financialPOC de uma aplicação de domínio financeiro.
Stars: ✭ 62 (-50%)
iota-mqtt-pocIOTA Proof of Concept, store MQTT messages on the tangle.
Stars: ✭ 40 (-67.74%)
poc-github-actionsVarious proofs of concept examples using Github Actions 🤖
Stars: ✭ 103 (-16.94%)
Kunpengkunpeng是一个Golang编写的开源POC框架/库,以动态链接库的形式提供各种语言调用,通过此项目可快速开发漏洞检测类的系统。
Stars: ✭ 1,242 (+901.61%)
Proof Of ConceptsA little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.
Stars: ✭ 148 (+19.35%)
PocProofs-of-concept
Stars: ✭ 467 (+276.61%)
safelog4jSafelog4j is an instrumentation-based security tool to help teams discover, verify, and solve log4shell vulnerabilities without scanning or upgrading
Stars: ✭ 38 (-69.35%)
Umbraco-RCEUmbraco CMS 7.12.4 - (Authenticated) Remote Code Execution
Stars: ✭ 61 (-50.81%)
Xray一款完善的安全评估工具,支持常见 web 安全问题扫描和自定义 poc | 使用之前务必先阅读文档
Stars: ✭ 6,218 (+4914.52%)
Go Restful🚀 A real world production-grade RESTful Web Services proof-of-concept project.
Stars: ✭ 58 (-53.23%)
Radio HackboxPoC tool to demonstrate vulnerabilities in wireless input devices
Stars: ✭ 74 (-40.32%)
TraceSupply chain transparency platform proof-of-concept based on the Ethereum blockchain ✍️
Stars: ✭ 52 (-58.06%)
Nodejs VirusA Node.js Proof of Concept Virus
Stars: ✭ 58 (-53.23%)
AngelswordPython3编写的CMS漏洞检测框架
Stars: ✭ 1,223 (+886.29%)
SethPerform a MitM attack and extract clear text credentials from RDP connections
Stars: ✭ 1,084 (+774.19%)
Nothing PrivateDo you think you are safe using private browsing or incognito mode?. 😄 👿 This will prove that you're wrong.
Stars: ✭ 1,375 (+1008.87%)
Nrf24 PlaysetSoftware tools for Nordic Semiconductor nRF24-based devices like wireless keyboards, mice, and presenters
Stars: ✭ 73 (-41.13%)
NailgunNailgun attack on ARM devices.
Stars: ✭ 114 (-8.06%)
Hisilicon Dvr TelnetPoC materials for article https://habr.com/en/post/486856/
Stars: ✭ 101 (-18.55%)
Clickjacking TesterA python script designed to check if the website if vulnerable of clickjacking and create a poc
Stars: ✭ 72 (-41.94%)
Machine Learning NotebooksAssorted exercises and proof-of-concepts to understand and study machine learning and statistical learning theory
Stars: ✭ 33 (-73.39%)
PoccollectPoc Collected for study and develop
Stars: ✭ 15 (-87.9%)
Poc BankFocus on cybersecurity | collection of PoC and Exploits
Stars: ✭ 68 (-45.16%)
Cve 2020 0796CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
Stars: ✭ 1,102 (+788.71%)
CrawlergoA powerful dynamic crawler for web vulnerability scanners
Stars: ✭ 1,088 (+777.42%)
Bootstrap DarkThe Definitive Guide to Dark Mode and Bootstrap 4 - A proof of concept
Stars: ✭ 54 (-56.45%)
BrandisBrandis: End-to-end encryption for everyone
Stars: ✭ 77 (-37.9%)
DeltaPROJECT DELTA: SDN SECURITY EVALUATION FRAMEWORK
Stars: ✭ 55 (-55.65%)
Cve 2017 0781Blueborne CVE-2017-0781 Android heap overflow vulnerability
Stars: ✭ 74 (-40.32%)
BurpbountyBurp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the active and passive scanner by means of personalized rules through a very intuitive graphical interface.
Stars: ✭ 1,026 (+727.42%)
PeriodsPERIODs and SYSTEM VERSIONING for PostgreSQL
Stars: ✭ 101 (-18.55%)
PowerladonLadon Network Penetration Scanner for PowerShell, vulnerability / exploit / detection / MS17010/SmbGhost,Brute-Force SMB/IPC/WMI/NBT/SSH/FTP/MSSQL/MYSQL/ORACLE/VNC
Stars: ✭ 39 (-68.55%)
CiscoexploitCisco Exploit (CVE-2019-1821 Cisco Prime Infrastructure Remote Code Execution/CVE-2019-1653/Cisco SNMP RCE/Dump Cisco RV320 Password)
Stars: ✭ 73 (-41.13%)
Aproxandroid proxy setting tool
Stars: ✭ 34 (-72.58%)
PasshuntPasshunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
Stars: ✭ 961 (+675%)
ExploitsMiscellaneous exploit code
Stars: ✭ 1,157 (+833.06%)
LibcimbarOptimized implementation for color-icon-matrix barcodes
Stars: ✭ 98 (-20.97%)
VulsAgent-less vulnerability scanner for Linux, FreeBSD, Container, WordPress, Programming language libraries, Network devices
Stars: ✭ 8,844 (+7032.26%)
Cve 2020 10199 cve 2020 10204CVE-2020-10199、CVE-2020-10204漏洞一键检测工具,图形化界面。CVE-2020-10199 and CVE-2020-10204 Vul Tool with GUI.
Stars: ✭ 20 (-83.87%)
XattackerX Attacker Tool ☣ Website Vulnerability Scanner & Auto Exploiter
Stars: ✭ 897 (+623.39%)
ProcjackPoC of injecting code into a running Linux process
Stars: ✭ 17 (-86.29%)
ArissploitArissploit Framework is a simple framework designed to master penetration testing tools. Arissploit Framework offers simple structure, basic CLI, and useful features for learning and developing penetration testing tools.
Stars: ✭ 114 (-8.06%)
MarsnakeSystem Optimizer and Monitoring, Security Auditing, Vulnerability scanner for Linux, macOS, and UNIX-based systems
Stars: ✭ 16 (-87.1%)
Quarkus Microservices PocVery simplified shop sales system made in a microservices architecture using quarkus
Stars: ✭ 16 (-87.1%)
SutekhAn example rootkit that gives a userland process root permissions
Stars: ✭ 62 (-50%)
PocProof of Concepts
Stars: ✭ 809 (+552.42%)
Medusa🐈Medusa是一个红队武器库平台,目前包括扫描功能(200+个漏洞)、XSS平台、协同平台、CVE监控等功能,持续开发中 http://medusa.ascotbe.com
Stars: ✭ 796 (+541.94%)
ResourcesA Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms tips, and tricks curated by us.
Stars: ✭ 62 (-50%)