☆15May 23, 2019Updated 7 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- writeup of some ctf challs☆11Apr 20, 2025Updated last year
- ☆36Mar 3, 2023Updated 3 years ago
- Write ups of solution for CTF challenges I solved☆25Jul 20, 2021Updated 4 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Hides processes from the windows task manager using IAT hooking.☆22Mar 30, 2021Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- My CTF tasks and writeup☆38Dec 6, 2022Updated 3 years ago
- ☆28Jun 28, 2019Updated 6 years ago
- Cs-Sleep-Mask-Fiber☆18May 16, 2025Updated last year
- ☆17Oct 26, 2018Updated 7 years ago
- Sources for challenges of Nullcon's HackIM 2019☆62Jul 16, 2020Updated 5 years ago
- 苍穹 - 贴吧签到助手☆10Oct 3, 2014Updated 11 years ago
- XSS payloads for edge cases☆34Nov 13, 2018Updated 7 years ago
- PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules☆48Oct 25, 2020Updated 5 years ago
- An automatic and lightweight web application scanning tool for CTF.☆33Feb 28, 2017Updated 9 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ☆32Oct 21, 2023Updated 2 years ago
- CVE-2019-0859 1day Exploit☆118Feb 11, 2020Updated 6 years ago
- ☆26Oct 29, 2021Updated 4 years ago
- Proof of Work generator☆12Jun 26, 2019Updated 6 years ago
- Cross-architecture instruction counting for CTF solving☆47Mar 13, 2022Updated 4 years ago
- justCTF 2019 challenges sources☆41Jun 9, 2021Updated 4 years ago
- POC for utilizing wikipedia API for Command and Control☆29Dec 8, 2022Updated 3 years ago
- Proof of concept of LibreOffice remote arbitrary file disclosure vulnerability☆96Feb 10, 2018Updated 8 years ago
- HTTPWookiee is an HTTP server and proxy stress tool (respect of RFC, HTTP Smuggling issues, etc). If you run an HTTP server project conta…☆50Dec 2, 2017Updated 8 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF games I played.☆23Dec 7, 2022Updated 3 years ago
- A novel technique to hide code from debuggers & disassemblers☆161Aug 9, 2024Updated last year
- Funny project to create an encoder/obfuscator that converts any javascript code into a code that only consist of /[a-z().]/ characters☆82Oct 11, 2019Updated 6 years ago
- Write exploit faster with up-to-date python 3☆37Dec 2, 2018Updated 7 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Automatic Tools For Metabase Exploit Known As CVE-2023-38646☆27Aug 11, 2023Updated 2 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Fighting String Encryption in Android Malware☆59May 23, 2022Updated 4 years ago
- A mobile web privacy measurement framework based on OpenWPM☆18Apr 11, 2024Updated 2 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Simple PoC to leak contents from embedded origin☆26Sep 17, 2019Updated 6 years ago
- ☆26Mar 18, 2018Updated 8 years ago
- My CTF Challenges☆218Jan 4, 2026Updated 4 months ago
- Modified patch of https://github.com/Naituw/HackingFacebook/ and https://github.com/Naituw/IPAPatch/☆47Oct 3, 2017Updated 8 years ago
- ☆16Jan 23, 2022Updated 4 years ago
- ☆21Aug 7, 2014Updated 11 years ago
- Get detailed information about a Twitter user activity☆17Dec 14, 2017Updated 8 years ago