averagesecurityguy / pocsLinks
Proof-of-Concept scripts for various issues.
☆14Updated 8 years ago
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below
Sorting:
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- MoneyX is an intentionally vulnerable JSP application used for training developers in application security concepts.☆31Updated 9 years ago
- Puny Domain Name Check☆37Updated 5 years ago
- Checks X11 and outputs a screenshot to of the display if allowed and the display is active☆22Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- ☆32Updated 9 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Flash crossdomain policy security checker☆26Updated 9 years ago
- REST/JSON interface to Burp Suite☆33Updated 4 years ago
- ☆12Updated 8 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- ☆25Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- OpenCV based IDN option generator PoC☆39Updated 8 years ago
- Platform for Browser Exploitation☆34Updated 10 years ago
- Automated enumeration☆30Updated 4 years ago
- SMB Auto authentication Vulnerability☆34Updated 8 years ago
- Create custom Windows batch files from a configuration file☆32Updated 8 years ago
- Security tools to use on assessments.☆39Updated 9 years ago
- PLASMA PULSAR☆69Updated 8 years ago