CERTCC / PoC-Exploits
Select proof-of-concept exploits for software vulnerabilities to aid in identifying and testing vulnerable systems.
☆184Updated 9 months ago
Alternatives and similar repositories for PoC-Exploits:
Users that are interested in PoC-Exploits are comparing it to the libraries listed below
- HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Se…☆279Updated 3 years ago
- A denial-of-service proof-of-concept for CVE-2020-1350☆238Updated 4 years ago
- ☆262Updated last year
- This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.☆222Updated 4 years ago
- CVE-2020-0796 Local Privilege Escalation POC☆241Updated 4 years ago
- CVE-2020-1206 Uninitialized Kernel Memory Read POC☆145Updated 4 years ago
- Exploit for CVE-2020-3952 in vCenter 6.7☆271Updated 4 years ago
- Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server …☆104Updated 4 years ago
- SonicWall SSL-VPN Exploit☆174Updated 4 years ago
- Public work for CVE-2019-0708☆290Updated 5 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Updated 5 years ago
- PoC of CVE-2020-16947 (Microsoft Outlook RCE vulnerablility)☆125Updated 4 years ago
- PoC for CVE-2021-28476 a guest-to-host "Hyper-V Remote Code Execution Vulnerability" in vmswitch.sys.☆219Updated 3 years ago
- Security Research☆95Updated 4 years ago
- PrintDemon is a PoC for a series of issues in the Windows Print Spooler service, as well as potetial misuses of the functionality.☆200Updated 4 years ago
- Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.☆176Updated last year
- PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)☆888Updated 5 years ago
- APT34/OILRIG leak☆231Updated 5 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆201Updated last year
- A repository of previous info-sec presentations I've presented.☆159Updated 3 months ago
- A meterpreter extension for applying hooks to avoid windows defender memory scans☆243Updated 4 years ago
- ☆379Updated last year
- A malware analysis and classification tool.☆191Updated 3 years ago
- FudgeC2 - a command and control framework designed for team collaboration and post-exploitation activities.☆249Updated last year
- Zombie Ant Farm: Primitives and Offensive Tooling for Linux EDR evasion.☆224Updated 5 years ago
- Ps-Tools, an advanced process monitoring toolkit for offensive operations☆336Updated 4 years ago
- A from-scratch rewrite of The Backdoor Factory - a MitM tool for inserting shellcode into all types of binaries on the wire.☆371Updated 3 years ago
- A tool that detects the privilege escalation vulnerabilities caused by misconfigurations and missing updates in the Windows operating sys…☆489Updated 4 years ago
- ☆332Updated 2 years ago
- ☆196Updated 4 months ago