A short scraper looking for a POC of CVE-2024-49112
☆13Dec 16, 2024Updated last year
Alternatives and similar repositories for poc_monitor
Users that are interested in poc_monitor are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Notion C2 Profile for Mythic☆42Mar 3, 2026Updated last month
- Execute shellcode via Bluetooth device authentication☆40Feb 19, 2025Updated last year
- ☆27Mar 6, 2025Updated last year
- Demonstrates consuming from a SecurityTrace ETW session by consuming from the Threat-Intelligence ETW provider without a driver or PPL pr…☆74Jan 19, 2026Updated 2 months ago
- Proof-of-concept implementation of AI-enabled postex DLLs☆52Sep 10, 2025Updated 7 months ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- A cap/pcap packet parser to make life easier when performing stealth/passive reconnaissance.☆22Jul 17, 2024Updated last year
- Built for red teamers, by red teamers - an MCP tool for malware development, OPSEC testing, and supporting custom loader design during re…☆44Aug 10, 2025Updated 8 months ago
- A framework for OAuth 2.0 device code authentication grant flow phishing☆46May 31, 2023Updated 2 years ago
- Shellcode loader that executes embedded Lua from Rust.☆124Dec 16, 2024Updated last year
- Examples of various container types for Python and Golang☆15Aug 29, 2025Updated 7 months ago
- ☆17Jul 16, 2024Updated last year
- This is the Git repository for the Modern Red Teaming workshop given at SINCON2024.☆13May 23, 2024Updated last year
- Callstack spoofing using a VEH because VEH all the things.☆23Mar 18, 2025Updated last year
- Comprehensive logging of all terminal input and output for each session based on Asciinema and wild zsh + Python scripting.☆43Jan 6, 2026Updated 3 months ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Utilizng an MCP Server to communicate with your C2☆89May 15, 2025Updated 10 months ago
- PoC BSOD for CVE-2020-16898 (badneighbor)☆22Oct 16, 2020Updated 5 years ago
- Collection of Thorrak's PCBs☆11Apr 16, 2025Updated 11 months ago
- Tool to extract username and password of current user from PanGPA in plaintext☆89Dec 23, 2024Updated last year
- Shellcode Loader Utilizing ETW Events☆66Feb 26, 2025Updated last year
- view RedFlagDeals.com from the command line☆10Jul 6, 2024Updated last year
- Dump protected process memory by using BYOVD to tamper with handle objects in the kernel.☆40Aug 5, 2025Updated 8 months ago
- Azure Post Exploitation Framework☆246Oct 27, 2025Updated 5 months ago
- Pwdlyser is an all encompassing security auditing tool. This repo serves as the open-source base for the new version of Pwdlyser (previou…☆24Sep 3, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ProxyWatch☆48Apr 3, 2026Updated last week
- An Ansible collection that installs an SCCM deployment with optional configurations.☆105Dec 8, 2025Updated 4 months ago
- Windows NTLM hash dump utility written in C language, that supports Windows and Linux. Hashes can be dumped in realtime or from already s…☆67Dec 29, 2023Updated 2 years ago
- ☆26Feb 11, 2025Updated last year
- MIPS VM to execute payloads without allocating executable memory. Based on a PlayStation 1 (PSX) Emulator.☆125Dec 6, 2024Updated last year
- Automatically deploy Nemesis☆21Jun 14, 2024Updated last year
- ☆38Apr 15, 2025Updated 11 months ago
- Offshore.CAT provides DMCA-ignored offshore hosting solutions. Built with HTML and CSS, it offers an intuitive interface for seamless int…☆19Sep 9, 2025Updated 7 months ago
- ☆23Mar 6, 2023Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A collection of tools using OCR to extract potential usernames from RDP screenshots.☆30Apr 15, 2024Updated last year
- A not-curated list of cloud hacking labs☆26Apr 18, 2024Updated last year
- A multi-platform CI/CD vulnerability detection and attack automation tool for identifying security weaknesses in pipeline configurations.☆132Updated this week
- Deep Dork Web is a browser-based tool designed to automate Google Dork searches for ethical security research. It supports advanced queri…☆20Mar 13, 2025Updated last year
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- A tool to abuse Exchange services☆12Mar 18, 2024Updated 2 years ago
- ☆12Feb 4, 2025Updated last year