testanull / awesome-cve-pocLinks
✍️ A curated list of CVE PoCs.
☆13Updated 8 years ago
Alternatives and similar repositories for awesome-cve-poc
Users that are interested in awesome-cve-poc are comparing it to the libraries listed below
Sorting:
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- Random Exploits☆50Updated 2 years ago
- Rodan Exploitation Framework☆103Updated last month
- Collection of python3 exploits written by me to practice exploit development. Also is good preparation for OSED-301 course released by of…☆26Updated 4 years ago
- IoT Malware Similarity Analysis Platform☆45Updated 4 years ago
- Public Exploits + Extra-curriculum for OSCE Exam Preparation☆79Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Just another vulnerable web application.☆36Updated last year
- This Buffer Overflow Toolkit works through FTP, SMTP, POP, HTTP protocols as well file outputs for playlists exploiting customized variab…☆18Updated 4 years ago
- ☆28Updated 6 years ago
- Pentest stuff☆50Updated 2 years ago
- OSCP guide and Red Team assessment Guide☆37Updated 5 years ago
- TightVNC Vulnerability.☆16Updated 4 years ago
- Easy to configure Honeypot for Blue Team☆43Updated 7 months ago
- ☆30Updated 5 years ago
- Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1☆58Updated 2 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- Blue Pigeon is a Bluetooth-based data exfiltration and proxy tool to enable communication between a remote Command and Control (C2) serve…☆55Updated 4 years ago
- Antiscan.me automatization script☆29Updated last year
- Any presentation we've given at FortyNorth Security☆34Updated 4 years ago
- AutoDecoder tool for CTFs☆17Updated 7 years ago
- MacInjector is a tool that lists macOS applications, checks code-signing vulnerabilities, and injects a dynamic library (dylib) into a vu…☆17Updated 3 months ago
- Generate image payloads in JS to bypass filters☆39Updated 4 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆107Updated 2 years ago
- material for exploit development☆18Updated 6 years ago
- Materials from different CTFs for later reuse☆27Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated 2 years ago
- An application to test windows and linux shellcodes☆95Updated last year
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Updated 3 years ago
- Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.☆44Updated 3 years ago