sourceincite / pocLinks
Proof of Concept's provided by Source Incite
☆37Updated 8 years ago
Alternatives and similar repositories for poc
Users that are interested in poc are comparing it to the libraries listed below
Sorting:
- ☆43Updated 7 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Updated 6 years ago
- ☆101Updated 3 years ago
- Exploitation challenges for CTF☆63Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆95Updated 8 years ago
- PoC for Foxit Reader CVE-2018-14442☆57Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- DerbyCon 2017 Presentation VMware Escapology: How to Houdini the Hypervisor☆58Updated 7 years ago
- Windows 8.1 x64 Exploit for MS16-098 RNGOBJ_Integer_Overflow☆92Updated 8 years ago
- UAC 0Day all day!☆57Updated 8 years ago
- CVE-2018-8440 standalone exploit☆80Updated 6 years ago
- Workshop material for a Windows Attack Surface Analysis Workshop☆68Updated 6 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- Various PoCs and challenges regarding heap userland exploitation☆54Updated 7 years ago
- Break Apps with Frida workshop material☆46Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- ☆53Updated 8 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Simple vulnerability scanning framework☆51Updated 9 years ago
- Public slides and demo code of bypassing security protection in the latest Windows Internet Explorer.☆90Updated 12 years ago
- MS17-012 - COM Session Moniker EoP Exploit running within MSBuild.exe☆60Updated 8 years ago
- Archive Mirror for recently republished PoC/Exploit code☆20Updated 7 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Updated 6 years ago
- ☆43Updated 7 years ago
- public exploits☆35Updated 2 years ago
- Materials for the Evolutionary Kernel Fuzzing talk at Black Hat USA 2017☆69Updated 8 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆30Updated 9 years ago
- The Zulu fuzzer☆124Updated 8 years ago