sourceincite / pocLinks
Proof of Concept's provided by Source Incite
☆37Updated 7 years ago
Alternatives and similar repositories for poc
Users that are interested in poc are comparing it to the libraries listed below
Sorting:
- ☆97Updated 3 years ago
- A quick and dirty .NET "Deserialize_*" fuzzer based on James Forshaw's (@tiraniddo) DotNetToJScript.☆42Updated 6 years ago
- Repository for my talk on Desktop Bridge at Zer0Con 2018.☆33Updated 7 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- Radamsa fuzzer extension for Burp Suite☆23Updated 12 years ago
- ☆24Updated 9 years ago
- ☆44Updated 6 years ago
- CVE-2018-8440 standalone exploit☆79Updated 6 years ago
- Scripts targeting specific families☆13Updated 7 years ago
- HEVD Multi-Exploit by m_101☆23Updated 7 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 7 years ago
- Python based module to find common vulnerabilities which lead to Windows privilege escalation☆32Updated 8 years ago
- Some sample code from my Zero Nights 2017 presentation.☆61Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Updated 8 years ago
- Research project on Automating Exploitation on Format String Vulnerabilities☆8Updated 9 years ago
- ☆25Updated last year
- My fuzzing workshop from PHDays9☆26Updated 6 years ago
- Kerberom is a tool aimed to retrieve ARC4-HMAC'ed encrypted Tickets Granting Service (TGS) of accounts having a Service Principal Name (S…☆36Updated 7 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year
- Random source codes☆25Updated 5 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- ☆50Updated 5 years ago
- ☆22Updated 9 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- ☆51Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Training material for the Shellcode-Lab, including Slides and Codes☆18Updated 6 years ago
- Various exploits for the HackSys Extreme Vulnerable Driver☆36Updated 8 years ago
- A fork of AFL for fuzzing Windows binaries☆23Updated 7 years ago
- NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements☆96Updated 7 years ago