nomi-sec / PoC-in-GitHub
📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.
☆6,648Updated this week
Alternatives and similar repositories for PoC-in-GitHub:
Users that are interested in PoC-in-GitHub are comparing it to the libraries listed below
- Gather and update all available and newest CVEs with their PoC.☆6,693Updated this week
- List of Awesome CobaltStrike Resources☆4,058Updated last year
- Linux privilege escalation auditing tool☆5,739Updated 11 months ago
- ✍️ A curated list of CVE PoCs.☆3,356Updated 3 years ago
- Windows Exploit Suggester - Next Generation☆4,289Updated last week
- HTTP parameter discovery suite.☆5,376Updated last month
- Adversary Emulation Framework☆8,782Updated this week
- Monitor linux processes without root permissions☆5,059Updated 2 years ago
- A toolkit for testing, tweaking and cracking JSON Web Tokens☆5,546Updated 5 months ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆3,147Updated 2 months ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,850Updated 8 months ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,140Updated last year
- windows-kernel-exploits Windows平台提权漏洞集合☆8,174Updated 3 years ago
- This tool generates gopher link for exploiting SSRF and gaining RCE in various servers☆2,929Updated last year
- Community curated list of templates for the nuclei engine to find security vulnerabilities.☆9,588Updated this week
- A curated list of amazingly awesome Burp Extensions☆3,040Updated 2 months ago
- An OOB interaction gathering server and client library☆3,549Updated this week
- pocsuite3 is an open-sourced remote vulnerability testing framework developed by the Knownsec 404 Team.☆3,674Updated last month
- A swiss army knife for pentesting networks☆8,542Updated last year
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆2,954Updated last year
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆7,916Updated 9 months ago
- File upload vulnerability scanner and exploitation tool.☆3,154Updated last year
- Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@mand…☆7,045Updated 3 months ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆5,450Updated 2 weeks ago
- 📦 Make security testing of K8s, Docker, and Containerd easier.☆4,028Updated 2 months ago
- Official repository vuls Scan: 15000+PoCs; 23 kinds of application password crack; 7000+Web fingerprints; 146 protocols and 90000+ rules…☆5,608Updated 6 months ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,711Updated 3 years ago
- Linux enumeration tool for pentesting and CTFs with verbosity levels☆3,490Updated last year
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆9,340Updated this week
- Automatic SSRF fuzzer and exploitation tool☆3,051Updated 7 months ago