Exploit PoC for CVE's and non CVE's alike
☆22Jul 24, 2020Updated 5 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- ☆13Jul 14, 2020Updated 5 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Change up a binary's embedded resources with this little creature.☆36Mar 24, 2020Updated 5 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 6 years ago
- Wordlist to get files/ folders listed by the app that may expose passwords, sensitive file or folders☆22Jul 10, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- 复现Django漏洞时的部分环境,推荐使用virtualenv还原部分漏洞☆12May 18, 2017Updated 8 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- CVE-2020-12828 PoC and Analysis.☆28Jun 30, 2020Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Jun 2, 2016Updated 9 years ago
- Redis Security Map - Anti-hacking for Redis☆31Mar 11, 2022Updated 3 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33May 3, 2024Updated last year
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Probe Zero project - see Ndh2K16☆13Jul 3, 2016Updated 9 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- ☆34Apr 18, 2020Updated 5 years ago
- ☆52Oct 17, 2019Updated 6 years ago
- Proof of calc for CVE-2019-6453☆50Jan 1, 2024Updated 2 years ago
- This is a writeup for CVE-2020-11107 reported by Maximilian Barz☆32Apr 3, 2020Updated 5 years ago
- PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)☆89Jun 2, 2020Updated 5 years ago
- ☆99Feb 16, 2021Updated 5 years ago
- ☆63Sep 10, 2019Updated 6 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆17Jul 2, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- ☆15Oct 1, 2020Updated 5 years ago
- Linux AV tests☆13Apr 23, 2019Updated 6 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆97May 12, 2018Updated 7 years ago
- A Cobalt Strike Aggressor script to generate GadgetToJScript payloads☆101Sep 30, 2020Updated 5 years ago
- a python tool used to scan for Open redirection vulnerability☆20Dec 29, 2017Updated 8 years ago
- Proof of concept for CVE-2020-15257 in containerd.☆18Jan 12, 2021Updated 5 years ago
- Impacket is a collection of Python classes for working with network protocols.☆17Feb 3, 2026Updated 3 weeks ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A lexer and parser for Sleep☆20Feb 20, 2026Updated last week
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Feb 24, 2019Updated 7 years ago