Our PoC for the vulnerable products
☆46Dec 1, 2021Updated 4 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fetching data from system☆11Jun 18, 2017Updated 8 years ago
- ☆64Nov 26, 2021Updated 4 years ago
- CVE-2021-40346 integer overflow enables http smuggling☆32Sep 28, 2021Updated 4 years ago
- GDB functions for debugging and analyzing the PHP heap☆18Feb 3, 2011Updated 15 years ago
- F5 BIG-IP 任意文件读取+远程命令执行RCE☆13Jul 8, 2020Updated 5 years ago
- XSTREAM<=1.4.17漏洞复现(CVE-2021-39141、CVE-2021-39144、CVE-2021-39150)☆62Aug 25, 2021Updated 4 years ago
- Our team's CTF writeups☆11Jan 15, 2020Updated 6 years ago
- PHP binary bugs advisory☆178Jul 30, 2022Updated 3 years ago
- ☆71Oct 31, 2023Updated 2 years ago
- 模拟cobalt strike beacon上线包. Simulation cobalt strike beacon connection packet.☆17Sep 9, 2021Updated 4 years ago
- SMTP Netcat , test SMTP protocol☆105Jan 14, 2022Updated 4 years ago
- ☆14Sep 11, 2019Updated 6 years ago
- 웹 브라우저 취약점 탐지 자동화 프로젝트☆11Jan 8, 2022Updated 4 years ago
- ZKar is a Java serialization protocol analysis tool implement in Go.☆650Feb 15, 2025Updated last year
- My CodeQL queries collection☆99Aug 28, 2023Updated 2 years ago
- ☆22Feb 12, 2022Updated 4 years ago
- ☆349Jan 24, 2023Updated 3 years ago
- Emulates the VirusTotal "vt" YARA module for livehunt rule debugging/testing☆24May 29, 2023Updated 2 years ago
- VMware vCenter 7.0.2.00100 unauth Arbitrary File Read + SSRF + Reflected XSS☆218Dec 1, 2021Updated 4 years ago
- Apache Dubbo Hessian2 CVE-2021-43297 demo☆46Jan 18, 2022Updated 4 years ago
- ☆20Mar 4, 2023Updated 3 years ago
- Articles accumulated by the 360Quake team.☆15Jun 18, 2021Updated 4 years ago
- CodeQL extractor for java, which don't need to compile java source☆348Nov 25, 2022Updated 3 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- A robust Red Team proxy written in Go.☆164Dec 26, 2021Updated 4 years ago
- Pwn stuff.☆1,804May 31, 2022Updated 3 years ago
- An authentication handler for using CredSSP with Python Requests.☆23May 31, 2023Updated 2 years ago
- Java命令行文件监控小工具(代码审计)☆106Nov 29, 2021Updated 4 years ago
- DeJITLeak: Eliminating JIT-Induced Timing Side-Channel Leaks☆15Sep 15, 2022Updated 3 years ago
- Apache Superset Auth Bypass (CVE-2023-27524)☆11May 9, 2023Updated 2 years ago
- Run Swing based GUI application within the Docker container through the Jetbrains Projector, and access it from browsers.☆18Apr 10, 2021Updated 4 years ago
- Detect and bypass Istio sidecar☆21Sep 24, 2021Updated 4 years ago
- 🔎 crx-scouter.js can detect which Chrome extensions we are using quietly.☆147Oct 6, 2023Updated 2 years ago
- ☆34Sep 19, 2022Updated 3 years ago
- Grafana Unauthorized arbitrary file reading vulnerability☆368Feb 14, 2023Updated 3 years ago
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆830Jun 12, 2021Updated 4 years ago
- ☆15Oct 25, 2021Updated 4 years ago
- 构造字节在ASCII范围内的jar☆139Feb 14, 2022Updated 4 years ago
- A extension for collecting parameters☆25Oct 25, 2020Updated 5 years ago