Archive Mirror for recently republished PoC/Exploit code
☆17Nov 26, 2017Updated 8 years ago
Alternatives and similar repositories for PoC-Exploit-Mirror
Users that are interested in PoC-Exploit-Mirror are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ruby - pwn tools☆11Nov 7, 2015Updated 10 years ago
- ☆16Mar 31, 2017Updated 8 years ago
- A simple 2-field fuzzer for the telnet protocol☆11Apr 4, 2017Updated 8 years ago
- Modified edition of cuckoo☆18Feb 14, 2018Updated 8 years ago
- CVE-2013-6282 exploit☆27Nov 18, 2013Updated 12 years ago
- ☆40Dec 29, 2017Updated 8 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Nov 14, 2017Updated 8 years ago
- IDA IDC script to improve Objective-C disassembly output☆21Aug 30, 2012Updated 13 years ago
- Usefull snippets / Computer-security oriented☆20Apr 20, 2017Updated 8 years ago
- Cross-Qt compatibility module for IDAPython.☆13Oct 2, 2019Updated 6 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Nov 26, 2017Updated 8 years ago
- Basic Auth Phish page☆25Sep 11, 2017Updated 8 years ago
- ☆21Jul 26, 2017Updated 8 years ago
- CVE-2017-8570 Exploit☆21Aug 14, 2017Updated 8 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Dynamic Symbolic Execution of Android Apps☆24Jan 16, 2016Updated 10 years ago
- Fuzzing Harness and Unpatched Crash Results from Fuzzing Defender MpEngine☆42Jul 29, 2025Updated 7 months ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- ~ BannerGrab☆25Oct 28, 2016Updated 9 years ago
- A tool to cluster similar executables (PEs, DEXs, and etc), extract common signature, and generate Yara patterns for malware detection.☆26Jan 5, 2019Updated 7 years ago
- Search a domain on VirusTotal to identify if any known malware samples have ever attempted to communicate with it☆10Jan 25, 2016Updated 10 years ago
- Proof-of-Concept scripts for various issues.☆14Jan 23, 2017Updated 9 years ago
- Scapy hands-on at #GreHack16☆16Nov 19, 2016Updated 9 years ago
- black hat Asia 2017 Slides☆22Mar 30, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- CRITs - Collaborative Research Into Threats☆21Mar 13, 2019Updated 7 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- Low-level HTTP/2 client implementation for experimenting with the protocol.☆11Jul 26, 2020Updated 5 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- My CTF writeup☆26Mar 20, 2017Updated 9 years ago
- Threat Intel and Incident Reponse☆10Aug 29, 2018Updated 7 years ago
- Patches iTunes 12+ to fix some issues restoring Custom Firmwares and Using Certain Jailbreak tools☆11Nov 23, 2017Updated 8 years ago
- Terminal Ip Lookup Tool☆56May 16, 2014Updated 11 years ago
- Citrix Apps and Desktop - Session Module☆10May 13, 2022Updated 3 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago