Because why ask nicely for data when you can 'borrow' it with style and a ZIP?
-
Updated
Jan 11, 2025 - C
Because why ask nicely for data when you can 'borrow' it with style and a ZIP?
PoC implementation of the GhostWriting injection technique for x64 Windows
Proof of Concept (PoC) relativo alla Technology Baseline (TB) per il progetto DeSpeect
(POC) A demo illustrating frond-end source code encryption with WebAssembly.
A moe themed PoC Android ransomware targetting rooted users
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
EFI RTS Hook Detector (Windows Kernel Driver)
Tetris tournament variant
Proof of Concept for CVE-2021-4034 (with experimental traceless exploitation)
Proof‑of‑concept for using OpenCL on Android
Experimental OS created with the .NET native AOT (ahead-of-time) compilation tech. CN/RU zone only.
Project Vault Range PoC: Know your enemy and yourself to build better defense-in-depth solution!
Simple command line app for computing the entropy.
Adding 2 Postgresql functions: pg_sleep(seconds) and pg_usleep(microseconds)
Add a description, image, and links to the poc topic page so that developers can more easily learn about it.
To associate your repository with the poc topic, visit your repo's landing page and select "manage topics."