pwnfuzz / POCs
Personal collection of exploits and PoCs across Windows, Linux, and enterprise software.
☆50Updated last month
Alternatives and similar repositories for POCs:
Users that are interested in POCs are comparing it to the libraries listed below
- List of some AD tools I frequently use☆45Updated 3 months ago
- Retrieve LAPS passwords from a domain. The tools is inspired in pyLAPS.☆82Updated 2 months ago
- ☆56Updated 5 months ago
- Simple C2 using GitHub repository as comms channel.☆31Updated 6 months ago
- Exploit AD CS misconfiguration allowing privilege escalation and persistence from any child domain to full forest compromise☆95Updated last year
- Java archive implant toolkit.☆60Updated 2 weeks ago
- .NET deserialization hunter☆77Updated 9 months ago
- Source code and examples for PassiveAggression☆56Updated 11 months ago
- POC of GITHUB simple C2 in rust☆53Updated 3 months ago
- ysoserial.net docker image☆28Updated 7 months ago
- Proof of Concept Exploit for CVE-2024-9464☆45Updated 6 months ago
- Docker container for running CobaltStrike 4.10☆37Updated 7 months ago
- PfSense Stored XSS lead to Arbitrary Code Execution exploit☆47Updated 3 months ago
- Dump Kerberos tickets from the KCM database of SSSD☆50Updated 7 months ago
- vulnlab.com reaper writeup☆26Updated last year
- CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)☆37Updated 2 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆84Updated 4 months ago
- Contexter - A secondary context path traversal / server-side parameter pollution testing tool written in Python 3☆22Updated 8 months ago
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆40Updated 11 months ago
- ☆59Updated last year
- APT Emulation tool to exfiltrate sensitive .docx, .pptx, .xlsx, .pdf files☆81Updated last month
- Microsoft Telnet Server MS-TNAP Authentication Bypass Exploit☆10Updated last week
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last year
- The OUned project automating Active Directory Organizational Units ACL exploitation through gPLink poisoning☆112Updated last month
- ☆58Updated 7 months ago
- ☆52Updated last year
- Repo for all my exploits/PoCs☆50Updated 2 months ago
- ☆62Updated this week
- ☆54Updated 2 months ago
- SANS Workshop: Active Directory Privilege Escalation with Empire!☆29Updated last month