This repository contains public proof-of-concept (PoC) exploits for various vulnerabilities that I have discovered over time. These PoC exploits are shared for educational purposes and to demonstrate the potential risks associated with the vulnerabilities, helping developers and system administrators understand the importance of securing their systems.
These PoC exploits are provided for educational and research purposes only. They are not intended to be used maliciously or without proper authorization. By using the information and code provided in this repository, you agree to use it responsibly and within the boundaries of the law. The creator of this repository holds no responsibility for any misuse or damage caused by the use of these PoC exploits.
If you have writen a exploit from my vulnerabilities and would like to contribute a PoC exploit to this repository, please submit a pull request with the necessary information and code.