🚀 Create a PoC environment for integrating Splunk MCP Server with Claude Desktop, featuring easy setup and robust authentication.
-
Updated
Apr 1, 2026 - Shell
🚀 Create a PoC environment for integrating Splunk MCP Server with Claude Desktop, featuring easy setup and robust authentication.
🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.
Proof of Concept environment for Splunk MCP (Model Context Protocol) Server integration with Claude Desktop, featuring Docker orchestration, 1Password secrets management, and automated Claude configuration.
Proof-of-concept implementations for HashiCorp Vault
Expolit Lists. 相关集合💥💥💥 ;) 用友NC反序列化/ CTF/ Java Deserialization/Shiro Vulns/ CNVD or CVE Vulns/ Log4j2/ Hikvision-decrypter...✨✨✨
CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterprise 15 - PAM bypass + udisks2 XFS race condition LPE to root
The world's purest (and slowest) LLM inference engine. 100% Bash and AWK, 0% dependencies. Running 600M parameters using only standard Unix tools.
POC Script for CVE-2026-24061 (GNU Telnetd Exploit)
CVE-2026-23550 - Modular DS WordPress Plugin **Unauthenticated Admin Access**
This repo contains the hackthebox lab script ,try it out ....
PoC_CVEs
PoC Productividad es un repositorio de prueba de concepto que busca aumentar la productividad del desarrollo aprovechando GitHub CLI (gh) y MCP.
Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463
Below v0.8.1 - Local Privilege Escalation (CVE-2025-27591) - PoC Exploit
Privilege escalation to root using sudo chroot, NO NEED for gcc installed.
Local Privilege Escalation vai `below` (CVE-2025-27591) - PoC Exploit
Add a description, image, and links to the poc topic page so that developers can more easily learn about it.
To associate your repository with the poc topic, visit your repo's landing page and select "manage topics."