POC

Taken : Takeover AWS IPS & Have A Working POC For Subdomain Takeover

Taken is a tool to takeover AWS ips and have a working POC for Subdomain Takeover. Idea is simple Get…

4 years ago

Token Breaker : JSON RSA To HMAC & None Algorithm Vulnerability POC

Token Breaker is focused on 2 particular vulnerability related to JWT tokens. None AlgorithmRSAtoHMAC Refer to this link about insights…

4 years ago

Tentacle : A POC Vulnerability Verification & Exploit Framework

Tentacle is a POC vulnerability verification and exploit framework. It supports free extension of exploits and uses POC scripts. It…

5 years ago

R00kie-Kr00kie : PoC Exploit For The CVE-2019-15126 Kr00k Vulnerability

R00kie-Kr00kie is a PoC exploit for the CVE-2019-15126 kr00k vulnerability. This project is intended for educational purposes only and cannot…

5 years ago

CHAOS : PoC that Allow Generate Payloads & Control Remote OS

CHAOS is a PoC that allow generate payloads and control remote operating systems. Features FeatureWindowsMacLinuxReverse ShellXXXDownload FileXXXUpload FileXXXScreenshotXXXKeyloggerXPersistenceXOpen URLXXXGet OS…

6 years ago