library of over 300 payloads.
Estudos sobre Cyber Segurança e formas de se proteger e conceitos da Cyber Segurança
executor if jjsploit is down :>
A list of books to learn hacking and master it.
FaAng Toolkit is a ddos tool with the ability to take down websites quickly and easily
tools to use for your hacking endeavors : For educational purposes of course
Hackers Vulnerability Scanning Tool Simplifies your basic RECON work into 1 friendly user interface so you don't have to remember all of the commands!
In-depth explanations for my white-hat finds, bug bounty reports, and vulnerability research. Feel free to contact me for more information.
Cybersecurity, Penetration testing and ethical hacking tools - to be used for educational purposes ONLY. DISCLAIMER: Performing hacking attempts on computers that you do not own (without permission) is illegal!
Add a description, image, and links to the hacking topic page so that developers can more easily learn about it.
To associate your repository with the hacking topic, visit your repo's landing page and select "manage topics."