☆15May 23, 2019Updated 6 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- writeup of some ctf challs☆11Apr 20, 2025Updated 11 months ago
- ☆36Mar 3, 2023Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 4 years ago
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated 10 months ago
- ☆17Oct 26, 2018Updated 7 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- a kernel information leak on macOS<= 10.14.4☆10May 24, 2019Updated 6 years ago
- 苍穹 - 贴吧签到助手☆10Oct 3, 2014Updated 11 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Oct 25, 2020Updated 5 years ago
- An automatic and lightweight web application scanning tool for CTF.☆33Feb 28, 2017Updated 9 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- CVE-2019-0859 1day Exploit☆119Feb 11, 2020Updated 6 years ago
- ☆26Oct 29, 2021Updated 4 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Cross-architecture instruction counting for CTF solving☆48Mar 13, 2022Updated 4 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- POC for utilizing wikipedia API for Command and Control☆28Dec 8, 2022Updated 3 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Feb 10, 2018Updated 8 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆49Dec 2, 2017Updated 8 years ago
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆82Oct 11, 2019Updated 6 years ago
- Write exploit faster with up-to-date python 3☆37Dec 2, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Aug 11, 2023Updated 2 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 3 years ago
- A mobile web privacy measurement framework based on OpenWPM☆17Apr 11, 2024Updated last year
- Simple PoC to leak contents from embedded origin☆26Sep 17, 2019Updated 6 years ago
- ☆25Mar 18, 2018Updated 8 years ago
- My CTF Challenges☆216Jan 4, 2026Updated 2 months ago
- ☆16Jan 23, 2022Updated 4 years ago
- Modified patch of https://github.com/Naituw/HackingFacebook/ and https://github.com/Naituw/IPAPatch/☆47Oct 3, 2017Updated 8 years ago
- ☆21Aug 7, 2014Updated 11 years ago