Misc PoCs for various research topics
☆21Sep 28, 2022Updated 3 years ago
Alternatives and similar repositories for poc
Users that are interested in poc are comparing it to the libraries listed below
Sorting:
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- Grepify the GUI Regex Text Scanner for Code Reviewers☆23Apr 15, 2013Updated 12 years ago
- Run a windows process with many inputs and catch exit codes☆14Jan 5, 2016Updated 10 years ago
- macOS 10.13.3 (17D47) Safari Wasm Exploit☆119Apr 19, 2018Updated 7 years ago
- The pyspresso package is a Python-based framework for debugging Java.☆51Jun 17, 2016Updated 9 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Jun 29, 2015Updated 10 years ago
- Fuzzer for the Mac Kernel☆18Jan 3, 2013Updated 13 years ago
- ☆13Jul 31, 2020Updated 5 years ago
- ☆13Jun 13, 2017Updated 8 years ago
- Tool to make in memory man in the middle☆125Oct 8, 2018Updated 7 years ago
- A dashboard for interesting DOM tricks/techniques.☆35Dec 9, 2020Updated 5 years ago
- full exploit of pwnfest2016, slide and full text of syscan2017☆165Jun 14, 2017Updated 8 years ago
- Ruby plugin for IDAPro☆25Dec 5, 2011Updated 14 years ago
- Exploit Android MSM8974 Chipset☆13Aug 20, 2015Updated 10 years ago
- ☆14Aug 31, 2021Updated 4 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI -> Low Integrity to System☆15Mar 30, 2017Updated 8 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- covFuzz☆34Jun 8, 2017Updated 8 years ago
- It's like DocBleach, but in your browser☆18Oct 24, 2019Updated 6 years ago
- 🚒 Don't let threats reach your machines — USB Mass Storage Gateway☆17Oct 30, 2019Updated 6 years ago
- OpenType font file format fuzzer for Windows☆52Jun 8, 2013Updated 12 years ago
- ARM rop chain gadget searcher☆38Oct 20, 2017Updated 8 years ago
- A script to attack users who are RDPing into a machine and recurse this attack. For security testers and attack simulations.☆19Jun 29, 2017Updated 8 years ago
- A project in Golang that will create prefix-based magic MD5 hashes for type juggling.☆20Jul 29, 2018Updated 7 years ago
- ☆12Jun 1, 2016Updated 9 years ago
- Proof-of-Concept Dictionary Attacker against IKEv1 PSK in Main Mode☆18Nov 28, 2019Updated 6 years ago
- Burp extension to quickly and easily develop Python complex exploits based on Burp proxy requests.☆32Nov 29, 2015Updated 10 years ago
- A PCode Emulator for Ghidra.☆113Feb 7, 2021Updated 5 years ago
- Recent Fuzzing Paper☆36Jul 25, 2023Updated 2 years ago
- Repository containing many useful scripts☆75Mar 30, 2022Updated 3 years ago
- You don't need to be as fast as lightspeed, but a run on a treadm1ll surely doesn't hurt.☆53Jan 23, 2020Updated 6 years ago
- Tools for analysing the forward DNS data set published at https://scans.io/study/sonar.fdns_v2☆17Sep 17, 2017Updated 8 years ago
- Write Up I write for different CTFs☆12Nov 20, 2017Updated 8 years ago
- A program to draw rectangles from heap traces.☆135Feb 27, 2020Updated 6 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- Block-based software vulnerability fuzzing framework☆49Dec 22, 2018Updated 7 years ago
- Talk and materials for Offensive Con presentation - Privileged Helper Tools☆47Feb 15, 2019Updated 7 years ago