Advisories, proof of concept files and exploits that have been made public by @pedrib.
☆856Apr 16, 2025Updated 11 months ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- Repository that tracks public exploits, vulnerabilities and advisories that I [co-]discovered or [co-]authored.☆115Feb 2, 2023Updated 3 years ago
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆800Apr 22, 2022Updated 3 years ago
- ☆1,202Sep 2, 2022Updated 3 years ago
- Proof of Concepts☆1,323Nov 12, 2024Updated last year
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- the Network Protocol Fuzzer that we will want to use.☆793Jan 29, 2024Updated 2 years ago
- ☆2,513Jan 2, 2023Updated 3 years ago
- ☆1,379Jul 2, 2020Updated 5 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆82Jan 15, 2021Updated 5 years ago
- ☆282Nov 12, 2021Updated 4 years ago
- PoC CVE-2020-6308☆36Dec 29, 2020Updated 5 years ago
- This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-…☆4,390Updated this week
- Proofs-of-concept☆828Sep 3, 2024Updated last year
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- The cheat sheet about Java Deserialization vulnerabilities☆3,172May 26, 2023Updated 2 years ago
- ☆705Nov 27, 2024Updated last year
- RCE 0-day for GhostScript 9.50 - Payload generator☆544Sep 8, 2021Updated 4 years ago
- List DTDs and generate XXE payloads using those local DTDs.☆651Feb 21, 2024Updated 2 years ago
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆426Mar 20, 2022Updated 4 years ago
- ☆297Jul 2, 2024Updated last year
- RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.☆365Apr 14, 2022Updated 3 years ago
- Android Kernel Exploitation☆642Feb 13, 2022Updated 4 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,458Oct 1, 2025Updated 5 months ago
- Notes about attacking Jenkins servers☆2,089Jul 10, 2024Updated last year
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆659Feb 1, 2025Updated last year
- Client Side Prototype Pollution Scanner☆523Sep 17, 2022Updated 3 years ago
- 📡 PoC auto collect from GitHub. ⚠️ Be careful Malware.☆7,581Updated this week
- Microsoft » Windows 10 : Security Vulnerabilities☆923Nov 26, 2025Updated 3 months ago
- awesome list of browser exploitation tutorials☆2,270Sep 18, 2023Updated 2 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,041Jun 3, 2021Updated 4 years ago
- Analyze IoT firmware☆17Apr 24, 2021Updated 4 years ago
- Automation for internal Windows Penetrationtest / AD-Security☆3,650Aug 28, 2025Updated 6 months ago
- CVE-2018-13379☆254Aug 14, 2019Updated 6 years ago
- Framework for Automating Fuzzable Target Discovery with Static Analysis.☆549Feb 1, 2024Updated 2 years ago
- Apache Solr Injection Research☆580Jan 28, 2020Updated 6 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,349Dec 7, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆4,641Jul 18, 2024Updated last year
- Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.☆625Jun 13, 2020Updated 5 years ago
- PHPGGC is a library of PHP unserialize() payloads along with a tool to generate them, from command line or programmatically.☆3,768Sep 29, 2025Updated 5 months ago