mcw0 / PoCLinks
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
☆766Updated 2 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Proof of Concepts☆1,318Updated last year
- Proofs-of-concept☆818Updated last year
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆494Updated 6 years ago
- ☆1,372Updated 5 years ago
- Simple reverse ICMP shell☆1,612Updated 7 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆483Updated 9 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,342Updated 5 years ago
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆426Updated last year
- dump☆496Updated 6 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆705Updated 5 years ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Updated 8 years ago
- Proof of concept for CVE-2019-0708☆1,184Updated 4 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.☆295Updated 4 months ago
- RouterOS Security Research Tooling and Proof of Concepts☆895Updated 3 years ago
- A modern multiple reverse shell sessions manager written in go☆1,632Updated this week
- MS17-010☆2,217Updated 2 years ago
- Dirty Cow exploit - CVE-2016-5195☆909Updated 4 months ago
- TCP tunneling over HTTP/HTTPS for web application servers☆750Updated 9 years ago
- Tiny SHell is an open-source UNIX backdoor.☆705Updated 12 years ago
- Attify OS - Distro for pentesting IoT devices☆1,014Updated 4 years ago
- (CVE-2018-9995) Get DVR Credentials☆552Updated 6 years ago
- A collection of pentest and development tips☆1,125Updated 3 years ago
- A multiple reverse shell session/client manager via terminal☆245Updated 2 years ago
- Script for searching the extracted firmware file system for goodies!☆1,177Updated 2 years ago
- A CVE-2016-5195 exploit example.☆328Updated 8 years ago
- ☆897Updated last year
- GhostTunnel is a covert backdoor transmission method that can be used in an isolated environment.☆336Updated 6 years ago
- Windows Exploits☆1,287Updated 5 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆347Updated 4 years ago