Archive Mirror for recently republished PoC/Exploit code
☆17Nov 26, 2017Updated 8 years ago
Alternatives and similar repositories for PoC-Exploit-Mirror
Users that are interested in PoC-Exploit-Mirror are comparing it to the libraries listed below
Sorting:
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- ☆21Jul 26, 2017Updated 8 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆40Jul 29, 2025Updated 7 months ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 6 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago
- My KVM breakout code from my DEFCON/Black Hat 2011 presentation☆35Apr 9, 2014Updated 11 years ago
- ☆22Apr 17, 2017Updated 8 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- Attack-Defend CTF Tools☆23Oct 30, 2016Updated 9 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Sep 13, 2016Updated 9 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- macOS Class Tree☆21Oct 17, 2017Updated 8 years ago
- Writeup for BKP 2017 challenge "SIDH-RSA-AES128-GCM-SHA256"☆26Feb 27, 2017Updated 9 years ago
- Exploits used on hacking CTF's☆28Sep 16, 2019Updated 6 years ago
- This is a small and simple toolkit that might be useful during steganalysis, it is currently composed by several general purpose command …☆33Jun 12, 2020Updated 5 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Information Security News☆62Dec 27, 2023Updated 2 years ago
- Collection of IOCs related to targeting of civil society☆189Nov 11, 2021Updated 4 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- The Swiss army knife of byte manipulation☆43Oct 9, 2016Updated 9 years ago
- Modular tool to test exfiltration techniques.☆37Apr 27, 2017Updated 8 years ago
- Example implementations of PEP 578 and 551 entry points☆35May 12, 2025Updated 9 months ago
- Just a collection of scripts☆40Apr 15, 2020Updated 5 years ago
- Script to generate malicious debian packages (debain trojans).☆120Apr 24, 2019Updated 6 years ago