AlmondOffSec / PoCsLinks
Proof-of-concept code for various bugs
☆110Updated last year
Alternatives and similar repositories for PoCs
Users that are interested in PoCs are comparing it to the libraries listed below
Sorting:
- Proof of concept exploit of Windows Update Orchestrator Service Elevation of Privilege Vulnerability☆125Updated 5 years ago
- Weaponizing for Arbitrary Files/Directories Delete bugs to Get NT AUTHORITY\SYSTEM☆123Updated 5 years ago
- POC for NetworkService PrivEsc☆126Updated 5 years ago
- Cisco AnyConnect < 4.8.02042 privilege escalation through path traversal☆106Updated 5 years ago
- ☆52Updated 4 years ago
- ☆38Updated 5 years ago
- PoC exploits for CVE-2020-17382☆115Updated 5 years ago
- ☆71Updated 4 years ago
- CVE-2019-0708 (BlueKeep)☆109Updated 5 years ago
- poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)☆171Updated 5 years ago
- Yet another LSASS dumper☆74Updated 4 years ago
- juicypotato for win10 > 1803 & win server 2019☆97Updated 4 years ago
- Windows 10 Privilege Escalation (magnifier.exe) via Dll Search Order Hijacking☆142Updated 5 years ago
- Bypassing NTFS permissions to read any files as unprivileged user.☆190Updated 5 years ago
- Binary to shellcode from an object/executable format 32 & 64-bit PE , ELF☆74Updated 4 years ago
- Poc for CVE-2019-1253☆155Updated 3 years ago
- This is a group of tools that I was planning on releasing During Derbycon 2019 talk if it was accepted or with a blogpost if not.☆43Updated 4 years ago
- CVE-2020-1337 Windows Print Spooler Privilege Escalation☆152Updated last year
- Loads a custom dll in system32 via diaghub.☆81Updated 5 years ago
- named pipe server with impersonation☆60Updated 6 years ago
- Windows Stagers to circumvent restrictive network environments☆67Updated last year
- A sort of simple shell which support multiple protocols.☆100Updated 6 years ago
- C# Shellcode Runner to execute shellcode via CreateRemoteThread and SetThreadContext to evade Get-InjectedThread☆118Updated 6 years ago
- Standalone version of my AES Powershell payload for Cobalt Strike.☆111Updated 5 years ago
- Scans for .NET Deserialization Bugs in .NET Assemblies☆79Updated last year
- (kinda) Malicious Outlook Reader☆136Updated 4 years ago
- POC for Cobalt Strike external C2☆141Updated 4 years ago
- A collection of scripts for dealing with Cobalt Strike beacons in Python☆169Updated 4 years ago
- C# PoC implementation for bypassing AMSI via in memory patching☆65Updated 5 years ago
- 64bit Windows 10 shellcode that injects all processes with Meterpreter reverse shells.☆132Updated 2 years ago