Our team's CTF writeups
☆11Jan 15, 2020Updated 6 years ago
Alternatives and similar repositories for excusemewtf
Users that are interested in excusemewtf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- A tool for automated analysis of ctf type crypto challenges☆28Mar 3, 2020Updated 6 years ago
- Reverse Shell troll software☆12Sep 24, 2019Updated 6 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- dnpatch script engine stand alone☆16Jan 1, 2017Updated 9 years ago
- Wordpress Plugins List☆26Jun 17, 2019Updated 6 years ago
- Modular reverse shell server with a Discord frontend and example payloads☆28May 5, 2020Updated 6 years ago
- A steganography based shellcode hider to bypass AV☆17Aug 7, 2022Updated 3 years ago
- An authentication handler for using CredSSP with Python Requests.☆23May 31, 2023Updated 2 years ago
- Chakra Type Confusions - PoCs of Edge's legacy JS engine vulnerabilities that inject code into the JIT process☆16Mar 26, 2024Updated 2 years ago
- CTF challenges that I created☆19Dec 26, 2021Updated 4 years ago
- Symbolic execution inspired PHP application scanner for code-path discovery☆34May 2, 2019Updated 7 years ago
- Offensive go lang series☆34May 2, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Notes for Assembly language☆15Jul 28, 2020Updated 5 years ago
- ☆11Nov 6, 2020Updated 5 years ago
- ☆13Oct 10, 2018Updated 7 years ago
- Extract data of TTD trace file to a minidump☆30Jul 31, 2023Updated 2 years ago
- ☆11Nov 25, 2020Updated 5 years ago
- ☆63May 31, 2024Updated last year
- Our PoC for the vulnerable products☆46Dec 1, 2021Updated 4 years ago
- Partially offline multi-language translator built upon Huggingface transformers.☆16Sep 12, 2022Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Zippo is a archive payload generator for testing XSS, (Zip/Tar/Gzip) slip vulnerabilities.☆25Feb 26, 2021Updated 5 years ago
- Recon scripts for Red Team and Web blackbox auditing☆25Mar 3, 2026Updated 2 months ago
- Something I made in a lot of days just for fun (why not?)☆10Mar 13, 2018Updated 8 years ago
- A repository for my conference presentations☆35Feb 18, 2020Updated 6 years ago
- Shade Sanctuary, a theme designed for Obsidian MD☆19Aug 12, 2024Updated last year
- Automatic exploit generation for simple linux pwn challenges.☆320May 14, 2023Updated 2 years ago
- ☆36Jan 22, 2025Updated last year
- ☆27Mar 27, 2024Updated 2 years ago
- RACoN - RTI abstraction component for MS.NET (RACoN)☆14Nov 17, 2023Updated 2 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- CNVD-2021-10543:MessageSolution 企业邮件归档管理系统 EEA 存在信息泄露漏洞☆13Mar 28, 2021Updated 5 years ago
- Converts C programs that only use syscalls to 64 bit assembly file.☆12Mar 7, 2021Updated 5 years ago
- Python code to Serialize and Unserialize java binary serialization format.☆29Feb 27, 2026Updated 2 months ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Jun 9, 2020Updated 5 years ago
- TP-Link TL-WR1043ND - Authenticated Remote Code Execution☆16Jul 29, 2025Updated 9 months ago
- Just some Rust process injector POCs, nothing weird.☆77Mar 6, 2022Updated 4 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆192Oct 21, 2020Updated 5 years ago