CCob / PoCLinks
Exploit PoC for CVE's and non CVE's alike
☆22Updated 4 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆33Updated 5 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Updated 5 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- ☆20Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- PoC for CVE-2020-11651☆6Updated 5 years ago
- BlueKeep powershell scanner (based on c# code)☆39Updated 5 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆19Updated 4 years ago
- Apply a filter to the events being reported by windows event logging☆15Updated 4 years ago
- ☆35Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Convert Empire profiles to Apache mod_rewrite scripts☆28Updated 5 years ago
- ☆19Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- ☆15Updated 4 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- Generate Mimikatz Golden Ticket commands with ease!☆51Updated 4 years ago
- CVE-2020-12828 PoC and Analysis.☆29Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Updated 2 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- The project is called GreatSCT (Great Scott). GreatSCT is an open source project to generate application white list bypasses. This tool i…☆29Updated 7 years ago
- ☆24Updated 5 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- Extract all IP of a computer using DCOM without authentication (aka detect network used for administration)☆26Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Apfell implant written in C#.☆8Updated 4 years ago