Our team's CTF writeups
☆11Jan 15, 2020Updated 6 years ago
Alternatives and similar repositories for excusemewtf
Users that are interested in excusemewtf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Wordpress Plugins List☆24Jun 17, 2019Updated 6 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆33May 2, 2019Updated 6 years ago
- Offensive go lang series☆34May 2, 2020Updated 5 years ago
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.☆16Jul 18, 2022Updated 3 years ago
- Extract data of TTD trace file to a minidump☆30Jul 31, 2023Updated 2 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ☆63May 31, 2024Updated last year
- Our PoC for the vulnerable products☆46Dec 1, 2021Updated 4 years ago
- A boilerplate for developing, testing and deploying smart contracts using Hardhat and Ethers.js☆18Aug 31, 2022Updated 3 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Shade Sanctuary, a theme designed for Obsidian MD☆17Aug 12, 2024Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆321May 14, 2023Updated 2 years ago
- ☆36Jan 22, 2025Updated last year
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 3 weeks ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 7 months ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Oct 21, 2020Updated 5 years ago
- Just some Rust process injector POCs, nothing weird.☆78Mar 6, 2022Updated 4 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Encrypt C functions☆41Jun 17, 2023Updated 2 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- some useful scripts to solve pwn challenges in ctfs☆13Dec 29, 2020Updated 5 years ago
- Resources from my journey into Windows binary exploitation☆24Jan 14, 2019Updated 7 years ago
- An injector that use PT_LOAD technique☆12Nov 27, 2022Updated 3 years ago
- ☆16Dec 28, 2016Updated 9 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- ☆11Nov 21, 2020Updated 5 years ago
- VTSPS2-HBDL HomeBrew Downloader☆22Dec 28, 2023Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆30Feb 13, 2026Updated last month