Writeup of a remote code execution in Factorio by supplying a modified save file.
☆89Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for writeup_factorio
Users that are interested in writeup_factorio are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scan websites CSP policies and visualise their vunlnerabilities from a dashboard☆13Mar 11, 2025Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Oct 12, 2024Updated last year
- LogSnare: A playground for testing, preventing, and logging IDOR vulnerabilities.☆33Mar 4, 2024Updated 2 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Jul 21, 2024Updated last year
- Bypass Reset Password Code Lead to Account Takeover☆26Sep 16, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆26Nov 2, 2025Updated 5 months ago
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆52Mar 7, 2025Updated last year
- Identify binaries with Authenticode digital signatures signed to an internal CA/domain☆40Feb 6, 2024Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆54Dec 2, 2023Updated 2 years ago
- Tool for analyzing SAP Secure Network Communications (SNC).☆60Apr 16, 2024Updated 2 years ago
- PoC script to demonstrate collection of SCCM attack paths that can be viewed in BH with OpenGraph☆24Aug 2, 2025Updated 8 months ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated 2 years ago
- A BrainF*ck Inspired Shell Obfuscation Proof-of-Concept☆16Mar 11, 2024Updated 2 years ago
- Fork from https://github.com/joxeankoret/mynav, works with IDA 7.0☆12Jan 24, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- 一个用于修改右键插件菜单层级的Burpsuite插件。A simple BurpSuite extension to change extension context menu level.☆14Jan 15, 2024Updated 2 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- A smattering of header files dumped using classdump-dyld☆14Apr 28, 2021Updated 4 years ago
- ☆47May 31, 2024Updated last year
- A Decimal128 IEEE 754 2008 number library for the Nim programming language.☆25Jun 23, 2021Updated 4 years ago
- A simple rpc2socks alternative in pure Go.☆31Jul 8, 2024Updated last year
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service, versions and C…☆17Mar 29, 2026Updated 3 weeks ago
- Watches the Downloads folder for any new files and inserts it into Nemesis for analysis.☆15Feb 29, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Send arp packet using rust libpnet☆10Apr 24, 2017Updated 8 years ago
- ☆19Jan 21, 2026Updated 2 months ago
- CVE-2024-24576 Proof of Concept☆20Apr 10, 2024Updated 2 years ago
- Exploit for CVE-2024-3273, supports single and multiple hosts☆13Apr 7, 2024Updated 2 years ago
- Scan strings or files for malware using the Windows Antimalware Scan Interface☆30Mar 24, 2023Updated 3 years ago
- ALPChecker - a tool to detect spoofing and blinding attacks on the ALPC interaction☆13Feb 13, 2023Updated 3 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- information about ransomware groups (Ransomware Analysis Notes)☆41Dec 26, 2023Updated 2 years ago
- penetration testing utilities☆10Mar 30, 2021Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A PoC code for JSON Smuggling technique to smuggle arbitrary files through JSON☆114Mar 27, 2024Updated 2 years ago
- POC for CVE-2024-40348. Will attempt to read /etc/passwd from target☆32Jul 21, 2024Updated last year
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- Research on the Lenovo BIOS firmware.☆14Feb 28, 2021Updated 5 years ago
- A tool to download program information from Bugcrowd, for use by researchers to compare programs they are eligible to participate in☆21Dec 22, 2022Updated 3 years ago
- Exploit tool for CVE-2023-4911, targeting the 'Looney Tunables' glibc vulnerability in various Linux distributions.☆42Oct 18, 2023Updated 2 years ago