Proof Of Concepts
☆55Jan 4, 2026Updated last month
Alternatives and similar repositories for POCs
Users that are interested in POCs are comparing it to the libraries listed below
Sorting:
- Exploit for CVE-2024-29847☆18Sep 15, 2024Updated last year
- CVE-2023-34992: Fortinet FortiSIEM Command Injection Proof of Concept Exploit☆27May 21, 2024Updated last year
- A Rust template for writing Beacon Object Files (BOFs)☆100Feb 11, 2026Updated 2 weeks ago
- Exploit for CVE-2024-20767 - Adobe ColdFusion☆34Dec 19, 2024Updated last year
- ☆59Nov 18, 2024Updated last year
- Exploit for Grafana arbitrary file-read and RCE (CVE-2024-9264)☆130Dec 16, 2024Updated last year
- Windows WLAN AutoConfig Service Elevation of Privilege Vulnerability☆24Feb 5, 2025Updated last year
- iot-vuls☆24Mar 19, 2024Updated last year
- undust is a URL pattern generator that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it ge…☆52Jul 17, 2025Updated 7 months ago
- ☆11Apr 30, 2021Updated 4 years ago
- CVE-2023-20198-RCE, support adding/deleting users and executing cli commands/system commands.☆42Apr 25, 2024Updated last year
- ☆33Jan 23, 2025Updated last year
- CyberPanel 2.3.6 pre-auth RCE☆40Oct 27, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- PAN-OS auth bypass + RCE☆47Nov 19, 2024Updated last year
- Multi-agent AI system using GPT-4o, DeepSeek v3, and Llama 3.3 to detect if CVE vulnerabilities were exploited as zero-days. Analyzes…☆20Feb 13, 2026Updated 2 weeks ago
- ☆82Apr 9, 2024Updated last year
- Open Source eBPF Malware Analysis Framework☆54Oct 20, 2024Updated last year
- Windows Administrator level Implant.☆50Sep 28, 2024Updated last year
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆211Jun 10, 2024Updated last year
- lsassdump via RtlCreateProcessReflection and NanoDump☆85Oct 18, 2024Updated last year
- ManageEngine ADManager Command Injection☆11Oct 2, 2023Updated 2 years ago
- HackerOne Notifier is an automated bot that monitors new programs launched on HackerOne and sends Telegram Bot notifications whenever a n…☆22Nov 4, 2025Updated 3 months ago
- 免杀木马样本☆103Oct 11, 2025Updated 4 months ago
- Exploit for CVE-2024-4883☆11Jul 8, 2024Updated last year
- ☆15Aug 12, 2024Updated last year
- ☆24Feb 7, 2025Updated last year
- self-hosted Azure OSINT tool☆33Jun 24, 2025Updated 8 months ago
- Advanced Telegram x Discord C2, great for data Exfitration and Network evasion 🔷☆85Feb 22, 2025Updated last year
- Circumventing "noexec" mount flag to execute arbitrary linux binaries by ptrace-less process injection☆141May 27, 2025Updated 9 months ago
- ☆158Jul 10, 2024Updated last year
- Azure Post Exploitation Framework☆244Oct 27, 2025Updated 4 months ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Feb 15, 2024Updated 2 years ago
- Progress OpenEdge Authentication Bypass☆16Mar 6, 2024Updated last year
- Python script that fetches, analyzes, and reports Microsoft Patch Tuesday updates via the MSRC API — with a clean web interface for easy …☆24Updated this week
- ☆59Dec 15, 2023Updated 2 years ago
- This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.☆55Apr 18, 2024Updated last year
- A Rust PoC implementation of the Early Bird process hollowing technique, inspired by https://github.com/boku7/HOLLOW.☆31Feb 7, 2025Updated last year
- .NET tool used to enrich RPC telemetry☆101Jan 24, 2026Updated last month