pwnfuzz / POCs
My POCs for CVEs & stuff
☆50Updated last week
Alternatives and similar repositories for POCs:
Users that are interested in POCs are comparing it to the libraries listed below
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆79Updated last month
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆93Updated last year
- ☆54Updated 4 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 6 months ago
- .NET deserialization hunter☆76Updated 8 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 2 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 7 months ago
- Source code and examples for PassiveAggression☆55Updated 10 months ago
- List of some AD tools I frequently use☆46Updated 2 months ago
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆82Updated last week
- A Moodle Scanner☆40Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆36Updated 6 months ago
- POC of GITHUB simple C2 in rust☆53Updated 2 months ago
- .NET Post-Exploitation Utility for Abusing Explicit Certificate Mappings in ADCS☆123Updated 2 months ago
- Active Directory Authentication Library☆60Updated 3 weeks ago
- ☆59Updated last year
- ☆49Updated 5 months ago
- ☆38Updated 2 months ago
- Windows Administrator level Implant.☆49Updated 6 months ago
- ysoserial.net docker image☆28Updated 6 months ago
- PoC for using MS Windows printers for persistence / command and control via Internet Printing☆145Updated 11 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆83Updated 3 months ago
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last week
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆109Updated 8 months ago
- A red teaming attack paradigm against AI Agents☆28Updated last month
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆27Updated last week
- Inject RDPThief into memory with PowerShell.☆62Updated 2 months ago
- ☆54Updated last month
- ☆37Updated last month
- exfiltration/infiltration toolkit☆23Updated last year