Misc PoCs for various research topics
☆21Sep 28, 2022Updated 3 years ago
Alternatives and similar repositories for poc
Users that are interested in poc are comparing it to the libraries listed below
Sorting:
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- ☆49Feb 16, 2018Updated 8 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆51Jun 17, 2016Updated 9 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- Coverage-guided fuzzing for Python☆20Oct 31, 2017Updated 8 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- CVE-2014-0816☆25Oct 5, 2016Updated 9 years ago
- An XNU kernel fuzz tool☆22Mar 3, 2010Updated 16 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- A PCode Emulator for Ghidra.☆113Feb 7, 2021Updated 5 years ago
- ☆29May 10, 2020Updated 5 years ago
- Corpus of crypto formats☆12Dec 2, 2022Updated 3 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆21Jul 29, 2018Updated 7 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)☆14Jun 7, 2018Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Feb 27, 2020Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- Script to perform quick 'n dirty fuzzing of PCAPs with radamsa and Scapy.☆172Sep 27, 2017Updated 8 years ago
- ☆16Nov 16, 2015Updated 10 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- A bunch of links related to Linux kernel fuzzing and exploitation☆15Nov 29, 2016Updated 9 years ago