averagesecurityguy / pocsLinks
Proof-of-Concept scripts for various issues.
☆14Updated 8 years ago
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below
Sorting:
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆26Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A security write-up about the Paypal API & data leakage☆24Updated 9 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- ☆25Updated 10 years ago
- ☆12Updated 8 years ago
- collection of useful shells for penetration tests☆37Updated 8 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- ☆32Updated 10 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Office 365 MFA capture toolkit☆13Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Framework for Automated Security Testing that is Scaleable and Asynchronous built on Microservices☆18Updated 8 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- A collection of publicly released whitepapers☆49Updated 7 years ago
- Data exfiltration PoC scripts☆25Updated 9 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Monitor arbitrary TCP traffic using your HTTP interception proxy of choice☆48Updated 7 years ago