pwnfuzz / POCsLinks
Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.
☆54Updated 3 months ago
Alternatives and similar repositories for POCs
Users that are interested in POCs are comparing it to the libraries listed below
Sorting:
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆48Updated 9 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆101Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated last year
- ysoserial.net docker image☆28Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 7 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- ☆59Updated 11 months ago
- Java archive implant toolkit.☆61Updated 6 months ago
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆87Updated 2 months ago
- Convert your shellcode into an ASCII string☆124Updated 4 months ago
- vulnlab.com reaper writeup☆27Updated 2 years ago
- ☆63Updated last year
- ☆34Updated last year
- Pre-Auth Exploit for CVE-2024-40711☆53Updated last year
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆23Updated last year
- A small red team course☆39Updated 2 years ago
- ☆44Updated 2 weeks ago
- POC of GITHUB simple C2 in rust☆52Updated 3 months ago
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆78Updated 11 months ago
- Go collector for adding Ansible WorX and Ansible Tower attack paths to BloodHound with OpenGraph☆61Updated 2 months ago
- ☆68Updated 9 months ago
- A proof-of-concept C2 channel through DuckDuckGo's image proxy service☆74Updated last year
- RCE through a race condition in Apache Tomcat☆56Updated 10 months ago
- Source code and examples for PassiveAggression☆63Updated last year
- ☆61Updated last year
- Opsec tool for finding user sessions by analyzing event log files through RPC (MS-EVEN)☆75Updated last year
- Fortinet FortiClient EMS SQL Injection☆50Updated last year
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- .NET deserialization hunter☆80Updated last year
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆148Updated last year