☆15May 23, 2019Updated 6 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- writeup of some ctf challs☆11Apr 20, 2025Updated 10 months ago
- ☆28Jun 28, 2019Updated 6 years ago
- ☆36Mar 3, 2023Updated 3 years ago
- ☆17Oct 26, 2018Updated 7 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- Dockerfile for AFL++ and helpful other tools☆21May 5, 2020Updated 5 years ago
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆82Oct 11, 2019Updated 6 years ago
- my talk on defcon26☆20Sep 29, 2018Updated 7 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 3 years ago
- Confluence Widget Connector path traversal (CVE-2019-3396)☆22Oct 4, 2019Updated 6 years ago
- ☆26Oct 29, 2021Updated 4 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- ☆22Apr 12, 2019Updated 6 years ago
- Modified patch of https://github.com/Naituw/HackingFacebook/ and https://github.com/Naituw/IPAPatch/☆47Oct 3, 2017Updated 8 years ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 3 years ago
- Toshiba MeP-c4 for Ghidra☆22May 29, 2019Updated 6 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Oct 25, 2020Updated 5 years ago
- ☆53Jul 2, 2019Updated 6 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- ☆25Mar 18, 2018Updated 7 years ago
- Simple PoC to leak contents from embedded origin☆26Sep 17, 2019Updated 6 years ago
- ☆28Sep 20, 2018Updated 7 years ago
- PoC code for crashing windows active directory☆35Sep 19, 2018Updated 7 years ago
- ☆26Jan 18, 2026Updated last month
- PoC materials to exploit CVE-2019-15846☆30Oct 10, 2019Updated 6 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Feb 10, 2018Updated 8 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- Lightweight key sequence easter eggs in JavaScript☆46Feb 21, 2014Updated 12 years ago
- 苍穹 - 贴吧签到助手☆10Oct 3, 2014Updated 11 years ago
- CVE-2019-12949☆26Jun 28, 2019Updated 6 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- An automatic and lightweight web application scanning tool for CTF.☆32Feb 28, 2017Updated 9 years ago