My attempt at writing exploit POCs for various CVEs
☆16Feb 8, 2020Updated 6 years ago
Alternatives and similar repositories for CVE-POCs
Users that are interested in CVE-POCs are comparing it to the libraries listed below
Sorting:
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- An MCP Server for Pwndoc (Pentesting Reporting Tool)☆41Jan 23, 2026Updated 2 months ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Mar 23, 2020Updated 5 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- The shorebird docs site☆18Updated this week
- A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.☆69Jan 26, 2020Updated 6 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆13Aug 22, 2023Updated 2 years ago
- For V8CTF M122☆14Aug 25, 2024Updated last year
- Patching CPLAY2air/CarLinkit default password at runtime.☆16Jul 9, 2021Updated 4 years ago
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆25Updated this week
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆15Oct 24, 2022Updated 3 years ago
- PSL provider provides a way for enterprise administrators to configure package sources for their business.☆12Oct 31, 2016Updated 9 years ago
- A “functional programming ” version of a To-Do List application written with the Cats library☆17Aug 12, 2019Updated 6 years ago
- Binary exploitation exercises and scripts☆12Mar 15, 2022Updated 4 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- ☆15Mar 25, 2017Updated 8 years ago
- ☆13Oct 15, 2018Updated 7 years ago
- Textmate bundle for the Kotlin programming language☆12Nov 16, 2017Updated 8 years ago
- ☆15Sep 12, 2018Updated 7 years ago
- ☆14Jan 16, 2020Updated 6 years ago
- ☆27Oct 28, 2019Updated 6 years ago
- Repository for Windows 10 x64 kernel research, exploitation learning, and reference/supplementary code.☆14Jun 24, 2020Updated 5 years ago
- Black Box Fuzzing(Bluetooth)☆10Apr 26, 2016Updated 9 years ago
- Fully based on Advanced Windows exploitation. Kernel driver exploitation, browser exploitation, heap spraying etc....☆14Nov 1, 2020Updated 5 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Our Plazart framework is a flexible Template Framework for Joomla.☆16Feb 1, 2020Updated 6 years ago
- ☆25Jul 19, 2024Updated last year
- ctfs-2019☆12Nov 29, 2019Updated 6 years ago
- A contacts manager using Bookshelf.js☆11Aug 27, 2016Updated 9 years ago
- Print a beautiful millipede☆13Mar 2, 2018Updated 8 years ago
- ☆26Feb 24, 2022Updated 4 years ago
- A collection of PeachPits for Peach Fuzzer to support EAP, 802.1x, and RADIUS Fuzzing☆17Dec 29, 2015Updated 10 years ago
- Dockers for all the online challenges on X-MAS CTF 2018☆17Dec 24, 2018Updated 7 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- ☆11Jan 6, 2020Updated 6 years ago
- ShiftCrops pwn tool☆15Dec 11, 2016Updated 9 years ago