mcw0 / PoCLinks
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
☆762Updated 2 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Proof of Concepts☆1,316Updated last year
- Proofs-of-concept☆816Updated last year
- Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.☆296Updated 3 months ago
- ☆1,369Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,183Updated 3 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆495Updated 6 years ago
- Attify OS - Distro for pentesting IoT devices☆1,011Updated 4 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆894Updated 2 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆481Updated 9 years ago
- ☆377Updated 2 years ago
- Simple reverse ICMP shell☆1,613Updated 7 years ago
- dump☆496Updated 6 years ago
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆427Updated last year
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Updated 7 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,342Updated 4 years ago
- Dirty Cow exploit - CVE-2016-5195☆906Updated 3 months ago
- Script for searching the extracted firmware file system for goodies!☆1,175Updated 2 years ago
- Tiny SHell is an open-source UNIX backdoor.☆707Updated 12 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆751Updated 9 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆252Updated 5 years ago
- Devkit for building Metasploit-like consoles☆252Updated last month
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆818Updated 7 years ago
- Rogue MySql Server☆474Updated 12 years ago
- Various kernel exploits☆797Updated last year
- A collection of pentest and development tips☆1,123Updated 3 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆346Updated 4 years ago
- SHELLING - a comprehensive OS command injection payload generator☆445Updated 5 years ago
- A multi threads web application source leak scanner☆392Updated 5 months ago
- Tunna is a set of tools which will wrap and tunnel any TCP communication over HTTP. It can be used to bypass network restrictions in full…☆1,265Updated 3 years ago