thezdi / PoCLinks
Proofs-of-concept
☆791Updated 9 months ago
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below
Sorting:
- ☆1,344Updated 4 years ago
- PoC for triggering buffer overflow via CVE-2020-0796☆328Updated 2 years ago
- CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost☆1,323Updated 4 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆746Updated last year
- Proof of Concepts☆1,259Updated 6 months ago
- A collection of pentest and development tips☆1,112Updated 3 years ago
- TCP tunneling over HTTP/HTTPS for web application servers☆740Updated 8 years ago
- CVE-2020-0796 Remote Code Execution POC☆555Updated 4 years ago
- Some of my exploits.☆583Updated 4 years ago
- The Elevate Kit demonstrates how to use third-party privilege escalation attacks with Cobalt Strike's Beacon payload.☆914Updated 4 years ago
- Support ALL Windows Version☆718Updated 4 years ago
- Scanner for CVE-2020-0796 - SMBv3 RCE☆681Updated 4 years ago
- Java RMI enumeration and attack tool.☆732Updated 7 years ago
- The great impacket example scripts compiled for Windows☆963Updated 6 years ago
- Proof of concept for CVE-2019-0708☆1,185Updated 3 years ago
- Vulnerability Labs for security analysis☆1,172Updated 4 years ago
- An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits☆345Updated 4 years ago
- Malleable C2 is a domain specific language to redefine indicators in Beacon's communication. This repository is a collection of Malleable…☆1,541Updated 4 years ago
- ☆383Updated last year
- dump☆493Updated 6 years ago
- office-exploits Office漏洞集合 https://www.sec-wiki.com☆421Updated 6 years ago
- Token Privilege Research☆826Updated 7 years ago
- Practice Go programming and implement CobaltStrike's Beacon in Go☆1,209Updated 4 years ago
- Sudo Baron Samedit Exploit☆754Updated 3 years ago
- A collection of links related to VMware escape exploits☆1,432Updated 9 months ago
- Windows exploits, mostly precompiled. Not being updated. Check https://github.com/SecWiki/windows-kernel-exploits instead.☆1,874Updated 4 years ago
- Cobalt Strike Malleable C2 Design and Reference Guide☆1,686Updated last year
- Collection of Aggressor scripts for Cobalt Strike 3.0+ pulled from multiple sources☆1,505Updated last year
- CVE-2018-8120 Windows LPE exploit☆497Updated 7 years ago
- exp for https://research.checkpoint.com/extracting-code-execution-from-winrar☆491Updated 5 years ago