pwnfuzz / POCsLinks
Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.
☆50Updated last month
Alternatives and similar repositories for POCs
Users that are interested in POCs are comparing it to the libraries listed below
Sorting:
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 8 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆99Updated last year
- ☆44Updated 2 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 11 months ago
- List of some AD tools I frequently use☆48Updated 3 months ago
- ☆59Updated 10 months ago
- Veeam Backup Enterprise Manager Authentication Bypass (CVE-2024-29849)☆90Updated last year
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆87Updated 6 months ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆90Updated last month
- ysoserial.net docker image☆29Updated 11 months ago
- ☆61Updated 11 months ago
- ☆68Updated 8 months ago
- RCE through a race condition in Apache Tomcat☆56Updated 8 months ago
- Convert your shellcode into an ASCII string☆114Updated 2 months ago
- Java archive implant toolkit.☆61Updated 4 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated last year
- Repo for all my exploits/PoCs☆52Updated 4 months ago
- ☆34Updated last year
- Fortinet FortiClient EMS SQL Injection☆50Updated last year
- This is a GRE PoC code for Talks: From Spoofing to Tunneling: New Red Team's Networking Techniques for Initial Access and Evasion☆76Updated 3 weeks ago
- Exploits Unauth Docker API☆41Updated 5 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆33Updated last month
- Small toolkit for extracting information and dumping sensitive strings from Windows processes☆115Updated last year
- PoC that downloads an executable from a public SSL certificate☆128Updated last month
- A tool for quickly evaluating IAM permissions in AWS.☆58Updated last year
- ☆71Updated last year
- ☆68Updated 7 months ago
- CVE-2025-31644: Command Injection in Appliance mode in F5 BIG-IP☆22Updated 4 months ago
- Pre-Auth Exploit for CVE-2024-40711☆54Updated last year
- ☆59Updated last year