Proof Of Concept

Explore 20 curated cybersecurity tools, with 15,538+ visitors searching for solutions

FEATURED

Hudson Rock Cybercrime Intelligence Tools Logo

Cybercrime intelligence tools for searching compromised credentials from infostealers

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Filter by:
OFFODE Logo

A proof-of-concept Node.js tool that demonstrates automated MFA bypass techniques for Microsoft Outlook accounts using browser automation.

1
findom-xss Logo

A fast and simple DOM based XSS vulnerability scanner

0
xxeserv Logo

A mini webserver with FTP support for XXE payloads

0
jwt-key-id-injector Logo

A simple Python script to test for a hypothetical JWT vulnerability

0
HoneyFS Logo

HoneyFS is an LLM-powered honeypot tool that generates realistic fake file systems using GPT-3.5 to deceive attackers and enhance security analysis.

0
MagSpoof Logo

MagSpoof is a hardware device that emulates magnetic stripe cards using electromagnetic fields for security research and educational purposes.

0
SMTPLLMPot Logo

A PoC tool for utilizing GPT3.5 in developing an SMTP honeypot.

0
Quick Android Review Kit Logo

QARK is a static analysis tool that scans Android applications for security vulnerabilities and can generate proof-of-concept exploits for discovered issues.

0
Troje Logo

Troje is a honeypot that creates dynamic LXC container environments to attract and monitor attackers while recording their activities and system changes.

0
dns-parallel-prober Logo

A proof-of-concept for an adaptive parallelised DNS prober

0
Amazon GuardDuty Tester Logo

A collection of scripts and guidance for generating proof-of-concept Amazon GuardDuty findings to help users understand and test AWS security detection capabilities.

0
DET (extensible) Data Exfiltration Toolkit Logo

DET (extensible) Data Exfiltration Toolkit is a proof of concept tool for performing Data Exfiltration using multiple channels simultaneously.

0
InvisibilityCloak Logo

InvisibilityCloak is a proof-of-concept C# code obfuscation toolkit designed for red teaming and penetration testing to conceal post-exploitation tools from detection.

0
YETI Logo

YETI is a proof-of-concept TAXII implementation that supports Inbox, Poll, and Discovery services for automated cyber threat intelligence indicator exchange.

0
Saruman v0.1 Logo

A proof-of-concept executable injection tool that compiles and launches parasitic executables within target processes using standard or stealth injection techniques.

0
XlsGen Logo

A proof-of-concept tool that generates Excel BIFF8 files with embedded 4.0 macros programmatically without requiring Microsoft Excel installation.

0
Honeypot-Camera Logo

An observation camera honeypot for proof-of-concept purposes

0
Nimbostratus Logo

A proof-of-concept toolkit for fingerprinting and exploiting Amazon Web Services cloud infrastructures using the boto library.

0
Dirtyc0w Docker POC Logo

A proof-of-concept tool that demonstrates the Dirty COW kernel exploit (CVE-2016-5195) for privilege escalation within Docker containers, specifically targeting nginx images while providing mitigation guidance through AppArmor profiles.

0
Thinkst Canarytokens Detector and Diffuser/Nullifier Logo

A Python script that detects and removes Thinkst Canary Tokens from files using signature-based detection methods.

0