mcw0 / PoCLinks
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
☆768Updated 3 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Proof of Concepts☆1,321Updated last year
- Proofs-of-concept☆822Updated last year
- dump☆497Updated 6 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆495Updated 6 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆330Updated 2 years ago
- ☆1,375Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,185Updated 4 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Updated 8 years ago
- Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.☆300Updated 6 months ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆485Updated 9 years ago
- (CVE-2018-9995) Get DVR Credentials☆555Updated 7 years ago
- Attify OS - Distro for pentesting IoT devices☆1,018Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆346Updated 5 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆712Updated 5 years ago
- A multiple reverse shell session/client manager via terminal☆244Updated 2 years ago
- Devkit for building Metasploit-like consoles☆252Updated 4 months ago
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆431Updated last year
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,347Updated 5 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆747Updated 9 years ago
- RouterOS Security Research Tooling and Proof of Concepts☆899Updated 3 years ago
- Tiny SHell is an open-source UNIX backdoor.☆706Updated 12 years ago
- Various kernel exploits☆803Updated last year
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆291Updated 4 years ago
- Dirty Cow exploit - CVE-2016-5195☆919Updated 6 months ago
- A collection of pentest and development tips☆1,126Updated 3 years ago
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆335Updated 6 years ago
- SHELLING - a comprehensive OS command injection payload generator☆446Updated 5 years ago
- A modern multiple reverse shell sessions manager written in go☆1,636Updated this week
- A CVE-2016-5195 exploit example.☆330Updated 8 years ago
- ☆476Updated 2 years ago