My attempt at writing exploit POCs for various CVEs
☆16Feb 8, 2020Updated 6 years ago
Alternatives and similar repositories for CVE-POCs
Users that are interested in CVE-POCs are comparing it to the libraries listed below
Sorting:
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Mar 23, 2020Updated 5 years ago
- Miscellaneous exploit scripts☆17May 24, 2022Updated 3 years ago
- A proof-of-concept scanner to check an RDG Gateway Server for vulnerabilities CVE-2020-0609 & CVE-2020-0610.☆69Jan 26, 2020Updated 6 years ago
- ☆27Oct 28, 2019Updated 6 years ago
- Writeups of CTF challenges☆31Sep 30, 2020Updated 5 years ago
- Vulners signature-base software version detection rules☆38Nov 9, 2021Updated 4 years ago
- Learning Python Web Penetration Testing, published by Packt☆44Jan 30, 2023Updated 3 years ago
- ☆11Apr 30, 2021Updated 4 years ago
- My public presentations☆42May 10, 2023Updated 2 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Our Plazart framework is a flexible Template Framework for Joomla.☆16Feb 1, 2020Updated 6 years ago
- Escapes content for prevention of XSS attacks.☆13Jun 24, 2016Updated 9 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Nmap - the Network Mapper. Github mirror of official SVN repository.☆10Sep 5, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- My version of driller using Intel PIN and angrgdb. In "theory" can work with AFL in deferred and persistent mode.☆13Feb 10, 2019Updated 7 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Estimate how long it takes to read a text☆12Sep 6, 2025Updated 5 months ago
- ☆12Nov 11, 2025Updated 3 months ago
- ☆15Apr 20, 2020Updated 5 years ago
- ☆10Nov 29, 2016Updated 9 years ago
- Flash最新钓鱼源码对接官方API实现跟随官方升级而升级☆12Sep 30, 2020Updated 5 years ago
- Misuse cases of Cryptography in real world software products☆12Nov 4, 2018Updated 7 years ago
- ☆12Sep 18, 2015Updated 10 years ago
- The P4 version of the Zodiac FX firmware☆10Jul 25, 2019Updated 6 years ago
- Agentless network interfaces monitor for GNU/Linux firewalls/servers☆17Apr 4, 2017Updated 8 years ago
- Reverse engineering the Github websocket API - alive.github.com☆14Apr 19, 2023Updated 2 years ago
- ☆13Aug 22, 2023Updated 2 years ago
- C & Shellcode Playground..☆10Dec 2, 2017Updated 8 years ago
- Corsaro is a software suite for performing large-scale analysis of trace data. It was specifically designed to be used with passive trace…☆12Jan 30, 2020Updated 6 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Aug 16, 2022Updated 3 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- ☆12Aug 5, 2015Updated 10 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆10Feb 13, 2017Updated 9 years ago
- A Simple ShellcodeLoader☆11Jun 4, 2021Updated 4 years ago
- Writeup for rwctf2019-final-printer☆14Dec 17, 2019Updated 6 years ago
- ☆12Aug 5, 2021Updated 4 years ago
- Das Kochbuch, das Nerds das Kochen beibringt☆12Jan 14, 2014Updated 12 years ago