Containing vulnerabilities I've discovered and maybe CVE
☆19Apr 14, 2023Updated 2 years ago
Alternatives and similar repositories for Stuff_and_POCs
Users that are interested in Stuff_and_POCs are comparing it to the libraries listed below
Sorting:
- Simple CVE-2021-20294 poc☆11Jan 21, 2023Updated 3 years ago
- Dynamic-Static binary instrumentation framework on top of GDB☆50Sep 25, 2023Updated 2 years ago
- narly.js - print binary protections with Windbg JS (/SafeSEH, /GS, ASLR, etc.)☆15Nov 14, 2022Updated 3 years ago
- Exploit scripts for ctf challenges that involves linux kernel pwning☆17Dec 10, 2024Updated last year
- POC of CVE-2023-35086 only DoS☆44Jul 25, 2023Updated 2 years ago
- This page should help you with the recon for security issues.☆20Oct 14, 2022Updated 3 years ago
- CVE-2020-36109 PoC causing DoS☆17Apr 20, 2022Updated 3 years ago
- ☆31Feb 27, 2026Updated last week
- Map and modify ELF using C++ structures☆19Feb 28, 2021Updated 5 years ago
- Complete and comprehensive course for webmasters from beginner to advanced☆27Apr 14, 2023Updated 2 years ago
- Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046☆21Dec 23, 2021Updated 4 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Apr 14, 2023Updated 2 years ago
- Make exploiting race conditions in web applications highly efficient and ease-of-use.☆27Jun 18, 2025Updated 8 months ago
- HW interface for memory caches☆28Apr 21, 2020Updated 5 years ago
- Lightweight x86-64 instruction length disassembler (LDE)☆34Jun 17, 2023Updated 2 years ago
- ☆15Mar 21, 2025Updated 11 months ago
- c4mund0n60 is a tool that use output of known tools for generate smart information about a domain☆11Sep 20, 2023Updated 2 years ago
- An anonymous messenger without the need for any registration information☆11Nov 14, 2021Updated 4 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- light ifconfig☆14Apr 13, 2019Updated 6 years ago
- Python script to launch burp scans automatically☆32Jul 18, 2021Updated 4 years ago
- Vulnerability disclosure policies in the US Government's executive branch☆39Mar 28, 2023Updated 2 years ago
- A toy LDAP server in C for illustrative purposes☆12Apr 6, 2011Updated 14 years ago
- GreenLambert macOS IDA plugin to deobfuscate strings☆14Oct 4, 2021Updated 4 years ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 10 months ago
- A more realistic demo of a buffer overflow cause by -ffast-math☆15Sep 10, 2022Updated 3 years ago
- Constraint solver based on abstract interpretation☆10Dec 20, 2024Updated last year
- ☆10Feb 28, 2023Updated 3 years ago
- ☆12Oct 13, 2022Updated 3 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- A modern restaurant app made with swiftUI☆10May 4, 2022Updated 3 years ago
- Words Game writted in Javascript☆10Dec 29, 2022Updated 3 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- Lightweight x86-64 disassembling library☆45Aug 22, 2022Updated 3 years ago
- Sleep Obfuscation☆45Oct 13, 2022Updated 3 years ago
- Spacemesh command-line tool☆10Nov 21, 2025Updated 3 months ago
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated last month
- PSX provides a collection of common operations that rely on PowerShell like encoding and hosting PowerShell-specific payloads☆12Oct 18, 2023Updated 2 years ago
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago