pedrib / PoC
Advisories, proof of concept files and exploits that have been made public by @pedrib.
☆812Updated 7 months ago
Related projects: ⓘ
- This is a repo which documents real bugs in real software to illustrate trends, learn how to prevent or find them more quickly.☆794Updated 2 years ago
- ☆943Updated this week
- ☆1,094Updated 7 years ago
- Repository for information about 0-days exploited in-the-wild.☆752Updated 3 weeks ago
- Proof of Concepts☆1,207Updated 6 months ago
- pwning IPv4 via IPv6☆1,675Updated 6 months ago
- Create tar/zip archives that can exploit directory traversal vulnerabilities☆968Updated 3 years ago
- Collection of PoC and offensive techniques used by the BlackArrow Red Team☆1,051Updated 2 months ago
- Tool for extracting information from newly spawned processes☆720Updated 2 years ago
- A collection of proof-of-concept exploit scripts written by the team at Rhino Security Labs for various CVEs.☆791Updated 2 months ago
- A handy collection of my public exploits, all in one place.☆591Updated 8 months ago
- Various kernel exploits☆732Updated 6 months ago
- exploits and proof-of-concept vulnerability demonstration files from the team at Hacker House☆415Updated 4 months ago
- Windows Privilege Escalation from User to Domain Admin.☆1,318Updated last year
- A sugared version of RottenPotatoNG, with a bit of juice, i.e. another Local Privilege Escalation tool, from a Windows Service Accounts t…☆2,385Updated 2 years ago
- Herramienta para evadir disable_functions y open_basedir☆387Updated last year
- Exploit for zerologon cve-2020-1472☆625Updated 3 years ago
- PoC for Zerologon - all research credits go to Tom Tervoort of Secura☆1,173Updated 3 years ago
- Search gtfobins and lolbas files from your terminal☆455Updated 2 years ago
- PoC exploits for software vulnerabilities☆676Updated 3 years ago
- A DNS rebinding attack framework.☆1,018Updated 3 months ago
- ☆684Updated last year
- Enumerate missing KBs and suggest exploits for useful Privilege Escalation vulnerabilities☆1,533Updated 3 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆1,500Updated last year
- Red Team Scripts by d0nkeys (ex SnadoTeam)☆688Updated 4 years ago
- A collection of links related to VMware escape exploits☆1,354Updated 2 weeks ago
- Proofs-of-concept☆751Updated 2 weeks ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,295Updated 3 years ago
- Notes about attacking Jenkins servers☆1,949Updated 2 months ago
- The legacy Exploit Database paper repository - New repo located at https://gitlab.com/exploit-database/exploitdb-papers☆446Updated last year