konatabrk / POC-exploitsLinks
Vulnerability Research and Proof of Concept exploits for various targets
☆34Updated 2 years ago
Alternatives and similar repositories for POC-exploits
Users that are interested in POC-exploits are comparing it to the libraries listed below
Sorting:
- ☆20Updated 3 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Updated 4 years ago
- D-Link DIR-859 - RCE UnAutenticated (CVE-2019–17621)☆48Updated 5 years ago
- YaraSploit is a collection of Yara rules generated from Metasploit framework shellcodes.☆44Updated last year
- RCE Exploit for Gitlab < 13.9.4☆51Updated 4 years ago
- Security Research☆36Updated 3 years ago
- Dependencies with Log4j2 Checklist☆35Updated 3 years ago
- Fortinet FortiOS路径遍历漏洞 (CVE-2018-13379)批量检测脚本☆8Updated 4 years ago
- Windows Common Log File System Driver POC☆95Updated 3 years ago
- ☆35Updated 5 years ago
- ☆15Updated 5 years ago
- Like Hell's Gate but more EGG :)☆20Updated 3 years ago
- ☆35Updated 2 years ago
- PolicyKit CVE-2021-3560 Exploitation (Authentication Agent)☆24Updated 2 years ago
- Slides from out talk at BH IL 2022☆28Updated 3 years ago
- A small PoC for the recent RCE found in the Goahead Webserver prior to version 5.1.5.☆22Updated 3 years ago
- TrojanDropper/PS.Maloader.d☆12Updated 3 years ago
- CVE-2021-33909 Sequoia☆44Updated 3 years ago
- ☆18Updated 6 years ago
- CVE-2020-17008 splWOW64 Elevation of Privilege☆48Updated 4 years ago
- Terminate the eventlog thread to disable the windows eventlog☆20Updated 5 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Updated 3 years ago
- 🕳️ Proof of Concept exploits and their descriptions for various products☆25Updated 8 months ago
- Show AV Processes list☆14Updated 4 years ago
- Cobalt Strike DNS beacon parser☆11Updated 3 years ago
- Elevation Of Privileges Proof of Concept for Windows (win7-win10)☆32Updated 4 years ago
- Collection of slides☆33Updated last year
- CVE-2020-1048 bypass: binary planting PoC☆32Updated 4 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 6 years ago
- 感染PE文件的病毒学习过程☆32Updated 4 years ago