Proof of Concepts, Exploits
☆28Apr 8, 2025Updated 11 months ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- write-what-where plus heap address leaking in OMX☆36Dec 8, 2015Updated 10 years ago
- ☆12Sep 2, 2017Updated 8 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- Update Readonly Properties☆10Aug 14, 2018Updated 7 years ago
- Configurable, flexible regex-based APK modification tool.☆37Jun 26, 2017Updated 8 years ago
- A homescreen widget to toggle USB debugging on/off☆22Oct 30, 2015Updated 10 years ago
- simg2img tool for allwinner a10 android☆23Jul 1, 2012Updated 13 years ago
- CTF Writeups☆16Jul 18, 2017Updated 8 years ago
- Try various exploits to get root☆19Nov 14, 2013Updated 12 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- Kerang is a Another Webshell Backdoor, For Educational Purposes!☆15Oct 31, 2017Updated 8 years ago
- This module helps you get started with basic Zigbee analysis, and later on performing additional attacks on the Zigbee protocol.☆13Nov 23, 2016Updated 9 years ago
- A QEMU based framework for instrumenting x86 programs from Python☆17Oct 5, 2020Updated 5 years ago
- POC for CVE-2015-6620, AMessage unmarshal arbitrary write☆38Dec 16, 2015Updated 10 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- Simple framework to extract "actionable" data from Android malware (C&Cs, phone numbers etc.)☆112May 7, 2015Updated 10 years ago
- Python script to parse Objective-C header files from iOS applications and generate function hooks.☆63Aug 6, 2013Updated 12 years ago
- Wordpress Sploit Framework was developed for the purpose to provide a framework which creates proof of concept when discovering vulnerabi…☆33Sep 19, 2016Updated 9 years ago
- Get a list of installed software in a safe manner☆11Aug 7, 2017Updated 8 years ago
- ☆16Dec 31, 2016Updated 9 years ago
- Proof-of-Concept code for exploits☆82May 5, 2016Updated 9 years ago
- Remote Access Trojan for Chrome and Firefox. It's pretty ugly right now.☆14Sep 9, 2012Updated 13 years ago
- Web Application Security☆131Jan 6, 2026Updated 2 months ago
- ☆16Apr 17, 2021Updated 4 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- A bootloader imgdata unpacker for Nexus 4, 5 and 7 smartphones as well as imgdata tool for Nexus 5.☆26Aug 5, 2017Updated 8 years ago
- it's a simple LKM rootkit.☆12Aug 2, 2016Updated 9 years ago
- ☆26Jun 23, 2016Updated 9 years ago
- I'll submit the poc after blackhat☆117Aug 30, 2015Updated 10 years ago
- Exploiting MS15-061 local Privilege escalation☆49Sep 22, 2015Updated 10 years ago
- A Program Analysis Toolkit for Android☆121May 25, 2017Updated 8 years ago
- Sysprep Volatile Environment LPE (2017)☆16Jun 28, 2025Updated 8 months ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- PoC ActiveX SVG Document Execution☆21Nov 8, 2018Updated 7 years ago
- An ugly hack to do something, like start an intent, while being uninstalled by the system☆23Mar 29, 2017Updated 8 years ago
- Android kernel module to bypass SELinux at boot☆44Apr 10, 2016Updated 9 years ago
- Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc☆93Jan 27, 2015Updated 11 years ago