All Projects → pedrib → Poc

pedrib / Poc

Licence: gpl-3.0
Advisories, proof of concept files and exploits that have been made public by @pedrib.

Programming Languages

ruby
36898 projects - #4 most used programming language

Projects that are alternatives of or similar to Poc

Awesome Web Hacking
A list of web application security
Stars: ✭ 3,760 (+900%)
Mutual labels:  hacking, vulnerabilities, metasploit
Entropy
Entropy Toolkit is a set of tools to provide Netwave and GoAhead IP webcams attacks. Entropy Toolkit is a powerful toolkit for webcams penetration testing.
Stars: ✭ 126 (-66.49%)
Mutual labels:  hacking, metasploit
Docker Vulnerable Dvwa
Damn Vulnerable Web Application Docker container
Stars: ✭ 117 (-68.88%)
Mutual labels:  hacking, vulnerabilities
Hack Tools
The all-in-one Red Team extension for Web Pentester 🛠
Stars: ✭ 2,750 (+631.38%)
Mutual labels:  hacking, metasploit
Pentesting toolkit
🏴‍☠️ Tools for pentesting, CTFs & wargames. 🏴‍☠️
Stars: ✭ 1,268 (+237.23%)
Mutual labels:  hacking, vulnerabilities
H4cker
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Stars: ✭ 10,451 (+2679.52%)
Mutual labels:  hacking, exploits
Hackapk
An Advanced Tool For Complete Apk-Modding In Termux ...
Stars: ✭ 180 (-52.13%)
Mutual labels:  hacking, metasploit
Fail2ban.webexploits
This custom Fail2Ban filter and jail will deal with all scans for common Wordpress, Joomla and other Web Exploits being scanned for by automated bots and those seeking to find exploitable web sites.
Stars: ✭ 67 (-82.18%)
Mutual labels:  hacking, exploits
Hrshell
HRShell is an HTTPS/HTTP reverse shell built with flask. It is an advanced C2 server with many features & capabilities.
Stars: ✭ 193 (-48.67%)
Mutual labels:  hacking, metasploit
Mad Metasploit
Metasploit custom modules, plugins, resource script and.. awesome metasploit collection
Stars: ✭ 200 (-46.81%)
Mutual labels:  hacking, metasploit
Zerooo-Exploitation-Framework
异步漏洞利用框架
Stars: ✭ 22 (-94.15%)
Mutual labels:  exploits, vulnerabilities
One Lin3r
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
Stars: ✭ 1,259 (+234.84%)
Mutual labels:  hacking, metasploit
Msf Venom Cheatsheet
Single Page Cheatsheet for common MSF Venom One Liners
Stars: ✭ 81 (-78.46%)
Mutual labels:  hacking, metasploit
Tools
Security and Hacking Tools, Exploits, Proof of Concepts, Shellcodes, Scripts.
Stars: ✭ 1,343 (+257.18%)
Mutual labels:  hacking, exploits
Exploits
Miscellaneous exploit code
Stars: ✭ 1,157 (+207.71%)
Mutual labels:  hacking, exploits
Proton
Proton Framework is a Windows post-exploitation framework similar to other Windows post-exploitation frameworks. The major difference is that the Proton Framework does most of its operations using Windows Script Host, with compatibility in the core to support a default installation of Windows 2000 with no service packs all the way through Windows 10.
Stars: ✭ 142 (-62.23%)
Mutual labels:  hacking, metasploit
Spellbook
Micro-framework for rapid development of reusable security tools
Stars: ✭ 53 (-85.9%)
Mutual labels:  hacking, exploits
Jaeles
The Swiss Army knife for automated Web Application Testing
Stars: ✭ 1,073 (+185.37%)
Mutual labels:  hacking, vulnerabilities
Mouse
Mouse Framework is an iOS and macOS post-exploitation framework that gives you a command line session with extra functionality between you and a target machine using only a simple Mouse payload. Mouse gives you the power and convenience of uploading and downloading files, tab completion, taking pictures, location tracking, shell command execution, escalating privileges, password retrieval, and much more.
Stars: ✭ 186 (-50.53%)
Mutual labels:  hacking, metasploit
Ethical Hacking Tools
Complete Listing and Usage of Tools used for Ethical Hacking
Stars: ✭ 272 (-27.66%)
Mutual labels:  hacking, metasploit

Pedro Ribeiro (@pedrib) Exploit Dumping Grounds

This repository contains my advisories, proof of concept files and exploits that I have made public and it is located at https://github.com/pedrib/PoC.

It also contains the list of all vulnerabilities and Metasploit modules I have publicly disclosed, as well as my PGP key.

All information, code and binary data in this repository is released to the public under the GNU General Public License, version 3 (GPLv3). For information, code or binary data obtained from other sources that has a license which is incompatible with GPLv3, the original license prevails. For more information check https://www.gnu.org/licenses/gpl-3.0.en.html or the LICENSE file in the root of this repository.

Please note that Agile Information Security Limited (Agile InfoSec) relies on information provided by the vendor / product manufacturer when listing fixed versions, products or releases. Agile InfoSec does not verify this information, except when specifically mentioned in the advisory text and requested or contracted by the vendor to do so.

Unconfirmed vendor fixes might be ineffective, incomplete or easy to bypass and it is the vendor's responsibility to ensure all the vulnerabilities found by Agile InfoSec are resolved properly. Agile InfoSec usually provides the information in its advisories free of charge to the vendor, as well as a minimum of six months for the vendor to resolve the vulnerabilities identified in its advisories before they are made public.

Agile InfoSec does not accept any responsibility, financial or otherwise, from any material losses, loss of life or reputational loss as a result of misuse of the information or code contained or mentioned in its advisories. It is the vendor's responsibility to ensure their products' security before, during and after release to market.

Pedro Ribeiro (pedrib_at_gmail_dot_com) @pedrib1337
Founder & Director of Research at Agile Information Security

Feel free to send me questions / comments / criticism.

Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].