lgandx / PoC
Various PoCs
☆490Updated 5 years ago
Alternatives and similar repositories for PoC:
Users that are interested in PoC are comparing it to the libraries listed below
- Public repository for improvements to the EXTRABACON exploit☆159Updated 8 years ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆489Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆521Updated 7 years ago
- ☆425Updated 7 years ago
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175Updated 8 years ago
- EternalRocks worm☆454Updated 7 years ago
- EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)☆326Updated 8 years ago
- Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)☆179Updated 7 years ago
- Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆316Updated 6 years ago
- Collection of scripts to aid in delivering payloads via Office Macros. Most are python. See http://khr0x40sh.wordpress.com for details.☆406Updated 8 years ago
- Automated Linux evil maid attack☆426Updated 9 years ago
- BrowserBackdoor is an Electron Application with a JavaScript WebSocket Backdoor and a Ruby Command-Line Listener☆342Updated 2 years ago
- Brosec - An interactive reference tool to help security professionals utilize useful payloads and commands.☆356Updated 2 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆725Updated 7 years ago
- Blueborne CVE-2017-0785 Android information leak vulnerability☆466Updated 7 years ago
- Guides, Tools, Tips and such for working with the Shadow Brokers dumps☆224Updated 6 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- A webshell framework for penetration testers.☆297Updated 11 months ago
- kernel privilege escalation enumeration and exploitation framework☆689Updated 6 years ago
- RedSnarf is a pen-testing / red-teaming tool for Windows environments☆1,209Updated 4 years ago
- Exploit the credentials present in files and memory☆839Updated last year
- Running CVE-2017-8759 exploit sample.☆255Updated 5 years ago
- Authenticate against a MySQL server without knowing the cleartext password☆226Updated 2 years ago
- BrowserExploit is an advanced browser exploit pack for doing internal and external pentesting, helping gaining access to internal compute…☆323Updated 7 years ago
- Router EXploitation Toolkit - small toolkit for easy creation and usage of various python scripts that work with embedded devices.☆343Updated 8 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆429Updated 7 years ago
- A collection of scripts which may come in handy during your freedom fighting activities.☆404Updated last year
- SSMA - Simple Static Malware Analyzer [This project is not maintained anymore by me]☆409Updated 4 years ago
- A reverse shell with terminal support, data tunneling, and advanced pivoting capabilities.☆465Updated 8 months ago