Proof-of-Concept scripts for various issues.
☆14Jan 23, 2017Updated 9 years ago
Alternatives and similar repositories for pocs
Users that are interested in pocs are comparing it to the libraries listed below
Sorting:
- Python script to check GitHub accounts for world-editable wiki pages☆21May 8, 2023Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- Server for receiving autorun data from the clients☆13Sep 26, 2017Updated 8 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- This extension redacts potentially sensitive header and parameter values from requests using Shannon Entropy analysis.☆13Dec 29, 2020Updated 5 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Privbind is a small tool allowing secure running of unprivileged programs, but allowing them to bind to privileged (<1024) TCP/UDP ports.…☆12Jul 18, 2016Updated 9 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Jun 8, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Scripts that I've written that others may find useful☆14Aug 17, 2022Updated 3 years ago
- Serverless function to automate enforcement of Multi-Factor Authentication (MFA) to all AWS IAM users with access to AWS Management Conso…☆13Oct 30, 2018Updated 7 years ago
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 2 years ago
- ☆26Dec 8, 2025Updated 2 months ago
- DRDoS UDP amplification tool☆17Jul 2, 2015Updated 10 years ago
- An intentionally designed broken web application based on REST API☆13May 25, 2022Updated 3 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Exploitation challenges for CTF☆63Feb 13, 2018Updated 8 years ago
- Extract the key and use it to recover encrypted files by Nemucod Ransomware [.crypted]☆19Jul 5, 2016Updated 9 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Nov 26, 2017Updated 8 years ago
- sonoff evil firmware PoC - used for demonstration during live demo on exploitation by MQTT☆16Jul 3, 2017Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- ☆19Mar 24, 2017Updated 8 years ago
- Open Source INTelligence☆24Apr 19, 2020Updated 5 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Jun 11, 2024Updated last year
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- An AWS Lambda vulnerable application written in flask.☆49Oct 9, 2017Updated 8 years ago
- Tools for reverse engineering the Utimaco Firmware☆43Jan 24, 2017Updated 9 years ago
- POC for IAT Parsing Payloads☆48Jan 1, 2017Updated 9 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- test your Diffie-Hellman parameters for safe primes and right sizes☆20May 23, 2016Updated 9 years ago
- Splunk Web Shell☆51Mar 25, 2015Updated 10 years ago
- The repository for Building visualisation platforms for OSINT data using open source solutions☆29Aug 21, 2018Updated 7 years ago
- A place for documenting threats and mitigations related to containers orchestrators (Kubernetes, Swarm etc)☆25Jul 3, 2018Updated 7 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- Miscellaneous C-Sharp projects for red team activities☆24Aug 12, 2022Updated 3 years ago
- ☆24Feb 6, 2017Updated 9 years ago
- PoC C&C for the Industroyer malware☆26Jun 30, 2017Updated 8 years ago