testanull / awesome-cve-pocLinks
✍️ A curated list of CVE PoCs.
☆12Updated 7 years ago
Alternatives and similar repositories for awesome-cve-poc
Users that are interested in awesome-cve-poc are comparing it to the libraries listed below
Sorting:
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆64Updated 5 years ago
- Rodan Exploitation Framework☆102Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated last year
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Just another vulnerable web application.☆36Updated last year
- Unicode encoding attacks with machine learning☆97Updated 3 years ago
- ☆27Updated 6 years ago
- Random Exploits☆50Updated 2 years ago
- ☆30Updated 5 years ago
- Rawsec's Cybersecurity Inventory cli. Search pentesting tools, resources, ctf, os.☆27Updated last week
- Pentest stuff☆49Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆32Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- TightVNC Vulnerability.☆16Updated 3 years ago
- ☆54Updated 4 years ago
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Volatility MindMap & Cheat Sheet☆29Updated 3 years ago
- Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
- Network Shredder IDS☆11Updated last year
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- The best exploitation tool for SSL VPN 0day vulnerabilities.☆81Updated 3 years ago
- Reverse Shell troll software☆12Updated 6 years ago
- Antiscan.me automatization script☆30Updated last year
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆17Updated 3 years ago
- Windows Privilege Escalation☆30Updated 5 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Collection of our CTF write-ups☆29Updated 5 years ago
- Passive reconnaissance/enumeration of interesting targets by watching for SSL certificates being issued☆68Updated 3 years ago