pedrib / PoCLinks
Advisories, proof of concept files and exploits that have been made public by @pedrib.
☆852Updated 9 months ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆801Updated 3 years ago
- PoC exploits for software vulnerabilities☆689Updated 4 years ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆461Updated last week
- Repository for information about 0-days exploited in-the-wild.☆851Updated last month
- A handy collection of my public exploits, all in one place.☆672Updated last month
- PoC for CVE-2021-3156 (sudo heap overflow)☆434Updated 3 years ago
- A DNS rebinding attack framework.☆1,254Updated 2 months ago
- Various kernel exploits☆803Updated last year
- Proof of Concepts☆1,321Updated last year
- ☆709Updated last year
- Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.☆833Updated 4 years ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆1,037Updated 4 years ago
- Proofs-of-concept☆822Updated last year
- Zero-day and N-day security vulnerability notes, analysis, and proof-of-concepts☆424Updated 3 years ago
- [Linux] Two Privilege Escalation techniques abusing sudo token☆732Updated 6 years ago
- A collection of links related to VMware escape exploits☆1,487Updated last year
- Linux privilege escalation exploit via snapd (CVE-2019-7304)☆683Updated 6 years ago
- Search gtfobins and lolbas files from your terminal☆462Updated 3 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆888Updated 8 months ago
- ☆1,375Updated 5 years ago
- Exploit for zerologon cve-2020-1472☆683Updated 5 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,276Updated 5 years ago
- CVE-2020-0796 Remote Code Execution POC☆570Updated 5 years ago
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆704Updated 5 years ago
- Linux post exploitation privilege escalation enumeration☆259Updated 5 years ago
- Some of my exploits.☆598Updated 4 years ago
- JNDI-Exploitation-Kit(A modified version of the great JNDI-Injection-Exploit created by @welk1n. This tool can be used to start an HTTP S…☆935Updated 5 months ago
- Automatic exploit generation for simple linux pwn challenges.☆321Updated 2 years ago
- Sudo Baron Samedit Exploit☆793Updated 4 years ago
- Hackish way to intercept and modify non-HTTP protocols through Burp & others.☆619Updated last year