all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things
- 2024 year top total 30
- 2023 year top total 30
- 2022 year top total 30
- 2021 year top total 30
- 2020 year top total 30
- 2019 year top total 30
- 2018 year top total 30
- 2017 year top total 30
- 2016 year top total 30
- 2015 year top total 30
star | updated_at | name | url | des |
---|---|---|---|---|
1961 | 2024-05-28T21:28:49Z | CVE-2024-1086 | https://github.com/Notselwyn/CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. |
3468 | 2024-05-28T20:14:28Z | xzbot | https://github.com/amlweems/xzbot | notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) |
275 | 2024-05-28T16:35:48Z | git_rce | https://github.com/amalmurali47/git_rce | Exploit PoC for CVE-2024-32002 |
176 | 2024-05-28T16:40:06Z | CVE-2024-23897 | https://github.com/h4x0r-dz/CVE-2024-23897 | CVE-2024-23897 |
230 | 2024-05-28T20:35:17Z | CVE-2024-21338 | https://github.com/hakaioffsec/CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. |
617 | 2024-05-25T09:52:52Z | CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability |
202 | 2024-05-28T01:34:05Z | CVE-2024-21111 | https://github.com/mansk1es/CVE-2024-21111 | Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability |
145 | 2024-05-27T20:16:20Z | CVE-2024-21413 | https://github.com/duy-31/CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC |
129 | 2024-05-28T18:17:21Z | CVE-2024-25600 | https://github.com/Chocapikk/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 |
45 | 2024-05-27T03:16:17Z | CVE-2024-3400 | https://github.com/0x0d3ad/CVE-2024-3400 | CVE-2024-3400 |
123 | 2024-05-28T02:01:48Z | CVE-2024-27198-RCE | https://github.com/W01fh4cker/CVE-2024-27198-RCE | CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4 |
113 | 2024-05-28T10:34:25Z | CVE-2024-27804 | https://github.com/R00tkitSMM/CVE-2024-27804 | POC for CVE-2024-27804 |
134 | 2024-05-27T13:13:35Z | CVE-2024-3400 | https://github.com/h4x0r-dz/CVE-2024-3400 | CVE-2024-3400 Palo Alto OS Command Injection |
88 | 2024-05-16T06:46:16Z | ScreenConnect-AuthBypass-RCE | https://github.com/W01fh4cker/ScreenConnect-AuthBypass-RCE | ScreenConnect AuthBypass(cve-2024-1709) --> RCE!!! |
79 | 2024-05-28T11:56:09Z | CVE-2024-32002 | https://github.com/safebuffer/CVE-2024-32002 | CVE-2024-32002 RCE PoC |
98 | 2024-05-26T21:26:24Z | CVE-2024-21762 | https://github.com/h4x0r-dz/CVE-2024-21762 | out-of-bounds write in Fortinet FortiOS CVE-2024-21762 vulnerability |
114 | 2024-05-16T14:32:24Z | CVE-2024-20656 | https://github.com/Wh04m1001/CVE-2024-20656 | |
63 | 2024-05-23T06:50:44Z | CVE-2024-21345 | https://github.com/exploits-forsale/CVE-2024-21345 | Proof-of-Concept for CVE-2024-21345 |
90 | 2024-05-28T04:32:33Z | CVE-2024-21683-RCE | https://github.com/W01fh4cker/CVE-2024-21683-RCE | CVE-2024-21683 Confluence Post Auth RCE |
49 | 2024-05-22T22:03:20Z | CVE-2024-23897 | https://github.com/xaitax/CVE-2024-23897 | CVE-2024-23897 |
73 | 2024-05-28T18:16:36Z | CVE-2024-3273 | https://github.com/Chocapikk/CVE-2024-3273 | D-Link NAS CVE-2024-3273 Exploit Tool |
85 | 2024-05-27T11:04:20Z | CVE-2024-22120-RCE | https://github.com/W01fh4cker/CVE-2024-22120-RCE | Time Based SQL Injection in Zabbix Server Audit Log --> RCE |
86 | 2024-05-28T01:16:29Z | CVE-2024-21893.py | https://github.com/h4x0r-dz/CVE-2024-21893.py | CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure |
79 | 2024-05-15T06:22:06Z | io_uring_LPE-CVE-2024-0582 | https://github.com/ysanatomic/io_uring_LPE-CVE-2024-0582 | LPE exploit for CVE-2024-0582 (io_uring) |
96 | 2024-05-27T13:30:09Z | CVE-2024-23897 | https://github.com/binganao/CVE-2024-23897 | |
70 | 2024-05-10T03:53:53Z | CVE-2024-20931 | https://github.com/GlassyAmadeus/CVE-2024-20931 | The Poc for CVE-2024-20931 |
87 | 2024-05-19T18:10:55Z | cve-2024-21762-check | https://github.com/BishopFox/cve-2024-21762-check | Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762 |
71 | 2024-05-15T20:20:03Z | CVE-2024-3094-checker | https://github.com/FabioBaroni/CVE-2024-3094-checker | Quick and dirty PoC for checking whether a vulnerable version of xz-utils is installed (CVE-2024-3094) |
138 | 2024-05-08T17:52:55Z | xz-vulnerable-honeypot | https://github.com/lockness-Ko/xz-vulnerable-honeypot | An ssh honeypot with the XZ backdoor. CVE-2024-3094 |
43 | 2024-05-23T06:50:26Z | CVE-2024-26218 | https://github.com/exploits-forsale/CVE-2024-26218 | Proof-of-Concept for CVE-2024-26218 |
star | updated_at | name | url | des |
---|---|---|---|---|
420 | 2024-05-10T10:50:26Z | qq-tim-elevation | https://github.com/vi3t1/qq-tim-elevation | CVE-2023-34312 |
1256 | 2024-05-29T00:01:00Z | cvelist | https://github.com/CVEProject/cvelist | Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023 |
770 | 2024-05-18T08:44:14Z | CVE-2023-38831-winrar-exploit | https://github.com/b1tg/CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator |
467 | 2024-05-26T14:43:09Z | Windows_LPE_AFD_CVE-2023-21768 | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | LPE exploit for CVE-2023-21768 |
363 | 2024-05-23T12:17:17Z | CVE-2023-32233 | https://github.com/Liuk3r/CVE-2023-32233 | CVE-2023-32233: Linux内核中的安全漏洞 |
373 | 2024-05-22T10:00:27Z | CVE-2023-0386 | https://github.com/xkaneiki/CVE-2023-0386 | CVE-2023-0386在ubuntu22.04上的提权 |
374 | 2024-05-23T13:19:47Z | CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | PoC for CVE-2023-4911 |
305 | 2024-05-15T06:23:08Z | CVE-2023-21752 | https://github.com/Wh04m1001/CVE-2023-21752 | |
617 | 2024-05-28T22:16:55Z | keepass-password-dumper | https://github.com/vdohney/keepass-password-dumper | Original PoC for CVE-2023-32784 |
264 | 2024-05-24T21:53:25Z | CVE-2023-21608 | https://github.com/hacksysteam/CVE-2023-21608 | Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit |
305 | 2024-05-27T05:27:20Z | CVE-2023-4863 | https://github.com/mistymntncop/CVE-2023-4863 | |
33 | 2024-04-25T14:20:01Z | CVE-2023-21839 | https://github.com/ASkyeye/CVE-2023-21839 | Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE) |
232 | 2024-05-22T06:35:01Z | CVE-2023-36874 | https://github.com/Wh04m1001/CVE-2023-36874 | |
216 | 2024-05-28T19:02:18Z | CVE-2023-44487 | https://github.com/bcdannyboy/CVE-2023-44487 | Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487 |
161 | 2024-05-18T19:24:27Z | CVE-2023-36745 | https://github.com/N1k0la-T/CVE-2023-36745 | |
226 | 2024-05-26T10:49:08Z | CVE-2023-20887 | https://github.com/sinsinology/CVE-2023-20887 | VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) |
339 | 2024-05-15T06:21:32Z | CVE-2023-23397-POC-Powershell | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | |
132 | 2024-05-15T06:21:43Z | CVE-2023-34362 | https://github.com/horizon3ai/CVE-2023-34362 | MOVEit CVE-2023-34362 |
236 | 2024-05-16T06:46:14Z | CVE-2023-7028 | https://github.com/Vozec/CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 |
167 | 2024-05-10T10:50:46Z | CVE-2023-28252 | https://github.com/fortra/CVE-2023-28252 | |
211 | 2024-05-27T09:30:31Z | CVE-2023-3519 | https://github.com/BishopFox/CVE-2023-3519 | RCE exploit for CVE-2023-3519 |
214 | 2024-05-15T06:21:29Z | Weblogic-CVE-2023-21839 | https://github.com/DXask88MA/Weblogic-CVE-2023-21839 | |
196 | 2024-05-28T02:00:28Z | CVE-2023-46747-RCE | https://github.com/W01fh4cker/CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 |
159 | 2024-05-15T06:21:32Z | CVE-2023-23397_EXPLOIT_0DAY | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | Exploit for the CVE-2023-23397 |
213 | 2024-05-21T07:58:57Z | CVE-2023-29357 | https://github.com/Chocapikk/CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
254 | 2024-05-23T13:55:47Z | CVE-2023-25690-POC | https://github.com/dhmosfunk/CVE-2023-25690-POC | CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability. |
154 | 2024-05-28T11:56:08Z | CVE-2023-25157 | https://github.com/win3zz/CVE-2023-25157 | CVE-2023-25157 - GeoServer SQL Injection - PoC |
140 | 2024-05-10T10:50:25Z | CVE-2023-2825 | https://github.com/Occamsec/CVE-2023-2825 | GitLab CVE-2023-2825 PoC. This PoC leverages a path traversal vulnerability to retrieve the /etc/passwd file from a system running GitLab 16.0.0. |
162 | 2024-05-24T03:58:16Z | CVE-2023-4911 | https://github.com/RickdeJager/CVE-2023-4911 | CVE-2023-4911 proof of concept |
150 | 2024-05-26T16:25:44Z | Windows_MSKSSRV_LPE_CVE-2023-36802 | https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802 | LPE exploit for CVE-2023-36802 |
star | updated_at | name | url | des |
---|---|---|---|---|
427 | 2024-05-16T17:44:17Z | CVE-2022-25636 | https://github.com/Bonfee/CVE-2022-25636 | CVE-2022-25636 |
458 | 2024-05-26T16:14:47Z | CVE-2022-21882 | https://github.com/KaLendsi/CVE-2022-21882 | win32k LPE |
692 | 2024-05-12T20:37:55Z | CVE-2022-29072 | https://github.com/kagancapar/CVE-2022-29072 | 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. |
1078 | 2024-05-27T17:55:55Z | CVE-2022-0847-DirtyPipe-Exploit | https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit | A root exploit for CVE-2022-0847 (Dirty Pipe) |
365 | 2024-05-28T11:37:44Z | CVE-2022-0185 | https://github.com/Crusaders-of-Rust/CVE-2022-0185 | CVE-2022-0185 |
493 | 2024-05-10T10:45:00Z | CVE-2022-0995 | https://github.com/Bonfee/CVE-2022-0995 | CVE-2022-0995 exploit |
556 | 2024-05-15T02:06:05Z | CVE-2022-23222 | https://github.com/tr3ee/CVE-2022-23222 | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation |
218 | 2024-05-15T10:46:59Z | Spring-Cloud-Gateway-CVE-2022-22947 | https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 | CVE-2022-22947 |
527 | 2024-05-20T07:13:23Z | OpenSSL-2022 | https://github.com/NCSC-NL/OpenSSL-2022 | Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 |
360 | 2024-05-24T17:20:14Z | CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 |
363 | 2024-05-27T15:39:35Z | CVE-2022-29464 | https://github.com/hakivvi/CVE-2022-29464 | WSO2 RCE (CVE-2022-29464) exploit and writeup. |
329 | 2024-05-14T02:39:19Z | CVE-2022-40684 | https://github.com/horizon3ai/CVE-2022-40684 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager |
462 | 2024-05-20T02:26:34Z | CVE-2022-2588 | https://github.com/Markakd/CVE-2022-2588 | exploit for CVE-2022-2588 |
370 | 2024-05-19T23:26:35Z | CVE-2022-39197 | https://github.com/its-arun/CVE-2022-39197 | CobaltStrike <= 4.7.1 RCE |
390 | 2024-05-10T10:47:36Z | CVE-2022-33679 | https://github.com/Bdenneu/CVE-2022-33679 | One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html |
514 | 2024-05-24T08:30:39Z | CVE-2022-0847-DirtyPipe-Exploits | https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. |
271 | 2024-05-10T10:44:39Z | CVE-2022-0847 | https://github.com/r1is/CVE-2022-0847 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” |
451 | 2024-05-20T11:11:22Z | CVE-2022-27254 | https://github.com/nonamecoder/CVE-2022-27254 | PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254) |
310 | 2024-05-22T14:56:53Z | CVE-2022-39197-patch | https://github.com/burpheart/CVE-2022-39197-patch | CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. |
303 | 2024-04-29T10:29:30Z | CVE-2022-21971 | https://github.com/0vercl0k/CVE-2022-21971 | PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability" |
310 | 2024-05-17T05:56:39Z | Spring4Shell-POC | https://github.com/reznok/Spring4Shell-POC | Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit |
276 | 2024-05-10T10:46:45Z | CVE-2022-21894 | https://github.com/Wack0/CVE-2022-21894 | baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability |
266 | 2024-05-10T10:49:02Z | CVE-2022-39952 | https://github.com/horizon3ai/CVE-2022-39952 | POC for CVE-2022-39952 |
271 | 2024-05-10T10:46:22Z | cve-2022-27255 | https://github.com/infobyte/cve-2022-27255 | |
191 | 2024-05-10T10:44:13Z | CVE-2022-21882 | https://github.com/L4ys/CVE-2022-21882 | |
116 | 2024-04-17T21:47:32Z | CVE-2022-22963 | https://github.com/dinosn/CVE-2022-22963 | CVE-2022-22963 PoC |
186 | 2024-05-10T10:44:49Z | CVE-2022-0778 | https://github.com/drago-96/CVE-2022-0778 | Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt |
284 | 2024-05-15T02:06:09Z | VMware-CVE-2022-22954 | https://github.com/sherlocksecurity/VMware-CVE-2022-22954 | POC for VMWARE CVE-2022-22954 |
236 | 2024-05-10T10:44:15Z | CVE-2022-20699 | https://github.com/Audiobahn/CVE-2022-20699 | Cisco Anyconnect VPN unauth RCE (rwx stack) |
205 | 2024-05-10T10:46:00Z | CVE-2022-30075 | https://github.com/aaronsvk/CVE-2022-30075 | Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075) |
star | updated_at | name | url | des |
---|---|---|---|---|
1307 | 2024-05-26T16:14:35Z | noPac | https://github.com/cube0x0/noPac | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. |
1919 | 2024-05-28T07:01:30Z | CVE-2021-4034 | https://github.com/berdav/CVE-2021-4034 | CVE-2021-4034 1day |
1801 | 2024-05-25T09:18:30Z | CVE-2021-1675 | https://github.com/cube0x0/CVE-2021-1675 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 |
1542 | 2024-05-24T22:07:17Z | CVE-2021-40444 | https://github.com/lockedbyte/CVE-2021-40444 | CVE-2021-40444 PoC |
1024 | 2024-05-28T05:51:55Z | CVE-2021-4034 | https://github.com/arthepsy/CVE-2021-4034 | PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) |
973 | 2024-05-21T11:16:14Z | CVE-2021-1675 | https://github.com/calebstewart/CVE-2021-1675 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) |
929 | 2024-05-23T02:24:59Z | CVE-2021-3156 | https://github.com/blasty/CVE-2021-3156 | |
475 | 2024-05-09T02:46:08Z | CVE-2021-21972 | https://github.com/NS-Sp4ce/CVE-2021-21972 | CVE-2021-21972 Exploit |
786 | 2024-05-24T22:52:51Z | CVE-2021-40444 | https://github.com/klezVirus/CVE-2021-40444 | CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit |
964 | 2024-05-26T16:14:34Z | sam-the-admin | https://github.com/safebuffer/sam-the-admin | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
413 | 2024-04-30T02:07:30Z | CVE-2021-1732-Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit | CVE-2021-1732 Exploit |
714 | 2024-05-26T14:22:50Z | CVE-2021-3156 | https://github.com/worawit/CVE-2021-3156 | Sudo Baron Samedit Exploit |
821 | 2024-05-21T04:58:55Z | CVE-2021-31166 | https://github.com/0vercl0k/CVE-2021-31166 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. |
850 | 2024-05-16T10:41:58Z | CVE-2021-44228-Scanner | https://github.com/logpresso/CVE-2021-44228-Scanner | Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 |
1760 | 2024-05-28T18:54:01Z | log4j-shell-poc | https://github.com/kozmer/log4j-shell-poc | A Proof-Of-Concept for the CVE-2021-44228 vulnerability. |
329 | 2024-05-21T08:51:12Z | CVE-2021-1675-LPE | https://github.com/hlldz/CVE-2021-1675-LPE | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 |
394 | 2024-05-26T14:45:16Z | CVE-2021-3493 | https://github.com/briskets/CVE-2021-3493 | Ubuntu OverlayFS Local Privesc |
162 | 2024-05-16T08:36:53Z | exprolog | https://github.com/herwonowr/exprolog | ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065) |
732 | 2024-05-24T13:31:31Z | noPac | https://github.com/Ridter/noPac | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
1094 | 2024-05-22T11:45:35Z | log4shell-vulnerable-app | https://github.com/christophetd/log4shell-vulnerable-app | Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228). |
174 | 2024-02-20T07:02:36Z | ProxyVulns | https://github.com/hosch3n/ProxyVulns | [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains. |
430 | 2024-05-15T22:10:16Z | CVE-2021-3156 | https://github.com/stong/CVE-2021-3156 | PoC for CVE-2021-3156 (sudo heap overflow) |
433 | 2024-05-10T10:43:32Z | log4j-finder | https://github.com/fox-it/log4j-finder | Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) |
253 | 2024-05-11T09:20:05Z | CVE-2021-22205 | https://github.com/Al1ex/CVE-2021-22205 | CVE-2021-22205& GitLab CE/EE RCE |
147 | 2024-05-21T08:51:25Z | CVE-2021-41773_CVE-2021-42013 | https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013 | CVE-2021-41773 CVE-2021-42013漏洞批量检测工具 |
3366 | 2024-05-25T06:57:26Z | log4j-scan | https://github.com/fullhunt/log4j-scan | A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 |
246 | 2024-05-16T07:40:58Z | CVE-2021-21972 | https://github.com/horizon3ai/CVE-2021-21972 | Proof of Concept Exploit for vCenter CVE-2021-21972 |
344 | 2024-05-25T21:23:38Z | CVE-2021-44228_scanner | https://github.com/CERTCC/CVE-2021-44228_scanner | Scanners for Jar files that may be vulnerable to CVE-2021-44228 |
348 | 2024-03-25T16:54:59Z | Grafana-CVE-2021-43798 | https://github.com/jas502n/Grafana-CVE-2021-43798 | Grafana Unauthorized arbitrary file reading vulnerability |
208 | 2024-05-11T01:56:23Z | CVE-2021-41773 | https://github.com/blasty/CVE-2021-41773 | CVE-2021-41773 playground |
star | updated_at | name | url | des |
---|---|---|---|---|
4039 | 2024-05-28T11:58:51Z | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
1695 | 2024-05-28T08:23:47Z | CVE-2020-1472 | https://github.com/SecuraBV/CVE-2020-1472 | Test tool for CVE-2020-1472 |
1937 | 2024-05-20T00:58:46Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1290 | 2024-05-15T06:36:53Z | CVE-2020-0796 | https://github.com/danigargu/CVE-2020-0796 | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost |
1147 | 2024-05-28T10:23:51Z | CVE-2020-1472 | https://github.com/dirkjanm/CVE-2020-1472 | PoC for Zerologon - all research credits go to Tom Tervoort of Secura |
280 | 2024-05-17T20:33:42Z | CVE-2020-14882 | https://github.com/jas502n/CVE-2020-14882 | CVE-2020–14882、CVE-2020–14883 |
322 | 2024-05-02T10:58:18Z | cve-2020-0688 | https://github.com/Ridter/cve-2020-0688 | cve-2020-0688 |
603 | 2024-05-15T18:01:01Z | zerologon | https://github.com/risksense/zerologon | Exploit for zerologon cve-2020-1472 |
654 | 2024-05-16T06:45:35Z | SMBGhost | https://github.com/ly4k/SMBGhost | Scanner for CVE-2020-0796 - SMBv3 RCE |
332 | 2024-05-22T07:03:53Z | CVEAC-2020 | https://github.com/thesecretclub/CVEAC-2020 | EasyAntiCheat Integrity check bypass by mimicking memory changes |
370 | 2024-03-23T16:43:51Z | CVE-2020-5902 | https://github.com/jas502n/CVE-2020-5902 | CVE-2020-5902 BIG-IP |
133 | 2024-01-13T03:00:02Z | CVE_2020_2546 | https://github.com/hktalent/CVE_2020_2546 | CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, |
515 | 2024-05-20T05:14:41Z | CVE-2020-0796-RCE-POC | https://github.com/jamf/CVE-2020-0796-RCE-POC | CVE-2020-0796 Remote Code Execution POC |
214 | 2024-04-17T04:06:15Z | SAP_RECON | https://github.com/chipik/SAP_RECON | PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability) |
293 | 2024-05-09T02:39:15Z | CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | Cnvd-2020-10487 / cve-2020-1938, scanner tool |
347 | 2024-05-20T06:24:54Z | CVE-2020-0688 | https://github.com/zcgonvh/CVE-2020-0688 | Exploit and detect tools for CVE-2020-0688 |
333 | 2024-05-14T03:25:41Z | CVE-2020-2551 | https://github.com/Y4er/CVE-2020-2551 | Weblogic IIOP CVE-2020-2551 |
253 | 2024-05-08T11:02:28Z | BlueGate | https://github.com/ly4k/BlueGate | PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE |
162 | 2024-05-15T06:20:30Z | cve-2020-0688 | https://github.com/random-robbie/cve-2020-0688 | cve-2020-0688 |
717 | 2024-05-16T01:41:10Z | CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | Support ALL Windows Version |
887 | 2024-01-23T06:15:14Z | CurveBall | https://github.com/ly4k/CurveBall | PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) |
93 | 2024-05-13T02:02:12Z | dnspooq | https://github.com/knqyf263/dnspooq | DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) |
365 | 2024-05-25T19:20:27Z | CVE-2020-1472 | https://github.com/VoidSec/CVE-2020-1472 | Exploit Code for CVE-2020-1472 aka Zerologon |
320 | 2024-05-15T10:22:00Z | CVE-2020-0796-PoC | https://github.com/eerykitty/CVE-2020-0796-PoC | PoC for triggering buffer overflow via CVE-2020-0796 |
340 | 2024-04-27T16:22:41Z | chainoffools | https://github.com/kudelskisecurity/chainoffools | A PoC for CVE-2020-0601 |
338 | 2024-05-14T11:49:59Z | CVE-2020-0683 | https://github.com/padovah4ck/CVE-2020-0683 | CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege |
214 | 2024-04-22T05:19:14Z | CVE-2020-0041 | https://github.com/bluefrostsecurity/CVE-2020-0041 | Exploits for Android Binder bug CVE-2020-0041 |
117 | 2024-05-27T09:13:42Z | CVE-2020-11651-poc | https://github.com/jasperla/CVE-2020-11651-poc | PoC exploit of CVE-2020-11651 and CVE-2020-11652 |
344 | 2024-05-20T03:05:15Z | Ghostcat-CNVD-2020-10487 | https://github.com/00theway/Ghostcat-CNVD-2020-10487 | Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938) |
407 | 2024-04-24T17:28:12Z | CVE-2020-15368 | https://github.com/stong/CVE-2020-15368 | CVE-2020-15368, aka "How to exploit a vulnerable driver" |
star | updated_at | name | url | des |
---|---|---|---|---|
4039 | 2024-05-28T11:58:51Z | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
1937 | 2024-05-20T00:58:46Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1786 | 2024-05-24T09:22:03Z | phuip-fpizdam | https://github.com/neex/phuip-fpizdam | Exploit for CVE-2019-11043 |
1167 | 2024-05-27T16:46:39Z | BlueKeep | https://github.com/Ekultek/BlueKeep | Proof of concept for CVE-2019-0708 |
491 | 2024-01-04T16:34:00Z | CVE-2019-0708 | https://github.com/n1xbyte/CVE-2019-0708 | dump |
384 | 2024-05-27T16:46:39Z | CVE-2019-0708 | https://github.com/k8gege/CVE-2019-0708 | 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check) |
631 | 2024-05-26T10:26:15Z | CVE-2019-5736-PoC | https://github.com/Frichetten/CVE-2019-5736-PoC | PoC for CVE-2019-5736 |
316 | 2024-03-13T23:29:27Z | CVE-2019-2107 | https://github.com/marcinguy/CVE-2019-2107 | CVE-2019-2107 |
439 | 2024-04-01T12:43:34Z | CVE-2019-2725 | https://github.com/lufeirider/CVE-2019-2725 | CVE-2019-2725 命令回显 |
571 | 2024-05-24T09:49:06Z | cve-2019-19781 | https://github.com/trustedsec/cve-2019-19781 | This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first. |
786 | 2024-05-17T07:11:45Z | esp32_esp8266_attacks | https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) |
348 | 2024-05-20T16:39:56Z | COMahawk | https://github.com/apt69/COMahawk | Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322 |
360 | 2024-02-20T09:34:27Z | CVE-2019-11510 | https://github.com/projectzeroindia/CVE-2019-11510 | Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) |
372 | 2024-02-18T23:31:33Z | CVE-2019-19781 | https://github.com/projectzeroindia/CVE-2019-19781 | Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ] |
319 | 2024-05-17T22:09:05Z | CVE-2019-13272 | https://github.com/jas502n/CVE-2019-13272 | Linux 4.10 < 5.1.17 PTRACE_TRACEME local root |
133 | 2023-09-28T10:59:47Z | CVE-2019-0604 | https://github.com/linhlhq/CVE-2019-0604 | CVE-2019-0604 |
616 | 2024-05-08T00:00:22Z | CVE-2019-11708 | https://github.com/0vercl0k/CVE-2019-11708 | Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit. |
242 | 2023-12-28T06:38:20Z | CVE-2019-0841 | https://github.com/rogue-kdc/CVE-2019-0841 | PoC code for CVE-2019-0841 Privilege Escalation vulnerability |
197 | 2024-05-24T09:54:43Z | CVE-2019-11932 | https://github.com/awakened1712/CVE-2019-11932 | Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif |
337 | 2024-05-27T18:28:27Z | CVE-2019-18935 | https://github.com/noperator/CVE-2019-18935 | RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. |
305 | 2024-03-27T12:46:25Z | cve-2019-1003000-jenkins-rce-poc | https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc | Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative) |
260 | 2023-09-28T10:59:41Z | CVE-2019-5786 | https://github.com/exodusintel/CVE-2019-5786 | FileReader Exploit |
267 | 2024-04-17T06:03:21Z | CVE-2019-11932 | https://github.com/dorkerdevil/CVE-2019-11932 | double-free bug in WhatsApp exploit poc |
248 | 2024-02-13T23:01:56Z | CVE-2019-1040 | https://github.com/Ridter/CVE-2019-1040 | CVE-2019-1040 with Exchange |
292 | 2024-01-12T13:09:17Z | bluekeep | https://github.com/0xeb-bp/bluekeep | Public work for CVE-2019-0708 |
887 | 2024-05-27T20:00:23Z | rdpscan | https://github.com/robertdavidgraham/rdpscan | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. |
4 | 2024-04-13T13:30:56Z | CVE-2019-0708 | https://github.com/victor0013/CVE-2019-0708 | Scanner PoC for CVE-2019-0708 RDP RCE vuln |
190 | 2024-04-22T01:13:44Z | CVE-2019-2725 | https://github.com/TopScrew/CVE-2019-2725 | CVE-2019-2725命令回显+webshell上传+最新绕过 |
212 | 2024-01-09T13:17:32Z | CVE-2019-0192 | https://github.com/mpgn/CVE-2019-0192 | RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl |
227 | 2024-03-29T05:14:17Z | CVE-2019-9810 | https://github.com/0vercl0k/CVE-2019-9810 | Exploit for CVE-2019-9810 Firefox on Windows 64-bit. |
star | updated_at | name | url | des |
---|---|---|---|---|
1937 | 2024-05-20T00:58:46Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
494 | 2024-05-11T08:16:32Z | CVE-2018-8120 | https://github.com/rip1s/CVE-2018-8120 | CVE-2018-8120 Windows LPE exploit |
493 | 2024-05-19T23:10:47Z | CVE-2018-20250 | https://github.com/WyAtu/CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
516 | 2024-05-25T19:11:28Z | CVE-2018-15473-Exploit | https://github.com/Rhynorater/CVE-2018-15473-Exploit | Exploit written in Python for CVE-2018-15473 with threading and export formats |
371 | 2024-05-21T00:02:38Z | Exchange2domain | https://github.com/Ridter/Exchange2domain | CVE-2018-8581 |
251 | 2024-05-10T18:25:48Z | CVE-2018-13379 | https://github.com/milo2012/CVE-2018-13379 | CVE-2018-13379 |
495 | 2024-05-27T16:46:36Z | CVE-2018-10933 | https://github.com/blacknbunny/CVE-2018-10933 | Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH) |
516 | 2024-05-19T10:54:42Z | CVE-2018-9995_dvr_credentials | https://github.com/ezelf/CVE-2018-9995_dvr_credentials | (CVE-2018-9995) Get DVR Credentials |
273 | 2024-04-29T10:20:59Z | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
409 | 2024-05-25T06:00:28Z | CVE-2018-8897 | https://github.com/can1357/CVE-2018-8897 | Arbitrary code execution with kernel privileges using CVE-2018-8897. |
345 | 2024-05-28T18:13:30Z | CVE-2018-7600 | https://github.com/a2u/CVE-2018-7600 | 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002 |
294 | 2024-02-13T06:27:41Z | CVE-2018-8120 | https://github.com/alpha1ab/CVE-2018-8120 | CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 |
333 | 2024-01-04T16:29:16Z | CVE-2018-8581 | https://github.com/WyAtu/CVE-2018-8581 | CVE-2018-8581 |
79 | 2023-09-28T10:49:57Z | CVE-2018-2628 | https://github.com/shengqi158/CVE-2018-2628 | CVE-2018-2628 & CVE-2018-2893 |
145 | 2024-04-30T18:14:01Z | CVE-2018-13382 | https://github.com/milo2012/CVE-2018-13382 | CVE-2018-13382 |
503 | 2024-04-27T12:50:06Z | WinboxPoC | https://github.com/BasuCert/WinboxPoC | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) |
139 | 2024-05-27T16:46:35Z | CVE-2018-8174_EXP | https://github.com/Yt1g3r/CVE-2018-8174_EXP | CVE-2018-8174_python |
200 | 2024-01-04T16:24:03Z | CVE-2018-0296 | https://github.com/yassineaboukir/CVE-2018-0296 | Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information. |
301 | 2024-03-12T18:36:51Z | struts-pwn_CVE-2018-11776 | https://github.com/mazen160/struts-pwn_CVE-2018-11776 | An exploit for Apache Struts CVE-2018-11776 |
165 | 2024-05-27T16:46:36Z | CVE-2018-3245 | https://github.com/pyn3rd/CVE-2018-3245 | CVE-2018-3245-PoC |
164 | 2023-09-28T10:50:45Z | cve-2018-8120 | https://github.com/bigric3/cve-2018-8120 | |
121 | 2024-04-27T03:45:00Z | cve-2018-8453-exp | https://github.com/ze0r/cve-2018-8453-exp | cve-2018-8453 exp |
180 | 2024-02-23T18:18:50Z | CVE-2018-15982_EXP | https://github.com/Ridter/CVE-2018-15982_EXP | exp of CVE-2018-15982 |
168 | 2024-04-30T02:39:48Z | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
121 | 2024-05-22T01:17:24Z | CVE-2018-7600 | https://github.com/pimps/CVE-2018-7600 | Exploit for Drupal 7 <= 7.57 CVE-2018-7600 |
165 | 2024-05-27T16:46:35Z | CVE-2018-8174-msf | https://github.com/0x09AL/CVE-2018-8174-msf | CVE-2018-8174 - VBScript memory corruption exploit. |
262 | 2024-01-04T16:21:57Z | credssp | https://github.com/preempt/credssp | A code demonstrating CVE-2018-0886 |
60 | 2023-11-02T05:10:34Z | bluetoothdPoC | https://github.com/rani-i/bluetoothdPoC | CVE-2018-4087 PoC |
135 | 2024-01-04T16:24:46Z | CVE-2018-2894 | https://github.com/LandGrey/CVE-2018-2894 | CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script |
130 | 2023-09-28T10:54:27Z | CVE-2018-17182 | https://github.com/jas502n/CVE-2018-17182 | Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day |
star | updated_at | name | url | des |
---|---|---|---|---|
536 | 2024-05-25T11:47:37Z | CVE-2017-11882 | https://github.com/Ridter/CVE-2017-11882 | CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882 |
719 | 2024-04-17T13:53:57Z | CVE-2017-0199 | https://github.com/bhdresh/CVE-2017-0199 | Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
1937 | 2024-05-20T00:58:46Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
745 | 2024-05-25T13:34:03Z | spectre-attack | https://github.com/Eugnis/spectre-attack | Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) |
495 | 2024-05-21T09:56:12Z | CVE-2017-11882 | https://github.com/embedi/CVE-2017-11882 | Proof-of-Concept exploits for CVE-2017-11882 |
457 | 2024-05-17T14:44:08Z | CVE-2017-0785 | https://github.com/ojasookert/CVE-2017-0785 | Blueborne CVE-2017-0785 Android information leak vulnerability |
381 | 2024-04-22T18:17:08Z | CVE-2017-12617 | https://github.com/cyberheartmi9/CVE-2017-12617 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution |
319 | 2024-02-23T19:34:15Z | CVE-2017-8759 | https://github.com/bhdresh/CVE-2017-8759 | Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
323 | 2024-05-23T14:05:42Z | CVE-2017-11882 | https://github.com/rip1s/CVE-2017-11882 | CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. |
186 | 2024-05-14T13:20:31Z | CVE-2017-8570 | https://github.com/rxwx/CVE-2017-8570 | Proof of Concept exploit for CVE-2017-8570 |
370 | 2024-05-28T18:33:22Z | exploit-CVE-2017-7494 | https://github.com/opsxcq/exploit-CVE-2017-7494 | SambaCry exploit and vulnerable container (CVE-2017-7494) |
259 | 2024-05-08T09:07:05Z | CVE-2017-7494 | https://github.com/joxeankoret/CVE-2017-7494 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability |
314 | 2024-05-03T20:27:18Z | eternal_scanner | https://github.com/peterpt/eternal_scanner | An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance) |
273 | 2024-04-29T10:20:59Z | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
257 | 2024-01-04T16:17:11Z | CVE-2017-8759-Exploit-sample | https://github.com/Voulnet/CVE-2017-8759-Exploit-sample | Running CVE-2017-8759 exploit sample. |
185 | 2024-03-12T12:43:12Z | Jira-Scan | https://github.com/random-robbie/Jira-Scan | CVE-2017-9506 - SSRF |
86 | 2024-04-08T07:52:13Z | iis6-exploit-2017-CVE-2017-7269 | https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269 | iis6 exploit 2017 CVE-2017-7269 |
80 | 2023-08-30T05:14:51Z | CVE-2017-8759 | https://github.com/Lz1y/CVE-2017-8759 | CVE-2017-8759 |
179 | 2024-01-04T16:14:21Z | cve-2017-7494 | https://github.com/betab0t/cve-2017-7494 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) |
420 | 2024-04-23T06:31:19Z | struts-pwn | https://github.com/mazen160/struts-pwn | An exploit for Apache Struts CVE-2017-5638 |
168 | 2024-04-30T02:39:48Z | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
133 | 2024-04-01T03:10:33Z | cve-2017-7269 | https://github.com/zcgonvh/cve-2017-7269 | fixed msf module for cve-2017-7269 |
249 | 2024-05-23T18:29:03Z | struts-pwn_CVE-2017-9805 | https://github.com/mazen160/struts-pwn_CVE-2017-9805 | An exploit for Apache Struts CVE-2017-9805 |
204 | 2024-04-19T09:46:51Z | jboss-_CVE-2017-12149 | https://github.com/yunxu1/jboss-_CVE-2017-12149 | CVE-2017-12149 jboss反序列化 可回显 |
142 | 2024-02-12T14:34:50Z | CVE-2017-10271 | https://github.com/c0mmand3rOpSec/CVE-2017-10271 | WebLogic Exploit |
134 | 2024-05-24T07:59:18Z | CVE-2017-0781 | https://github.com/ojasookert/CVE-2017-0781 | Blueborne CVE-2017-0781 Android heap overflow vulnerability |
44 | 2023-09-28T10:46:09Z | CVE-2017-11882 | https://github.com/starnightcyber/CVE-2017-11882 | CVE-2017-11882 exploitation |
57 | 2023-09-28T10:40:58Z | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
68 | 2023-09-28T10:43:15Z | ppsx-file-generator | https://github.com/temesgeny/ppsx-file-generator | ppsx file generator for cve-2017-8570 (based on bhdresh/cve-2017-8570) |
95 | 2024-02-20T06:53:09Z | CVE-2017-8759 | https://github.com/nccgroup/CVE-2017-8759 | NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements |
star | updated_at | name | url | des |
---|---|---|---|---|
942 | 2024-05-23T02:59:20Z | CVE-2016-5195 | https://github.com/timwr/CVE-2016-5195 | CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android |
821 | 2024-05-28T04:23:12Z | dirtycow | https://github.com/firefart/dirtycow | Dirty Cow exploit - CVE-2016-5195 |
330 | 2024-01-09T13:14:13Z | CVE-2016-0051 | https://github.com/koczkatamas/CVE-2016-0051 | EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016) |
1937 | 2024-05-20T00:58:46Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
396 | 2024-05-06T22:42:41Z | exploit-CVE-2016-10033 | https://github.com/opsxcq/exploit-CVE-2016-10033 | PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container |
307 | 2024-04-22T02:21:44Z | CVE-2016-5195 | https://github.com/gbonacini/CVE-2016-5195 | A CVE-2016-5195 exploit example. |
495 | 2024-03-16T11:29:28Z | PoCs | https://github.com/ImageTragick/PoCs | Proof of Concepts for CVE-2016–3714 |
480 | 2024-05-10T06:37:30Z | dirtycow-vdso | https://github.com/scumjr/dirtycow-vdso | PoC for Dirty COW (CVE-2016-5195) |
159 | 2024-05-07T00:25:50Z | CVE-2016-6366 | https://github.com/RiskSense-Ops/CVE-2016-6366 | Public repository for improvements to the EXTRABACON exploit |
185 | 2024-03-11T02:33:23Z | CVE-2016-2107 | https://github.com/FiloSottile/CVE-2016-2107 | Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107) |
114 | 2024-02-12T10:51:54Z | cve-2016-0189 | https://github.com/theori-io/cve-2016-0189 | Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) |
139 | 2024-05-07T09:41:16Z | chakra-2016-11 | https://github.com/theori-io/chakra-2016-11 | Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) |
84 | 2024-03-21T01:07:43Z | CVE-2016-7255 | https://github.com/FSecureLABS/CVE-2016-7255 | An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit |
339 | 2024-04-17T04:15:54Z | ExtractKeyMaster | https://github.com/laginimaineb/ExtractKeyMaster | Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431 |
155 | 2023-09-28T10:37:39Z | BadKernel | https://github.com/secmob/BadKernel | Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016 |
69 | 2024-02-20T09:36:17Z | CVE-2016-3714 | https://github.com/Hood3dRob1n/CVE-2016-3714 | ImaegMagick Code Execution (CVE-2016-3714) |
80 | 2023-09-28T10:33:57Z | CVE-2016-0801 | https://github.com/abdsec/CVE-2016-0801 | |
52 | 2024-04-17T21:15:22Z | cve-2016-1764 | https://github.com/moloch--/cve-2016-1764 | Extraction of iMessage Data via XSS |
104 | 2024-04-30T02:58:29Z | jscpwn | https://github.com/saelo/jscpwn | PoC exploit for CVE-2016-4622 |
99 | 2024-02-12T18:40:15Z | PegasusX | https://github.com/jndok/PegasusX | OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656 |
57 | 2023-09-28T10:40:58Z | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
46 | 2023-09-28T10:32:48Z | cve-2016-0040 | https://github.com/Rootkitsmm-zz/cve-2016-0040 | Exploiting CVE-2016-0040 uninitialized pointer |
54 | 2024-03-09T00:56:25Z | cve-2016-2431 | https://github.com/laginimaineb/cve-2016-2431 | Qualcomm TrustZone kernel privilege escalation |
51 | 2024-01-04T16:07:40Z | CVE-2016-3308 | https://github.com/55-AA/CVE-2016-3308 | Use CVE-2016-3308 corrupt win32k desktop heap |
262 | 2024-05-16T01:55:09Z | VIKIROOT | https://github.com/hyln9/VIKIROOT | CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow |
53 | 2023-09-28T10:37:53Z | exploit-CVE-2016-6515 | https://github.com/opsxcq/exploit-CVE-2016-6515 | OpenSSH remote DOS exploit and vulnerable container |
81 | 2024-05-23T12:49:37Z | MS16-032 | https://github.com/zcgonvh/MS16-032 | MS16-032(CVE-2016-0099) for SERVICE ONLY |
54 | 2024-04-17T20:40:56Z | CVE-2016-3309_Reloaded | https://github.com/siberas/CVE-2016-3309_Reloaded | Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques |
83 | 2024-04-12T16:03:01Z | mach_race | https://github.com/gdbinit/mach_race | Exploit code for CVE-2016-1757 |
49 | 2023-09-07T17:01:10Z | CVE-2016-2434 | https://github.com/jianqiangzhao/CVE-2016-2434 |
star | updated_at | name | url | des |
---|---|---|---|---|
547 | 2024-05-02T14:56:23Z | CVE-2015-7547 | https://github.com/fjserna/CVE-2015-7547 | Proof of concept for CVE-2015-7547 |
284 | 2024-01-30T00:26:36Z | CVE-2015-1701 | https://github.com/hfiref0x/CVE-2015-1701 | Win32k LPE vulnerability used in APT attack |
269 | 2024-04-17T23:51:23Z | iovyroot | https://github.com/dosomder/iovyroot | CVE-2015-1805 root tool |
204 | 2024-04-28T16:14:09Z | cve-2015-1538-1 | https://github.com/jduck/cve-2015-1538-1 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution |
131 | 2023-08-04T13:41:05Z | CVE-2015-3636 | https://github.com/fi01/CVE-2015-3636 | PoC code for 32 bit Android OS |
115 | 2024-03-21T21:14:38Z | cve-2015-6639 | https://github.com/laginimaineb/cve-2015-6639 | QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639) |
395 | 2024-02-24T11:41:57Z | tpwn | https://github.com/kpwn/tpwn | xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time |
118 | 2024-01-11T13:54:32Z | PoCForCVE-2015-1528 | https://github.com/secmob/PoCForCVE-2015-1528 | I'll submit the poc after blackhat |
124 | 2024-05-10T13:48:08Z | exploit-CVE-2015-3306 | https://github.com/t0kx/exploit-CVE-2015-3306 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container |
65 | 2023-09-28T10:29:50Z | cve-2015-5477 | https://github.com/robertdavidgraham/cve-2015-5477 | PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure |
339 | 2024-04-17T04:15:54Z | ExtractKeyMaster | https://github.com/laginimaineb/ExtractKeyMaster | Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431 |
103 | 2024-05-24T08:34:34Z | juniper-cve-2015-7755 | https://github.com/hdm/juniper-cve-2015-7755 | Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS |
68 | 2024-03-15T08:25:01Z | CVE-2015-6086 | https://github.com/payatu/CVE-2015-6086 | PoC for CVE-2015-6086 |
43 | 2023-06-30T06:36:02Z | libpingpong_exploit | https://github.com/android-rooting-tools/libpingpong_exploit | CVE-2015-3636 exploit |
31 | 2023-09-27T08:05:00Z | CVE-2015-1805 | https://github.com/panyu6325/CVE-2015-1805 | |
24 | 2022-07-23T07:42:34Z | CVE-2015-6612 | https://github.com/secmob/CVE-2015-6612 | |
43 | 2024-01-13T17:58:48Z | mysslstrip | https://github.com/duo-labs/mysslstrip | CVE-2015-3152 PoC |
52 | 2024-04-22T14:41:59Z | bluebox | https://github.com/JackOfMostTrades/bluebox | Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049 |
22 | 2020-12-24T15:36:05Z | CVE-2015-2546-Exploit | https://github.com/k0keoyo/CVE-2015-2546-Exploit | |
39 | 2023-09-07T17:08:30Z | CVE-2015-6620-POC | https://github.com/flankerhqd/CVE-2015-6620-POC | POC for CVE-2015-6620, AMessage unmarshal arbitrary write |
33 | 2024-02-10T07:28:49Z | exploit-CVE-2015-1427 | https://github.com/t0kx/exploit-CVE-2015-1427 | Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container |
11 | 2024-02-24T11:42:05Z | privesc-CVE-2015-5602 | https://github.com/t0kx/privesc-CVE-2015-5602 | Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container |
25 | 2023-09-28T10:36:00Z | CVE-2015-0057 | https://github.com/55-AA/CVE-2015-0057 | 翻译文章,CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC ) |
30 | 2023-09-28T10:32:55Z | serialator | https://github.com/roo7break/serialator | Python script to exploit CVE-2015-4852. |
21 | 2019-12-08T12:35:07Z | cve-2015-0313 | https://github.com/SecurityObscurity/cve-2015-0313 | |
4 | 2023-09-28T10:30:08Z | libping_unhash_exploit_POC | https://github.com/askk/libping_unhash_exploit_POC | CVE-2015-3636 exploit |
21 | 2023-10-31T08:45:17Z | CVE-2015-7501 | https://github.com/ianxtianxt/CVE-2015-7501 | (CVE-2015-7501)JBoss JMXInvokerServlet 反序列化漏洞 |
15 | 2021-12-20T20:47:43Z | CVE-2015-6132 | https://github.com/hexx0r/CVE-2015-6132 | Microsoft Office / COM Object DLL Planting |
18 | 2024-01-19T07:25:53Z | CVE-2015-3636 | https://github.com/a7vinx/CVE-2015-3636 | Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code. |
14 | 2023-09-28T10:30:24Z | CVE-2015-5119_walkthrough | https://github.com/CiscoCXSecurity/CVE-2015-5119_walkthrough | Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough |
Wechat Pay | AliPay | Paypal | BTC Pay | BCH Pay |
---|---|---|---|---|
paypal miracletalent@gmail.com |