mcw0 / PoCLinks
Issues has been disabled for these PoC's, as they are simply PoC, Public Domain and unsupported.
☆757Updated 2 years ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Proof of Concepts☆1,311Updated 11 months ago
- dump☆495Updated 6 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆493Updated 6 years ago
- Proof of concept for CVE-2019-0708☆1,183Updated 3 years ago
- ☆1,364Updated 5 years ago
- Proofs-of-concept☆812Updated last year
- RouterOS Security Research Tooling and Proof of Concepts☆891Updated 2 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,336Updated 4 years ago
- PRISM is an user space stealth reverse shell backdoor, written in pure C.☆482Updated 9 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆329Updated 2 years ago
- MQTT-PWN intends to be a one-stop-shop for IoT Broker penetration-testing and security assessment operations.☆427Updated last year
- CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882☆538Updated 7 years ago
- Simple reverse ICMP shell☆1,609Updated 7 years ago
- Dahua Console, access internal debug console and/or other researched functions in Dahua devices. Feel free to contribute in this project.☆293Updated 2 months ago
- TCP tunneling over HTTP/HTTPS for web application servers☆752Updated 9 years ago
- Dirty Cow exploit - CVE-2016-5195☆905Updated 3 months ago
- MS17-010☆2,217Updated 2 years ago
- Windows Exploits☆1,284Updated 5 years ago
- A CVE-2016-5195 exploit example.☆327Updated 8 years ago
- ISF(Industrial Security Exploitation Framework) is a exploitation framework based on Python.☆251Updated 5 years ago
- A multiple reverse shell session/client manager via terminal☆242Updated 2 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆699Updated 5 years ago
- Attify OS - Distro for pentesting IoT devices☆1,010Updated 4 years ago
- HackBar plugin for Burpsuite☆1,597Updated 4 years ago
- Tiny SHell is an open-source UNIX backdoor.☆704Updated 12 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆346Updated 4 years ago
- command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can explo…☆283Updated 4 years ago
- A collection of pentest and development tips☆1,121Updated 3 years ago
- Sudo Baron Samedit Exploit☆780Updated 3 years ago
- Venom - A Multi-hop Proxy for Penetration Testers☆2,129Updated 3 years ago