Archive Mirror for recently republished PoC/Exploit code
☆17Nov 26, 2017Updated 8 years ago
Alternatives and similar repositories for PoC-Exploit-Mirror
Users that are interested in PoC-Exploit-Mirror are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ☆16Mar 31, 2017Updated 9 years ago
- ☆15Dec 22, 2015Updated 10 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 9 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆40Dec 29, 2017Updated 8 years ago
- AI reverse engineering assistant for x64dbg. Embeds a chat panel directly in the debugger with tool-use capabilities.☆46Mar 19, 2026Updated 3 weeks ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- macOS Class Tree☆21Oct 17, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- Synthesizing Framework Models for Symbolic Execution☆15Sep 15, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 8 months ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- defender_database☆25Oct 31, 2023Updated 2 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆17Oct 5, 2020Updated 5 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 9 years ago
- Offline Active Directory Domain Services (AD DS) Join☆12Jan 4, 2017Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆81Jun 30, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 9 years ago
- Cowrie SSH/Telnet Honeypot☆12Sep 3, 2018Updated 7 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- This repository contains the slides and content for the malware unpacking training given at r2con 2017☆51Apr 23, 2018Updated 7 years ago
- Detect silent (unwanted) changes to files on your system☆162May 4, 2020Updated 5 years ago