Proofs-of-concept
☆828Sep 3, 2024Updated last year
Alternatives and similar repositories for PoC
Users that are interested in PoC are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability☆332Dec 30, 2018Updated 7 years ago
- FileReader Exploit☆256Mar 20, 2019Updated 7 years ago
- Proof of Concepts☆1,327Nov 12, 2024Updated last year
- Dump of win32k POCs for bugs I've found☆380Mar 6, 2022Updated 4 years ago
- ☆151Jan 7, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Local privilege escalation PoC exploit for CVE-2019-16098☆201Sep 13, 2019Updated 6 years ago
- Windows EoP Bugs☆127Jun 9, 2020Updated 5 years ago
- ☆844Dec 13, 2022Updated 3 years ago
- CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统☆187Jun 17, 2020Updated 5 years ago
- ☆1,379Jul 2, 2020Updated 5 years ago
- The exploit samples database is a repository for **RCE** (remote code execution) exploits and Proof-of-Concepts for **WINDOWS**, the samp…☆747Dec 11, 2023Updated 2 years ago
- Some kernel fuzzing paper about windows and linux☆255Oct 9, 2017Updated 8 years ago
- Windows Graphics Device Interface (GDI+) fuzzer☆130Aug 13, 2020Updated 5 years ago
- POC for cve-2019-1458☆180Jan 17, 2022Updated 4 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- ☆385Jan 12, 2024Updated 2 years ago
- Windows 10 RS2/RS3 exploitation primitives based on the OffensiveCon 2018 talk☆57Feb 27, 2018Updated 8 years ago
- RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl☆210Mar 10, 2019Updated 7 years ago
- A collection of links related to VMware escape exploits☆1,495Sep 4, 2024Updated last year
- ☆31Jan 4, 2018Updated 8 years ago
- CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege☆337Dec 23, 2021Updated 4 years ago
- ☆522Feb 22, 2020Updated 6 years ago
- My Chrome and Safari exploit code + write-up repo☆532Nov 5, 2021Updated 4 years ago
- Set of tools to analyze Windows sandboxes for exposed attack surface.☆2,276Nov 6, 2025Updated 4 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ✍️ A curated list of CVE PoCs.☆3,483Jan 4, 2022Updated 4 years ago
- Support ALL Windows Version☆722Sep 11, 2020Updated 5 years ago
- ☆164May 18, 2018Updated 7 years ago
- PoC exploiting Aligned Chunk Confusion on Windows kernel Segment Heap☆214Jul 2, 2020Updated 5 years ago
- This respository is a collection of C# class libraries which implement RPC clients for various versions of the Windows Operating System f…☆285May 14, 2020Updated 5 years ago
- ☆18Dec 3, 2024Updated last year
- collect for learning cases☆594Jun 16, 2024Updated last year
- A Bochs-based instrumentation performing kernel memory taint tracking to detect disclosure of uninitialized memory to ring 3☆310Feb 24, 2019Updated 7 years ago
- Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability detai…☆3,192Feb 15, 2023Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Binary, coverage-guided fuzzer for Windows, macOS, Linux and Android☆1,299Mar 2, 2026Updated 3 weeks ago
- A Pwn2Own exploit chain☆756Nov 8, 2018Updated 7 years ago
- POC and exploitation of vulnerabilities☆91Mar 22, 2022Updated 4 years ago
- ☆287Apr 23, 2020Updated 5 years ago
- CVE-2019-1040 with Exchange☆253Jun 18, 2021Updated 4 years ago
- A curated list of Hyper-V exploitation resources, fuzzing and vulnerability research.☆445Apr 11, 2025Updated 11 months ago
- List of Awesome Advanced Windows Exploitation References☆1,552Jan 13, 2022Updated 4 years ago