Proof-of-Concept code for exploits
☆82May 5, 2016Updated 9 years ago
Alternatives and similar repositories for exploit-poc
Users that are interested in exploit-poc are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploits and research stuffs☆54Jan 19, 2026Updated 2 months ago
- Some Of Huawei Routers Exploits☆13Sep 1, 2016Updated 9 years ago
- ☆138Mar 29, 2018Updated 7 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆33Feb 26, 2016Updated 10 years ago
- 0x88 exploit pack Decoded☆27Aug 13, 2014Updated 11 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Aug 19, 2018Updated 7 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 9 years ago
- ☆111May 16, 2017Updated 8 years ago
- Proof of Concepts, Exploits☆28Apr 8, 2025Updated 11 months ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Initial Collection of HackingTeam Exploits☆93Jul 7, 2015Updated 10 years ago
- A gdbinit file that makes gdb much more usable for MIPS debugging.☆38Sep 5, 2012Updated 13 years ago
- 日前我发现了D-Link DIR 880L/865L/868L/860L路由器存在多个XSS和命令注入漏洞,最主要的问题是路由器未对用户输入进行检查,导致恶意数据请求被执行,最终被远程攻击者控制整个设备。☆11Mar 2, 2018Updated 8 years ago
- Various scrips☆12Oct 19, 2022Updated 3 years ago
- PoC to tunnel the Meterpreter reverse HTTP shell over RDP Virtual Channels☆67Feb 23, 2015Updated 11 years ago
- Web Information Gathering☆18Feb 23, 2015Updated 11 years ago
- heaper, an advanced heap analysis plugin for Immunity Debugger☆98Oct 3, 2012Updated 13 years ago
- An IDA Pro Plugin for embedding an IPython Kernel☆64Oct 27, 2019Updated 6 years ago
- Traverse JS files for APIs/Endpoints☆15May 12, 2015Updated 10 years ago
- PLASMA PULSAR☆70May 19, 2017Updated 8 years ago
- UPnP hacking scripts and tools☆77Jan 14, 2017Updated 9 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Decrypts Cisco VPN Group Passwords☆18Jan 20, 2012Updated 14 years ago
- Some tutorials and examples for generic unpacking JAVA, .NET and x86/x64 code☆51May 3, 2016Updated 9 years ago
- PIN tool runtracer suite☆43Sep 14, 2015Updated 10 years ago
- Listening Post for Throwback Implant☆111Jan 26, 2016Updated 10 years ago
- Data exfiltration PoC scripts☆25Sep 11, 2015Updated 10 years ago
- ☆13Jun 25, 2016Updated 9 years ago
- This is a stealthier version of Keylogger-lkm, it introduces hiding techniques and also a command entering option.☆13Jan 27, 2023Updated 3 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆19Jul 7, 2015Updated 10 years ago
- REST/JSON interface to Burp Suite☆33Oct 12, 2020Updated 5 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- Writeup of the Oracle DSR stack buffer overflow vulnerability (DRA) CVE-2014-6598☆14Jan 29, 2015Updated 11 years ago
- Tool for inspecting Windows Phone applications☆28Jun 7, 2013Updated 12 years ago
- kernel space code☆12Jun 8, 2019Updated 6 years ago
- IDA Pro Plugins☆19May 31, 2015Updated 10 years ago