mcw0 / PoC
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
☆716Updated last year
Related projects ⓘ
Alternatives and complementary repositories for PoC
- Proof of Concepts☆1,216Updated last week
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,305Updated 3 years ago
- Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.☆251Updated 10 months ago
- Proofs-of-concept☆764Updated 2 months ago
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆540Updated 6 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆487Updated 5 years ago
- Proof of concept for CVE-2019-0708☆1,174Updated 2 years ago
- Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective wa…☆723Updated 7 years ago
- ☆1,319Updated 4 years ago
- Simple reverse ICMP shell☆1,561Updated 6 years ago
- A collection of pentest and development tips☆1,100Updated 2 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆321Updated last year
- Scanner for CVE-2020-0796 - SMBv3 RCE☆665Updated 4 years ago
- dump☆491Updated 5 years ago
- HackBar plugin for Burpsuite☆1,541Updated 3 years ago
- MS17-010☆2,147Updated last year
- A multiple reverse shell session/client manager via terminal☆239Updated last year
- Support ALL Windows Version☆712Updated 4 years ago
- Advisories, proof of concept files and exploits that have been made public by @pedrib.☆822Updated 9 months ago
- WAFNinja is a tool which contains two functions to attack Web Application Firewalls.☆797Updated 6 years ago
- Linux/Windows post-exploitation framework made by linux user☆1,376Updated 3 weeks ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆423Updated 5 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆344Updated 3 years ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆253Updated 3 years ago
- generate CobaltStrike's cross-platform payload☆2,290Updated last year
- ☆465Updated last year
- Tool for extracting information from newly spawned processes☆735Updated 2 years ago
- Vulnerability Labs for security analysis☆1,159Updated 3 years ago
- Java RMI enumeration and attack tool.☆716Updated 7 years ago