Matir / Pwnableweb
Licence: apache-2.0
PwnableWeb is a suite of web applications for use in information security training.
Stars: ✭ 81
Programming Languages
python
139335 projects - #7 most used programming language
Labels
Projects that are alternatives of or similar to Pwnableweb
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1224.69%)
Mutual labels: ctf
Owasp Workshop Android Pentest
Learning Penetration Testing of Android Applications
Stars: ✭ 60 (-25.93%)
Mutual labels: ctf
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-16.05%)
Mutual labels: ctf
Binary Exploitation
Good to know, easy to forget information about binaries and their exploitation!
Stars: ✭ 47 (-41.98%)
Mutual labels: ctf
Nullctf
A Discord bot that provides ctf tools for collaboration in Discord servers!
Stars: ✭ 78 (-3.7%)
Mutual labels: ctf
Oscp Ctf
oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or playing around with CTFs.
Stars: ✭ 62 (-23.46%)
Mutual labels: ctf
Libc Database
Build a database of libc offsets to simplify exploitation
Stars: ✭ 1,122 (+1285.19%)
Mutual labels: ctf
Ctfsubmitter
A flag submitter service with distributed attackers for attack/defense CTF games.
Stars: ✭ 56 (-30.86%)
Mutual labels: ctf
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-34.57%)
Mutual labels: ctf
Solved Hacking Problem
✔️ CTF problems and solutions solved by Qwaz
Stars: ✭ 67 (-17.28%)
Mutual labels: ctf
Pwn Sandbox
A sandbox to protect your pwn challenges being pwned in CTF AWD.
Stars: ✭ 81 (+0%)
Mutual labels: ctf
Hackthebox Writeups
Writeups for HacktheBox 'boot2root' machines
Stars: ✭ 1,221 (+1407.41%)
Mutual labels: ctf
Ctf
CTF write-ups by PDKT team with English and Indonesian language
Stars: ✭ 68 (-16.05%)
Mutual labels: ctf
PwnableWeb is a suite of web applications for use in information security training, capture the flag competitions, and other computer security purposes.
Author: David Tomaschik [email protected]
Note that the project description data, including the texts, logos, images, and/or trademarks,
for each open source project belongs to its rightful owner.
If you wish to add or remove any projects, please contact us at [email protected].