pwnfuzz / POCsLinks
Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.
☆50Updated 2 months ago
Alternatives and similar repositories for POCs
Users that are interested in POCs are comparing it to the libraries listed below
Sorting:
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆84Updated 2 months ago
- ☆56Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆95Updated last year
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 7 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 9 months ago
- ☆38Updated last week
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 4 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 8 months ago
- ☆59Updated 7 months ago
- ☆59Updated last year
- Work, timer, and wait callback example using solely Native Windows APIs.☆89Updated last year
- Source code and examples for PassiveAggression☆61Updated 11 months ago
- A Moodle Scanner☆42Updated 6 months ago
- Pre-Auth Exploit for CVE-2024-40711☆49Updated 8 months ago
- Inject RDPThief into memory with PowerShell.☆64Updated 4 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 7 months ago
- ysoserial.net docker image☆28Updated 8 months ago
- Automatically extract and decrypt all configured scanning credentials of a Lansweeper instance.☆37Updated 6 months ago
- POC of GITHUB simple C2 in rust☆53Updated 4 months ago
- Repo for all my exploits/PoCs☆50Updated 3 weeks ago
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 5 months ago
- PowerShell script to generate ShellCode in various formats☆41Updated 8 months ago
- List of some AD tools I frequently use☆46Updated 4 months ago
- Active Directory Authentication Library☆73Updated 3 weeks ago
- Shellcode Tester Pro is a graphical interface tool for analysis, simulated execution, and reverse engineering of malicious shellcodes.☆29Updated last month
- A small red team course☆39Updated last year
- ☆136Updated 3 weeks ago
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆36Updated 4 months ago
- Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analys…☆73Updated last week
- A tool to exchange decryption keys for command and control (C2) beacons and implants through DNS records.☆39Updated 2 years ago