jhftss / POCLinks
A public collection of POCs & Exploits for the vulnerabilities I discovered
☆391Updated 7 months ago
Alternatives and similar repositories for POC
Users that are interested in POC are comparing it to the libraries listed below
Sorting:
- Oversecured Vulnerable iOS App☆224Updated last year
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆274Updated last year
- Take over macOS Electron apps' TCC permissions☆210Updated 2 years ago
- An automatic Blind ROP exploitation tool☆204Updated 2 years ago
- ☆336Updated last year
- Fuzz iOS URL schemes☆126Updated last month
- BLACKHAT USA2022 PDF Public☆505Updated 2 years ago
- Safari 1day RCE Exploit☆145Updated 5 months ago
- An iOS app that lets you practice your Frida skills☆176Updated 2 years ago
- Slides and videos from my public speeches / conferences☆76Updated 3 months ago
- Work in progress...☆368Updated 2 months ago
- ☆215Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆165Updated last year
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆169Updated last year
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- ☆280Updated last week
- A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)☆317Updated 2 years ago
- CVE-2023-4911 proof of concept☆168Updated last year
- ☆74Updated last month
- A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager☆355Updated 2 years ago
- PoC_CVEs☆163Updated last month
- PDF Files for Pentesting☆618Updated 10 months ago
- Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability☆220Updated last year
- A python module to explore the object tree to extract paths to interesting objects in memory.☆101Updated 6 months ago
- Intentionally vulnerable Android application.☆267Updated 3 weeks ago
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆285Updated last year
- CVEs and Techniques used PDF as an attack vector.☆94Updated 3 years ago
- ☆133Updated 3 years ago
- ☆205Updated 10 months ago
- ios tingz☆62Updated 3 years ago