k0imet / CVE-POCsLinks
for this repo i wish to keep an archive of available POCs and Descriptions alike,
☆12Updated 3 years ago
Alternatives and similar repositories for CVE-POCs
Users that are interested in CVE-POCs are comparing it to the libraries listed below
Sorting:
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 9 months ago
- Script for Reconnaissance(Bug Bounty)☆18Updated 3 years ago
- ☆18Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆20Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- OSCP Study Guide☆40Updated 2 years ago
- A tool for Subdomain takeovers detection☆26Updated 2 years ago
- Bug Bounty Methodology-slides by Muhammad M. Awali. Pentesting and Researcher Talks.☆20Updated 2 years ago
- ☆13Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆10Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated 9 months ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆12Updated 4 years ago
- ☆13Updated 2 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Updated 3 years ago
- Collection of over 9000 xss payloads | heavy xss collection☆13Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Template Nuclei SSTI☆29Updated last year
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated last year
- A solid recon tool I use personally.☆30Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- ☆26Updated 2 years ago
- ☆21Updated 2 years ago
- ☆27Updated 2 years ago