Weeke

User: Bailey Dunlap Skills: C++, Python, MalDev Certifications: Bio : Passionate coder & security enthusiast.
Write-ups
Title | Category | Date |
---|---|---|
Spawn CMD in memory and execute batch code | Exploitation | Apr 2025 |
Auto start up using NT Functions | Exploitation | Apr 2025 |
NtDll UnHooking | Technique | Apr 2025 |
Windows 10 UAC Bypass | Technique | Apr 2025 |
Blog
- Hello Hacker World (Apr 2025)
- Rust Adventures (Mar 2025)
Code Snippets
import scrapy
from urllib.parse import urljoin
class FormEnumeratorSpider(scrapy.Spider):
name = "form_enum"
allowed_domains = ["example.com"] # change to your target domain
start_urls = ["https://example.com/"] # entry point
custom_settings = {
'ROBOTSTXT_OBEY': False, # ignore robots.txt
'DOWNLOAD_DELAY': 0.5, # be polite-ish
'CONCURRENT_REQUESTS': 8,
'USER_AGENT': 'Mozilla/5.0 (X11; Linux x86_64) Scrapy/1.8 (+https://scrapy.org)'
}
def parse(self, response):
# Extract and follow all internal links
for href in response.css('a::attr(href)').getall():
url = urljoin(response.url, href)
if self.allowed_domains[0] in url:
yield scrapy.Request(url, callback=self.parse_forms)
def parse_forms(self, response):
# On each page, find
Projects
- WordPress Vulnerability Scanner – WordPress Vulnerability Scanner (Python)
- PHP Static Analysis Tool – PHP Static Analysis Tool(Python)
- MemoryMapper – Memory Functions to ASM Dumper (C++)
Contact
Email: weeke@weeke.xyz
GitHub: github.com/bdunlap9
Twitter: @TheRealWeeke