Proof of Concepts of vulnerabilities discovered by me
☆11Jan 24, 2024Updated 2 years ago
Alternatives and similar repositories for PoC-CVEs
Users that are interested in PoC-CVEs are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆15Dec 27, 2020Updated 5 years ago
- ☆13Jan 27, 2024Updated 2 years ago
- Use the Edge Diagnostics CLI to identify, analyze, and troubleshoot common content delivery network issues that your users may encounter.☆14Oct 12, 2022Updated 3 years ago
- ☆13Dec 29, 2022Updated 3 years ago
- This is a crash for Brave Browser I found in New Years Eve, used to be a 0day when I found it☆18Feb 2, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Bring your own Unwind Data Framework☆105Mar 15, 2026Updated last week
- A C-based checksec without readelf or grep dependance.☆11Apr 20, 2021Updated 4 years ago
- Script to query APIC for faults and summarize corrective actions based on fault documentation on APIC☆10Oct 29, 2014Updated 11 years ago
- Proof of concept - Covert Channel using Windows Filtering Platform (C#)☆21Aug 29, 2021Updated 4 years ago
- ☆16Sep 20, 2023Updated 2 years ago
- ☆11Apr 25, 2024Updated last year
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 4 years ago
- Wingkalabs (Linux) Wingkalabs es una máquina Virtual Linux intencionalmente vulnerable. Esta máquina virtual se puede utilizar para real…☆22Mar 14, 2018Updated 8 years ago
- ☆13Mar 27, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- PowerShell Empire mod to post-exploit the World! Linux, MacOS, Windows.☆13Jun 18, 2019Updated 6 years ago
- A python script file to forensically examine Microsoft Windows memory-dump files - It can pull usernames, password hashes, extract .pcap …☆10Apr 23, 2021Updated 4 years ago
- ELEGOO Conqueror Robot Tank Kit☆20Mar 9, 2021Updated 5 years ago
- Simple and full-featured mail server using Docker☆15Aug 15, 2019Updated 6 years ago
- PoCs of (outdated) privilege escalation vulnerability☆12Dec 31, 2024Updated last year
- ☆16May 13, 2023Updated 2 years ago
- Presentaciones de congresos☆55Jun 21, 2024Updated last year
- ☆11Mar 7, 2021Updated 5 years ago
- Python 3 - Manipulation and conversation with different data type (Bytes operations)☆28Feb 15, 2022Updated 4 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Create your own powershell, malware desktop app or even clickjacking web with a single command for unix and windows systems.☆17May 26, 2019Updated 6 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- Continues Recon on Public Bug Bounty Program☆16Jun 19, 2024Updated last year
- Magento 2.4.x Docker Environment☆17Jan 25, 2026Updated 2 months ago
- BloodCheck enables Red and Blue Teams to manage multiple Neo4j databases and run Cypher queries against a BloodHound dataset.☆17Jun 20, 2021Updated 4 years ago
- ...☆10Feb 16, 2015Updated 11 years ago
- A DC power monitor and data logger☆23Mar 26, 2021Updated 5 years ago
- Veeam Enterprise Manager Exporter for Prometheus☆15May 3, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A python script file to forensically examine remote computer networks - It can analyse smb and ldap active directory systems, start phis…☆16Jan 18, 2026Updated 2 months ago
- ☆17Aug 30, 2020Updated 5 years ago
- ☆22Mar 5, 2018Updated 8 years ago
- Competition Management System for the GovHack Hackathon☆23Sep 3, 2025Updated 6 months ago
- A Semantics-Enhanced Learnable Vulnerability Detector☆44Jun 29, 2022Updated 3 years ago
- Practical fuzzing tutorials and training☆32Jul 15, 2024Updated last year
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Apr 20, 2024Updated last year