Proof-of-Concept code for exploits
☆82May 5, 2016Updated 9 years ago
Alternatives and similar repositories for exploit-poc
Users that are interested in exploit-poc are comparing it to the libraries listed below
Sorting:
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- Exploits and research stuffs☆54Jan 19, 2026Updated last month
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- ☆137Mar 29, 2018Updated 7 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- ☆111May 16, 2017Updated 8 years ago
- Generic cracker example which is compatible with Hashtopolis☆23May 18, 2021Updated 4 years ago
- ☆20Jun 2, 2016Updated 9 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- CVE-2022-26135☆11Jul 12, 2022Updated 3 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- The ultimate tool to crafting your ARM shell code☆10Aug 7, 2015Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Exporters for OllyDbg and ImmunityDbg for use with zynamics BinNavi <= 3.0☆18Jan 10, 2012Updated 14 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Patches to allow building old OpenWrt versions in modern distros (using gcc 5.x and newer versions)☆10Jan 16, 2023Updated 3 years ago
- CVE-2015-2231 POC☆10Sep 8, 2015Updated 10 years ago
- IDA scripts that facilitate reverse engineering☆16Aug 10, 2016Updated 9 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆15Sep 4, 2014Updated 11 years ago
- Fuzzing web services in style with nodejs☆10Aug 10, 2019Updated 6 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- Laniakea is a utility for managing instances at various cloud providers and aids in setting up a fuzzing cluster.☆27Jun 1, 2021Updated 4 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆60May 11, 2015Updated 10 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- gdb plugin for android debugging☆103Jun 20, 2016Updated 9 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- ☆15May 23, 2019Updated 6 years ago
- Introduction to Reverse Engineering Training☆11Apr 22, 2015Updated 10 years ago
- Technical add-on to ingest json formatted volatility memory analysis plugin outputs☆13May 21, 2018Updated 7 years ago