jhftss / POC
A public collection of POCs & Exploits for the vulnerabilities I discovered
☆379Updated 3 months ago
Alternatives and similar repositories for POC:
Users that are interested in POC are comparing it to the libraries listed below
- Work in progress...☆342Updated 9 months ago
- Fuzz iOS URL schemes☆115Updated 5 months ago
- An automatic Blind ROP exploitation tool☆205Updated last year
- An iOS app that lets you practice your Frida skills☆166Updated 2 years ago
- ☆330Updated 11 months ago
- Massive Mobile Security Framework☆279Updated 2 weeks ago
- Safari 1day RCE Exploit☆133Updated last month
- 1337 Wordlists for Bug Bounty Hunting☆824Updated 3 months ago
- Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit☆272Updated last year
- This contains notes and slides for my Objective by the Sea talk☆97Updated last year
- ☆214Updated last year
- Oversecured Vulnerable iOS App☆219Updated last year
- Slides and videos from my public speeches / conferences☆74Updated 3 weeks ago
- BLACKHAT USA2022 PDF Public☆502Updated 2 years ago
- Take over macOS Electron apps' TCC permissions☆202Updated last year
- PDF Files for Pentesting☆578Updated 7 months ago
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty☆206Updated 3 weeks ago
- SSH Zero-Day Made By ClumsyLulz☆124Updated 2 months ago
- CVE-2022-44268 ImageMagick Arbitrary File Read - Payload Generator☆271Updated 2 years ago
- LPE exploit for CVE-2023-21768☆487Updated last year
- Pwn2Own Vancouver 2023 Ubuntu LPE exploit☆159Updated last year
- CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request …☆280Updated 8 months ago
- Automated script to convert and push Burp Suite certificate in Android, and modify Android's IP table to redirect all traffic to Burp Sui…☆110Updated 2 years ago
- ☆203Updated 6 months ago
- Here is some resources about macOS/iOS system security.☆516Updated 2 months ago
- Tips on how to write exploit scripts (faster!)☆485Updated 9 months ago
- This tool is used for backdoor,shellcode generation,Information retrieval and POC arrangement for various architecture devices☆193Updated 6 months ago
- A RedTeam Toolkit☆396Updated last month
- Advanced exploits that I wrote for Pwn2Own competitions and other occasions☆168Updated last year
- A curated list of awesome iOS application security resources.☆561Updated last year