all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things
- 2025 year top total 30
- 2024 year top total 30
- 2023 year top total 30
- 2022 year top total 30
- 2021 year top total 30
- 2020 year top total 30
- 2019 year top total 30
- 2018 year top total 30
- 2017 year top total 30
- 2016 year top total 30
star | updated_at | name | url | des |
---|---|---|---|---|
491 | 2025-05-29T11:35:09Z | CVE-2018-20250 | https://github.com/WyAtu/CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
402 | 2025-07-01T16:06:19Z | CVE-2025-33073 | https://github.com/mverschu/CVE-2025-33073 | PoC Exploit for the NTLM reflection SMB flaw. |
207 | 2025-06-26T15:43:53Z | IngressNightmare-PoC | https://github.com/hakaioffsec/IngressNightmare-PoC | This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974). |
184 | 2025-06-20T15:18:47Z | CVE-2025-21298 | https://github.com/ynwarcs/CVE-2025-21298 | Proof of concept & details for CVE-2025-21298 |
310 | 2025-06-29T10:57:40Z | CVE-2025-24071_PoC | https://github.com/0x6rss/CVE-2025-24071_PoC | CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File |
184 | 2025-06-23T07:11:11Z | CVE-2025-30208-EXP | https://github.com/ThumpBo/CVE-2025-30208-EXP | CVE-2025-30208-EXP |
108 | 2025-06-30T08:56:12Z | AirBorne-PoC | https://github.com/ekomsSavior/AirBorne-PoC | poc for CVE-2025-24252 & CVE-2025-24132 |
300 | 2025-07-01T05:25:49Z | o3_finds_cve-2025-37899 | https://github.com/SeanHeelan/o3_finds_cve-2025-37899 | Artefacts for blog post on finding CVE-2025-37899 with o3 |
143 | 2025-06-30T18:54:45Z | POC-CVE-2025-24813 | https://github.com/absholi7ly/POC-CVE-2025-24813 | his repository contains an automated Proof of Concept (PoC) script for exploiting CVE-2025-24813, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met. |
195 | 2025-06-30T07:41:51Z | CVE-2025-21333-POC | https://github.com/MrAle98/CVE-2025-21333-POC | POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY |
61 | 2024-08-12T19:53:29Z | CVE_2019_2025_EXP | https://github.com/jltxgcy/CVE_2019_2025_EXP | |
142 | 2025-06-29T06:28:33Z | CVE-2025-26125 | https://github.com/ZeroMemoryEx/CVE-2025-26125 | (0day) Local Privilege Escalation in IObit Malware Fighter |
112 | 2025-06-27T23:27:40Z | CVE-2025-32433 | https://github.com/ProDefense/CVE-2025-32433 | CVE-2025-32433 https://github.com/erlang/otp/security/advisories/GHSA-37cp-fgq5-7wc2 |
140 | 2025-06-30T01:32:02Z | CVE-2025-21756 | https://github.com/hoefler02/CVE-2025-21756 | Exploit for CVE-2025-21756 for Linux kernel 6.6.75. My first linux kernel exploit! |
78 | 2025-05-31T23:28:54Z | CVE-2025-29927 | https://github.com/aydinnyunus/CVE-2025-29927 | CVE-2025-29927 Proof of Concept |
137 | 2025-06-26T18:59:34Z | 7-Zip-CVE-2025-0411-POC | https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC | This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass. |
78 | 2025-06-29T07:07:24Z | CVE-2025-32756-POC | https://github.com/kn0x0x/CVE-2025-32756-POC | Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting multiple Fortinet products. |
86 | 2025-06-20T14:41:21Z | CVE-2025-24813-PoC | https://github.com/iSee857/CVE-2025-24813-PoC | Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813) |
68 | 2025-07-01T08:19:44Z | CVE-2025-49113 | https://github.com/fearsoff-org/CVE-2025-49113 | |
66 | 2025-06-29T06:20:25Z | CVE-2025-22457 | https://github.com/sfewer-r7/CVE-2025-22457 | PoC for CVE-2025-22457 |
80 | 2025-06-18T00:53:52Z | CVE-2025-21420-PoC | https://github.com/Network-Sec/CVE-2025-21420-PoC | We found a way to DLL sideload with cleanmgr.exe |
89 | 2025-06-02T16:53:19Z | IngressNightmare-POCs | https://github.com/sandumjacob/IngressNightmare-POCs | Worlds First Public POC for CVE-2025-1974 |
51 | 2025-07-01T07:14:11Z | CVE-2025-49144_PoC | https://github.com/TheTorjanCaptain/CVE-2025-49144_PoC | CVE-2025-49144 PoC for security researchers to test and try. |
45 | 2025-06-29T06:15:02Z | CVE-2025-0282 | https://github.com/sfewer-r7/CVE-2025-0282 | PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways |
49 | 2025-05-19T16:24:56Z | CVE-2025-1974 | https://github.com/yoshino-s/CVE-2025-1974 | |
95 | 2025-07-01T07:51:59Z | apple-positional-audio-codec-invalid-header | https://github.com/zhuowei/apple-positional-audio-codec-invalid-header | CVE-2025-31200 - @Noahhw46 figured it out |
29 | 2025-06-24T17:38:00Z | CVE-2025-0108-PoC | https://github.com/iSee857/CVE-2025-0108-PoC | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108) |
25 | 2021-05-29T18:38:32Z | CVE-2018-20250 | https://github.com/QAX-A-Team/CVE-2018-20250 | 010 Editor template for ACE archive format & CVE-2018-2025[0-3] |
85 | 2025-07-01T01:46:10Z | ingressNightmare-CVE-2025-1974-exps | https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps | IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available. |
46 | 2025-06-29T06:14:35Z | CVE-2025-0282-Ivanti-exploit | https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit | CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit. |
star | updated_at | name | url | des |
---|---|---|---|---|
2374 | 2025-06-30T01:41:41Z | CVE-2024-1086 | https://github.com/Notselwyn/CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. |
673 | 2025-06-27T02:44:51Z | CVE-2024-38063 | https://github.com/ynwarcs/CVE-2024-38063 | poc for CVE-2024-38063 (RCE in tcpip.sys) |
476 | 2025-06-06T11:36:26Z | cve-2024-6387-poc | https://github.com/zgzhang/cve-2024-6387-poc | a signal handler race condition in OpenSSH's server (sshd) |
499 | 2025-06-09T11:00:24Z | CVE-2024-49113 | https://github.com/SafeBreach-Labs/CVE-2024-49113 | LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 |
530 | 2025-06-25T18:28:02Z | git_rce | https://github.com/amalmurali47/git_rce | Exploit PoC for CVE-2024-32002 |
497 | 2025-06-22T10:45:16Z | CVE-2024-6387_Check | https://github.com/xaitax/CVE-2024-6387_Check | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH |
379 | 2025-06-07T14:17:55Z | cve-2024-6387-poc | https://github.com/acrono/cve-2024-6387-poc | 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc |
216 | 2025-06-19T07:49:39Z | CVE-2024-38077 | https://github.com/qi4L/CVE-2024-38077 | RDL的堆溢出导致的RCE |
346 | 2025-06-15T19:38:48Z | CVE-2024-26229 | https://github.com/varwara/CVE-2024-26229 | CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code |
308 | 2025-06-26T14:40:18Z | CVE-2024-0044 | https://github.com/0xbinder/CVE-2024-0044 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 |
285 | 2025-06-09T13:37:02Z | CVE-2024-4577 | https://github.com/watchtowrlabs/CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC |
279 | 2025-06-14T07:48:09Z | CVE-2024-35250 | https://github.com/varwara/CVE-2024-35250 | PoC for the Untrusted Pointer Dereference in the ks.sys driver |
295 | 2025-06-25T19:15:13Z | CVE-2024-21338 | https://github.com/hakaioffsec/CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. |
251 | 2025-06-01T04:47:33Z | CVE-2024-30088 | https://github.com/tykawaii98/CVE-2024-30088 | |
198 | 2025-04-07T15:29:43Z | CVE-2024-23897 | https://github.com/h4x0r-dz/CVE-2024-23897 | CVE-2024-23897 |
3522 | 2025-07-01T12:50:15Z | xzbot | https://github.com/amlweems/xzbot | notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) |
731 | 2025-06-27T01:47:56Z | CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability |
165 | 2025-06-19T18:23:49Z | CVE-2024-4367-PoC | https://github.com/LOURC0D3/CVE-2024-4367-PoC | CVE-2024-4367 & CVE-2024-34342 Proof of Concept |
251 | 2025-06-30T04:45:03Z | CVE-2024-49138-POC | https://github.com/MrAle98/CVE-2024-49138-POC | POC exploit for CVE-2024-49138 |
9 | 2025-03-30T21:14:15Z | CVE-2024-38077-POC | https://github.com/SecStarBot/CVE-2024-38077-POC | |
237 | 2025-06-24T02:11:10Z | CVE_2024_30078_POC_WIFI | https://github.com/blkph0x/CVE_2024_30078_POC_WIFI | basic concept for the latest windows wifi driver CVE |
98 | 2025-06-21T17:38:18Z | apache-vulnerability-testing | https://github.com/mrmtwoj/apache-vulnerability-testing | Apache HTTP Server Vulnerability Testing Tool |
219 | 2025-03-24T04:03:26Z | CVE-2024-21111 | https://github.com/mansk1es/CVE-2024-21111 | Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability |
81 | 2025-05-14T14:55:15Z | CVE-2024-30078- | https://github.com/lvyitian/CVE-2024-30078- | CVE-2024-30078 Detection and Command Execution Script |
137 | 2025-03-30T16:41:17Z | CVE-2024-7479_CVE-2024-7481 | https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481 | TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006. |
168 | 2025-06-07T03:30:34Z | CVE-2024-25600 | https://github.com/Chocapikk/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 |
141 | 2025-05-22T08:49:16Z | CVE-2024-38200 | https://github.com/passtheticket/CVE-2024-38200 | CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability |
154 | 2025-05-25T13:41:41Z | CVE-2024-21413 | https://github.com/duy-31/CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC |
126 | 2025-06-28T15:20:27Z | CVE-2024-6387 | https://github.com/Karmakstylez/CVE-2024-6387 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) |
122 | 2025-04-30T22:26:53Z | cve-2024-6387-poc | https://github.com/lflare/cve-2024-6387-poc | MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc |
star | updated_at | name | url | des |
---|---|---|---|---|
421 | 2025-04-23T09:34:33Z | qq-tim-elevation | https://github.com/vi3t1/qq-tim-elevation | CVE-2023-34312 |
1481 | 2025-06-26T15:56:47Z | cvelist | https://github.com/CVEProject/cvelist | Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023 |
786 | 2025-06-19T07:49:43Z | CVE-2023-38831-winrar-exploit | https://github.com/b1tg/CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator |
490 | 2025-06-09T15:36:16Z | Windows_LPE_AFD_CVE-2023-21768 | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | LPE exploit for CVE-2023-21768 |
371 | 2025-04-18T15:44:51Z | CVE-2023-32233 | https://github.com/Liuk3r/CVE-2023-32233 | CVE-2023-32233: Linux内核中的安全漏洞 |
388 | 2025-06-27T16:12:08Z | CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | PoC for CVE-2023-4911 |
398 | 2025-06-23T07:07:19Z | CVE-2023-0386 | https://github.com/xkaneiki/CVE-2023-0386 | CVE-2023-0386在ubuntu22.04上的提权 |
316 | 2025-06-27T11:21:31Z | CVE-2023-21752 | https://github.com/Wh04m1001/CVE-2023-21752 | |
94 | 2025-06-26T12:08:53Z | CVE-2023-21839 | https://github.com/ASkyeye/CVE-2023-21839 | Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE) |
643 | 2025-06-23T15:00:26Z | keepass-password-dumper | https://github.com/vdohney/keepass-password-dumper | Original PoC for CVE-2023-32784 |
273 | 2025-06-27T20:51:30Z | CVE-2023-21608 | https://github.com/hacksysteam/CVE-2023-21608 | Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit |
315 | 2025-06-03T09:17:22Z | CVE-2023-4863 | https://github.com/mistymntncop/CVE-2023-4863 | |
235 | 2025-07-01T11:05:35Z | CVE-2023-44487 | https://github.com/bcdannyboy/CVE-2023-44487 | Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487 |
234 | 2025-06-11T06:33:30Z | CVE-2023-36874 | https://github.com/Wh04m1001/CVE-2023-36874 | |
164 | 2025-05-30T10:30:03Z | CVE-2023-36745 | https://github.com/N1k0la-T/CVE-2023-36745 | |
347 | 2025-06-17T09:02:18Z | CVE-2023-23397-POC-Powershell | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | |
232 | 2025-04-21T10:47:13Z | CVE-2023-20887 | https://github.com/sinsinology/CVE-2023-20887 | VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) |
225 | 2025-06-28T22:43:44Z | CVE-2023-3519 | https://github.com/BishopFox/CVE-2023-3519 | RCE exploit for CVE-2023-3519 |
138 | 2025-06-27T16:08:19Z | CVE-2023-34362 | https://github.com/horizon3ai/CVE-2023-34362 | MOVEit CVE-2023-34362 |
240 | 2025-05-12T12:29:41Z | CVE-2023-7028 | https://github.com/Vozec/CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 |
179 | 2025-06-14T07:48:06Z | CVE-2023-28252 | https://github.com/fortra/CVE-2023-28252 | |
236 | 2025-06-10T13:16:15Z | Weblogic-CVE-2023-21839 | https://github.com/DXask88MA/Weblogic-CVE-2023-21839 | |
203 | 2025-04-10T13:15:30Z | CVE-2023-46747-RCE | https://github.com/W01fh4cker/CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 |
284 | 2025-07-01T03:51:46Z | CVE-2023-25690-POC | https://github.com/dhmosfunk/CVE-2023-25690-POC | CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability. |
149 | 2025-05-20T21:01:11Z | cve-2023-29360 | https://github.com/Nero22k/cve-2023-29360 | Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver |
128 | 2025-06-30T01:07:56Z | CVE-2023-2640-CVE-2023-32629 | https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629 | GameOver(lay) Ubuntu Privilege Escalation |
231 | 2025-04-22T14:43:35Z | CVE-2023-29357 | https://github.com/Chocapikk/CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
170 | 2025-06-24T13:53:22Z | CVE-2023-25157 | https://github.com/win3zz/CVE-2023-25157 | CVE-2023-25157 - GeoServer SQL Injection - PoC |
161 | 2025-06-28T12:29:50Z | CVE-2023-23397_EXPLOIT_0DAY | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | Exploit for the CVE-2023-23397 |
168 | 2025-04-23T19:05:26Z | CVE-2023-4911 | https://github.com/RickdeJager/CVE-2023-4911 | CVE-2023-4911 proof of concept |
star | updated_at | name | url | des |
---|---|---|---|---|
430 | 2025-05-18T16:02:36Z | CVE-2022-25636 | https://github.com/Bonfee/CVE-2022-25636 | CVE-2022-25636 |
460 | 2025-06-23T19:24:30Z | CVE-2022-21882 | https://github.com/KaLendsi/CVE-2022-21882 | win32k LPE |
1108 | 2025-06-20T14:34:45Z | CVE-2022-0847-DirtyPipe-Exploit | https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit | A root exploit for CVE-2022-0847 (Dirty Pipe) |
685 | 2025-05-15T23:07:56Z | CVE-2022-29072 | https://github.com/kagancapar/CVE-2022-29072 | 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. |
371 | 2025-06-09T07:18:09Z | CVE-2022-0185 | https://github.com/Crusaders-of-Rust/CVE-2022-0185 | CVE-2022-0185 |
570 | 2025-06-26T15:33:35Z | CVE-2022-23222 | https://github.com/tr3ee/CVE-2022-23222 | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation |
497 | 2025-03-30T19:28:57Z | CVE-2022-0995 | https://github.com/Bonfee/CVE-2022-0995 | CVE-2022-0995 exploit |
220 | 2025-06-05T05:50:47Z | Spring-Cloud-Gateway-CVE-2022-22947 | https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 | CVE-2022-22947 |
532 | 2025-05-21T06:09:46Z | OpenSSL-2022 | https://github.com/NCSC-NL/OpenSSL-2022 | Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 |
362 | 2025-04-17T05:07:11Z | CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 |
373 | 2025-06-12T07:25:23Z | CVE-2022-29464 | https://github.com/hakivvi/CVE-2022-29464 | WSO2 RCE (CVE-2022-29464) exploit and writeup. |
353 | 2025-06-29T11:36:45Z | CVE-2022-40684 | https://github.com/horizon3ai/CVE-2022-40684 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager |
486 | 2025-06-05T02:35:27Z | CVE-2022-2588 | https://github.com/Markakd/CVE-2022-2588 | exploit for CVE-2022-2588 |
611 | 2025-06-27T15:10:14Z | CVE-2022-0847-DirtyPipe-Exploits | https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. |
386 | 2025-06-10T14:01:39Z | CVE-2022-39197 | https://github.com/its-arun/CVE-2022-39197 | CobaltStrike <= 4.7.1 RCE |
406 | 2025-06-19T09:46:59Z | CVE-2022-33679 | https://github.com/Bdenneu/CVE-2022-33679 | One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html |
282 | 2025-06-23T13:36:36Z | CVE-2022-0847 | https://github.com/r1is/CVE-2022-0847 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” |
317 | 2025-07-01T14:04:57Z | CVE-2022-39197-patch | https://github.com/burpheart/CVE-2022-39197-patch | CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. |
329 | 2025-06-16T19:27:12Z | CVE-2022-21894 | https://github.com/Wack0/CVE-2022-21894 | baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability |
455 | 2025-05-28T00:06:06Z | CVE-2022-27254 | https://github.com/nonamecoder/CVE-2022-27254 | PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254) |
308 | 2025-04-18T15:44:43Z | CVE-2022-21971 | https://github.com/0vercl0k/CVE-2022-21971 | PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability" |
313 | 2025-06-29T10:36:10Z | Spring4Shell-POC | https://github.com/reznok/Spring4Shell-POC | Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit |
267 | 2025-06-28T12:54:13Z | CVE-2022-39952 | https://github.com/horizon3ai/CVE-2022-39952 | POC for CVE-2022-39952 |
277 | 2025-05-28T16:51:52Z | cve-2022-27255 | https://github.com/infobyte/cve-2022-27255 | |
197 | 2025-06-25T15:27:08Z | CVE-2022-21882 | https://github.com/L4ys/CVE-2022-21882 | |
116 | 2024-12-14T15:02:55Z | CVE-2022-22963 | https://github.com/dinosn/CVE-2022-22963 | CVE-2022-22963 PoC |
392 | 2025-06-28T16:24:34Z | CVE-2022-38694_unlock_bootloader | https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader | This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692 |
282 | 2025-06-08T23:32:35Z | VMware-CVE-2022-22954 | https://github.com/sherlocksecurity/VMware-CVE-2022-22954 | POC for VMWARE CVE-2022-22954 |
240 | 2025-04-17T02:16:27Z | CVE-2022-20699 | https://github.com/Audiobahn/CVE-2022-20699 | Cisco Anyconnect VPN unauth RCE (rwx stack) |
183 | 2024-11-21T13:26:19Z | CVE-2022-0778 | https://github.com/drago-96/CVE-2022-0778 | Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt |
star | updated_at | name | url | des |
---|---|---|---|---|
1375 | 2025-06-25T07:11:05Z | noPac | https://github.com/cube0x0/noPac | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. |
1906 | 2025-06-25T02:14:39Z | CVE-2021-1675 | https://github.com/cube0x0/CVE-2021-1675 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 |
2009 | 2025-07-01T18:23:29Z | CVE-2021-4034 | https://github.com/berdav/CVE-2021-4034 | CVE-2021-4034 1day |
1642 | 2025-06-29T03:52:32Z | CVE-2021-40444 | https://github.com/lockedbyte/CVE-2021-40444 | CVE-2021-40444 PoC |
1089 | 2025-06-29T22:02:20Z | CVE-2021-4034 | https://github.com/arthepsy/CVE-2021-4034 | PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) |
982 | 2025-06-30T02:21:03Z | CVE-2021-3156 | https://github.com/blasty/CVE-2021-3156 | |
1061 | 2025-07-01T14:44:03Z | CVE-2021-1675 | https://github.com/calebstewart/CVE-2021-1675 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) |
494 | 2025-06-09T03:10:07Z | CVE-2021-21972 | https://github.com/NS-Sp4ce/CVE-2021-21972 | CVE-2021-21972 Exploit |
1023 | 2025-06-27T10:10:39Z | sam-the-admin | https://github.com/safebuffer/sam-the-admin | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
813 | 2025-07-01T14:04:56Z | CVE-2021-40444 | https://github.com/klezVirus/CVE-2021-40444 | CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit |
419 | 2025-06-14T07:48:01Z | CVE-2021-1732-Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit | CVE-2021-1732 Exploit |
758 | 2025-06-30T02:22:54Z | CVE-2021-3156 | https://github.com/worawit/CVE-2021-3156 | Sudo Baron Samedit Exploit |
824 | 2025-05-05T15:11:38Z | CVE-2021-31166 | https://github.com/0vercl0k/CVE-2021-31166 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. |
857 | 2025-06-12T05:00:00Z | CVE-2021-44228-Scanner | https://github.com/logpresso/CVE-2021-44228-Scanner | Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 |
897 | 2025-07-01T19:26:08Z | noPac | https://github.com/Ridter/noPac | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
1835 | 2025-06-24T10:09:50Z | log4j-shell-poc | https://github.com/kozmer/log4j-shell-poc | A Proof-Of-Concept for the CVE-2021-44228 vulnerability. |
425 | 2025-06-18T11:08:17Z | CVE-2021-3493 | https://github.com/briskets/CVE-2021-3493 | Ubuntu OverlayFS Local Privesc |
333 | 2025-03-18T15:11:20Z | CVE-2021-1675-LPE | https://github.com/hlldz/CVE-2021-1675-LPE | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 |
1121 | 2025-06-20T12:30:37Z | log4shell-vulnerable-app | https://github.com/christophetd/log4shell-vulnerable-app | Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228). |
180 | 2025-05-31T23:32:22Z | exprolog | https://github.com/herwonowr/exprolog | ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065) |
436 | 2025-04-18T15:44:41Z | log4j-finder | https://github.com/fox-it/log4j-finder | Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) |
437 | 2025-06-25T18:47:07Z | CVE-2021-3156 | https://github.com/stong/CVE-2021-3156 | PoC for CVE-2021-3156 (sudo heap overflow) |
175 | 2025-05-31T23:32:23Z | ProxyVulns | https://github.com/hosch3n/ProxyVulns | [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains. |
274 | 2025-04-30T14:57:13Z | CVE-2021-22205 | https://github.com/Al1ex/CVE-2021-22205 | CVE-2021-22205& GitLab CE/EE RCE |
3426 | 2025-06-30T08:14:31Z | log4j-scan | https://github.com/fullhunt/log4j-scan | A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 |
260 | 2025-03-19T02:33:13Z | CVE-2021-21972 | https://github.com/horizon3ai/CVE-2021-21972 | Proof of Concept Exploit for vCenter CVE-2021-21972 |
148 | 2025-05-22T09:31:06Z | CVE-2021-41773_CVE-2021-42013 | https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013 | CVE-2021-41773 CVE-2021-42013漏洞批量检测工具 |
272 | 2025-06-28T20:01:26Z | CVE-2021-36260 | https://github.com/Aiminsun/CVE-2021-36260 | command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands. |
363 | 2025-06-23T11:56:43Z | Grafana-CVE-2021-43798 | https://github.com/jas502n/Grafana-CVE-2021-43798 | Grafana Unauthorized arbitrary file reading vulnerability |
282 | 2025-06-28T14:26:41Z | CVE-2021-34527 | https://github.com/JohnHammond/CVE-2021-34527 |
star | updated_at | name | url | des |
---|---|---|---|---|
4227 | 2025-06-25T05:48:31Z | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
1777 | 2025-07-01T12:30:33Z | CVE-2020-1472 | https://github.com/SecuraBV/CVE-2020-1472 | Test tool for CVE-2020-1472 |
2044 | 2025-06-28T12:54:59Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1327 | 2025-06-30T04:33:09Z | CVE-2020-0796 | https://github.com/danigargu/CVE-2020-0796 | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost |
1239 | 2025-06-25T18:10:52Z | CVE-2020-1472 | https://github.com/dirkjanm/CVE-2020-1472 | PoC for Zerologon - all research credits go to Tom Tervoort of Secura |
284 | 2025-06-09T18:41:58Z | CVE-2020-14882 | https://github.com/jas502n/CVE-2020-14882 | CVE-2020–14882、CVE-2020–14883 |
324 | 2025-05-03T01:39:52Z | cve-2020-0688 | https://github.com/Ridter/cve-2020-0688 | cve-2020-0688 |
668 | 2025-06-30T18:20:39Z | zerologon | https://github.com/risksense/zerologon | Exploit for zerologon cve-2020-1472 |
685 | 2025-06-26T10:10:19Z | SMBGhost | https://github.com/ly4k/SMBGhost | Scanner for CVE-2020-0796 - SMBv3 RCE |
373 | 2025-03-19T11:17:00Z | CVE-2020-5902 | https://github.com/jas502n/CVE-2020-5902 | CVE-2020-5902 BIG-IP |
560 | 2025-06-26T06:43:45Z | CVE-2020-0796-RCE-POC | https://github.com/jamf/CVE-2020-0796-RCE-POC | CVE-2020-0796 Remote Code Execution POC |
348 | 2025-06-29T22:55:44Z | CVEAC-2020 | https://github.com/thesecretclub/CVEAC-2020 | EasyAntiCheat Integrity check bypass by mimicking memory changes |
132 | 2025-01-31T14:12:58Z | CVE_2020_2546 | https://github.com/hktalent/CVE_2020_2546 | CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, |
890 | 2025-06-30T09:54:56Z | CurveBall | https://github.com/ly4k/CurveBall | PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) |
293 | 2025-04-03T15:21:38Z | CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | Cnvd-2020-10487 / cve-2020-1938, scanner tool |
220 | 2025-05-13T10:14:23Z | SAP_RECON | https://github.com/chipik/SAP_RECON | PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability) |
355 | 2025-06-13T03:35:28Z | CVE-2020-0688 | https://github.com/zcgonvh/CVE-2020-0688 | Exploit and detect tools for CVE-2020-0688 |
335 | 2025-05-15T10:42:27Z | CVE-2020-2551 | https://github.com/Y4er/CVE-2020-2551 | Weblogic IIOP CVE-2020-2551 |
250 | 2025-04-07T15:28:27Z | BlueGate | https://github.com/ly4k/BlueGate | PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE |
99 | 2025-01-21T13:40:05Z | dnspooq | https://github.com/knqyf263/dnspooq | DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) |
717 | 2025-07-01T12:21:56Z | CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | Support ALL Windows Version |
163 | 2025-04-17T02:22:58Z | cve-2020-0688 | https://github.com/random-robbie/cve-2020-0688 | cve-2020-0688 |
384 | 2025-05-29T09:53:59Z | CVE-2020-1472 | https://github.com/VoidSec/CVE-2020-1472 | Exploit Code for CVE-2020-1472 aka Zerologon |
328 | 2025-05-18T02:12:01Z | CVE-2020-0796-PoC | https://github.com/eerykitty/CVE-2020-0796-PoC | PoC for triggering buffer overflow via CVE-2020-0796 |
240 | 2025-06-06T16:39:52Z | CVE-2020-0041 | https://github.com/bluefrostsecurity/CVE-2020-0041 | Exploits for Android Binder bug CVE-2020-0041 |
337 | 2024-08-12T19:56:40Z | chainoffools | https://github.com/kudelskisecurity/chainoffools | A PoC for CVE-2020-0601 |
339 | 2025-05-07T14:03:28Z | CVE-2020-0683 | https://github.com/padovah4ck/CVE-2020-0683 | CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege |
486 | 2025-07-01T02:48:03Z | CVE-2020-15368 | https://github.com/stong/CVE-2020-15368 | CVE-2020-15368, aka "How to exploit a vulnerable driver" |
392 | 2025-06-09T08:34:20Z | Ghostcat-CNVD-2020-10487 | https://github.com/00theway/Ghostcat-CNVD-2020-10487 | Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938) |
121 | 2025-03-11T04:41:00Z | CVE-2020-11651-poc | https://github.com/jasperla/CVE-2020-11651-poc | PoC exploit of CVE-2020-11651 and CVE-2020-11652 |
star | updated_at | name | url | des |
---|---|---|---|---|
4227 | 2025-06-25T05:48:31Z | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
2044 | 2025-06-28T12:54:59Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1824 | 2025-06-17T02:01:49Z | phuip-fpizdam | https://github.com/neex/phuip-fpizdam | Exploit for CVE-2019-11043 |
1182 | 2025-06-30T09:54:54Z | BlueKeep | https://github.com/Ekultek/BlueKeep | Proof of concept for CVE-2019-0708 |
494 | 2025-07-01T16:12:01Z | CVE-2019-0708 | https://github.com/n1xbyte/CVE-2019-0708 | dump |
391 | 2025-06-14T05:24:24Z | CVE-2019-0708 | https://github.com/k8gege/CVE-2019-0708 | 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check) |
647 | 2025-06-30T09:54:53Z | CVE-2019-5736-PoC | https://github.com/Frichetten/CVE-2019-5736-PoC | PoC for CVE-2019-5736 |
437 | 2025-05-22T21:30:44Z | CVE-2019-2725 | https://github.com/lufeirider/CVE-2019-2725 | CVE-2019-2725 命令回显 |
810 | 2025-06-16T12:15:25Z | esp32_esp8266_attacks | https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) |
572 | 2025-05-25T18:40:17Z | cve-2019-19781 | https://github.com/trustedsec/cve-2019-19781 | This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first. |
350 | 2025-06-30T09:54:56Z | COMahawk | https://github.com/apt69/COMahawk | Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322 |
363 | 2025-02-22T18:04:27Z | CVE-2019-11510 | https://github.com/projectzeroindia/CVE-2019-11510 | Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) |
369 | 2025-05-25T18:40:12Z | CVE-2019-19781 | https://github.com/projectzeroindia/CVE-2019-19781 | Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ] |
331 | 2025-06-07T14:17:34Z | CVE-2019-13272 | https://github.com/jas502n/CVE-2019-13272 | Linux 4.10 < 5.1.17 PTRACE_TRACEME local root |
134 | 2024-12-17T10:35:30Z | CVE-2019-0604 | https://github.com/linhlhq/CVE-2019-0604 | CVE-2019-0604 |
625 | 2025-05-18T12:22:41Z | CVE-2019-11708 | https://github.com/0vercl0k/CVE-2019-11708 | Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit. |
357 | 2025-07-01T16:16:42Z | CVE-2019-18935 | https://github.com/noperator/CVE-2019-18935 | RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. |
239 | 2025-06-30T09:54:53Z | CVE-2019-0841 | https://github.com/rogue-kdc/CVE-2019-0841 | PoC code for CVE-2019-0841 Privilege Escalation vulnerability |
314 | 2025-05-03T09:52:45Z | cve-2019-1003000-jenkins-rce-poc | https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc | Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative) |
200 | 2025-07-01T09:56:45Z | CVE-2019-11932 | https://github.com/awakened1712/CVE-2019-11932 | Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif |
256 | 2024-11-22T06:44:14Z | CVE-2019-5786 | https://github.com/exodusintel/CVE-2019-5786 | FileReader Exploit |
266 | 2025-07-01T09:57:07Z | CVE-2019-11932 | https://github.com/dorkerdevil/CVE-2019-11932 | double-free bug in WhatsApp exploit poc |
913 | 2025-06-27T06:42:32Z | rdpscan | https://github.com/robertdavidgraham/rdpscan | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. |
251 | 2025-05-08T17:52:15Z | CVE-2019-1040 | https://github.com/Ridter/CVE-2019-1040 | CVE-2019-1040 with Exchange |
292 | 2025-04-17T00:39:15Z | bluekeep | https://github.com/0xeb-bp/bluekeep | Public work for CVE-2019-0708 |
190 | 2025-02-25T13:06:08Z | CVE-2019-2725 | https://github.com/TopScrew/CVE-2019-2725 | CVE-2019-2725命令回显+webshell上传+最新绕过 |
228 | 2025-06-27T11:55:16Z | CVE-2019-9810 | https://github.com/0vercl0k/CVE-2019-9810 | Exploit for CVE-2019-9810 Firefox on Windows 64-bit. |
163 | 2025-04-21T07:23:59Z | CVE-2019-7609 | https://github.com/LandGrey/CVE-2019-7609 | exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts |
193 | 2025-01-30T09:21:46Z | CVE-2019-16098 | https://github.com/Barakat/CVE-2019-16098 | Local privilege escalation PoC exploit for CVE-2019-16098 |
670 | 2025-06-17T14:56:00Z | dirty_sock | https://github.com/initstring/dirty_sock | Linux privilege escalation exploit via snapd (CVE-2019-7304) |
star | updated_at | name | url | des |
---|---|---|---|---|
2044 | 2025-06-28T12:54:59Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
498 | 2025-06-06T15:57:21Z | CVE-2018-8120 | https://github.com/rip1s/CVE-2018-8120 | CVE-2018-8120 Windows LPE exploit |
491 | 2025-05-29T11:35:09Z | CVE-2018-20250 | https://github.com/WyAtu/CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
523 | 2025-06-30T09:54:51Z | CVE-2018-15473-Exploit | https://github.com/Rhynorater/CVE-2018-15473-Exploit | Exploit written in Python for CVE-2018-15473 with threading and export formats |
372 | 2025-04-17T00:41:53Z | Exchange2domain | https://github.com/Ridter/Exchange2domain | CVE-2018-8581 |
545 | 2025-06-07T01:44:24Z | CVE-2018-9995_dvr_credentials | https://github.com/ezelf/CVE-2018-9995_dvr_credentials | (CVE-2018-9995) Get DVR Credentials |
253 | 2025-06-29T17:21:01Z | CVE-2018-13379 | https://github.com/milo2012/CVE-2018-13379 | CVE-2018-13379 |
497 | 2025-05-28T17:08:17Z | CVE-2018-10933 | https://github.com/blacknbunny/CVE-2018-10933 | Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH) |
269 | 2025-05-08T12:01:18Z | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
293 | 2025-04-02T07:11:58Z | CVE-2018-8120 | https://github.com/alpha1ab/CVE-2018-8120 | CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 |
332 | 2024-12-06T02:42:13Z | CVE-2018-8581 | https://github.com/WyAtu/CVE-2018-8581 | CVE-2018-8581 |
352 | 2025-05-26T12:51:57Z | CVE-2018-7600 | https://github.com/a2u/CVE-2018-7600 | 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002 |
418 | 2025-06-26T06:50:10Z | CVE-2018-8897 | https://github.com/can1357/CVE-2018-8897 | Arbitrary code execution with kernel privileges using CVE-2018-8897. |
78 | 2024-08-12T19:37:50Z | CVE-2018-2628 | https://github.com/shengqi158/CVE-2018-2628 | CVE-2018-2628 & CVE-2018-2893 |
515 | 2025-05-05T13:58:34Z | WinboxPoC | https://github.com/BasuCert/WinboxPoC | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) |
149 | 2025-06-29T17:20:59Z | CVE-2018-13382 | https://github.com/milo2012/CVE-2018-13382 | CVE-2018-13382 |
140 | 2025-04-28T08:55:49Z | CVE-2018-8174_EXP | https://github.com/Yt1g3r/CVE-2018-8174_EXP | CVE-2018-8174_python |
203 | 2025-04-03T06:50:25Z | CVE-2018-0296 | https://github.com/yassineaboukir/CVE-2018-0296 | Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information. |
167 | 2024-09-13T14:17:13Z | CVE-2018-3245 | https://github.com/pyn3rd/CVE-2018-3245 | CVE-2018-3245-PoC |
302 | 2025-05-15T10:40:31Z | struts-pwn_CVE-2018-11776 | https://github.com/mazen160/struts-pwn_CVE-2018-11776 | An exploit for Apache Struts CVE-2018-11776 |
164 | 2025-02-17T09:35:37Z | cve-2018-8120 | https://github.com/bigric3/cve-2018-8120 | |
166 | 2024-08-12T19:35:27Z | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
134 | 2025-05-17T12:16:01Z | CVE-2018-7600 | https://github.com/pimps/CVE-2018-7600 | Exploit for Drupal 7 <= 7.57 CVE-2018-7600 |
181 | 2025-06-05T10:26:01Z | CVE-2018-15982_EXP | https://github.com/Ridter/CVE-2018-15982_EXP | exp of CVE-2018-15982 |
122 | 2025-01-17T02:29:49Z | cve-2018-8453-exp | https://github.com/ze0r/cve-2018-8453-exp | cve-2018-8453 exp |
59 | 2024-12-06T22:03:54Z | bluetoothdPoC | https://github.com/rani-i/bluetoothdPoC | CVE-2018-4087 PoC |
167 | 2024-09-13T15:40:47Z | CVE-2018-8174-msf | https://github.com/0x09AL/CVE-2018-8174-msf | CVE-2018-8174 - VBScript memory corruption exploit. |
265 | 2025-04-04T20:03:49Z | credssp | https://github.com/preempt/credssp | A code demonstrating CVE-2018-0886 |
139 | 2025-05-15T10:42:17Z | CVE-2018-2894 | https://github.com/LandGrey/CVE-2018-2894 | CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script |
130 | 2025-06-10T16:01:13Z | CVE-2018-17182 | https://github.com/jas502n/CVE-2018-17182 | Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day |
star | updated_at | name | url | des |
---|---|---|---|---|
541 | 2025-06-10T21:27:03Z | CVE-2017-11882 | https://github.com/Ridter/CVE-2017-11882 | CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882 |
726 | 2025-05-30T02:11:07Z | CVE-2017-0199 | https://github.com/bhdresh/CVE-2017-0199 | Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
2044 | 2025-06-28T12:54:59Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
769 | 2025-06-30T08:53:30Z | spectre-attack | https://github.com/Eugnis/spectre-attack | Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) |
496 | 2025-06-30T09:09:31Z | CVE-2017-11882 | https://github.com/embedi/CVE-2017-11882 | Proof-of-Concept exploits for CVE-2017-11882 |
465 | 2025-03-22T15:46:56Z | CVE-2017-0785 | https://github.com/ojasookert/CVE-2017-0785 | Blueborne CVE-2017-0785 Android information leak vulnerability |
391 | 2025-05-15T10:40:44Z | CVE-2017-12617 | https://github.com/cyberheartmi9/CVE-2017-12617 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution |
316 | 2025-05-25T23:00:26Z | CVE-2017-8759 | https://github.com/bhdresh/CVE-2017-8759 | Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
329 | 2025-04-08T05:12:14Z | CVE-2017-11882 | https://github.com/rip1s/CVE-2017-11882 | CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. |
381 | 2025-03-29T17:00:31Z | exploit-CVE-2017-7494 | https://github.com/opsxcq/exploit-CVE-2017-7494 | SambaCry exploit and vulnerable container (CVE-2017-7494) |
186 | 2025-03-03T18:54:01Z | CVE-2017-8570 | https://github.com/rxwx/CVE-2017-8570 | Proof of Concept exploit for CVE-2017-8570 |
331 | 2025-06-14T07:47:55Z | eternal_scanner | https://github.com/peterpt/eternal_scanner | An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance) |
257 | 2025-03-23T01:09:39Z | CVE-2017-7494 | https://github.com/joxeankoret/CVE-2017-7494 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability |
269 | 2025-05-08T12:01:18Z | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
176 | 2025-04-17T00:45:50Z | CVE-2017-8759 | https://github.com/vysecurity/CVE-2017-8759 | CVE-2017-8759 - A vulnerability in the SOAP WDSL parser. |
256 | 2025-06-12T04:25:29Z | CVE-2017-8759-Exploit-sample | https://github.com/Voulnet/CVE-2017-8759-Exploit-sample | Running CVE-2017-8759 exploit sample. |
89 | 2025-05-22T21:30:34Z | iis6-exploit-2017-CVE-2017-7269 | https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269 | iis6 exploit 2017 CVE-2017-7269 |
434 | 2025-06-26T10:26:50Z | struts-pwn | https://github.com/mazen160/struts-pwn | An exploit for Apache Struts CVE-2017-5638 |
180 | 2025-04-17T00:46:17Z | cve-2017-7494 | https://github.com/betab0t/cve-2017-7494 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) |
188 | 2025-04-14T17:49:46Z | Jira-Scan | https://github.com/random-robbie/Jira-Scan | CVE-2017-9506 - SSRF |
135 | 2025-01-20T02:00:30Z | cve-2017-7269 | https://github.com/zcgonvh/cve-2017-7269 | fixed msf module for cve-2017-7269 |
166 | 2024-08-12T19:35:27Z | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
43 | 2024-08-12T19:34:15Z | CVE-2017-11882 | https://github.com/starnightcyber/CVE-2017-11882 | CVE-2017-11882 exploitation |
250 | 2025-05-21T20:10:31Z | struts-pwn_CVE-2017-9805 | https://github.com/mazen160/struts-pwn_CVE-2017-9805 | An exploit for Apache Struts CVE-2017-9805 |
207 | 2025-05-15T10:41:22Z | jboss-_CVE-2017-12149 | https://github.com/yunxu1/jboss-_CVE-2017-12149 | CVE-2017-12149 jboss反序列化 可回显 |
141 | 2025-05-14T07:13:33Z | CVE-2017-0781 | https://github.com/ojasookert/CVE-2017-0781 | Blueborne CVE-2017-0781 Android heap overflow vulnerability |
67 | 2025-06-29T04:11:40Z | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
142 | 2025-01-13T01:37:38Z | CVE-2017-10271 | https://github.com/c0mmand3rOpSec/CVE-2017-10271 | WebLogic Exploit |
56 | 2025-05-21T12:10:14Z | CVE-2017-1000353 | https://github.com/vulhub/CVE-2017-1000353 | jenkins CVE-2017-1000353 POC |
99 | 2024-12-30T08:51:48Z | CVE-2017-11882-metasploit | https://github.com/0x09AL/CVE-2017-11882-metasploit | This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. |
star | updated_at | name | url | des |
---|---|---|---|---|
976 | 2025-06-29T13:30:14Z | CVE-2016-5195 | https://github.com/timwr/CVE-2016-5195 | CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android |
889 | 2025-06-28T12:25:55Z | dirtycow | https://github.com/firefart/dirtycow | Dirty Cow exploit - CVE-2016-5195 |
2044 | 2025-06-28T12:54:59Z | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
324 | 2025-05-28T17:17:42Z | CVE-2016-0051 | https://github.com/koczkatamas/CVE-2016-0051 | EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016) |
325 | 2025-06-28T12:30:40Z | CVE-2016-5195 | https://github.com/gbonacini/CVE-2016-5195 | A CVE-2016-5195 exploit example. |
404 | 2025-06-05T16:05:39Z | exploit-CVE-2016-10033 | https://github.com/opsxcq/exploit-CVE-2016-10033 | PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container |
500 | 2025-05-12T02:36:19Z | PoCs | https://github.com/ImageTragick/PoCs | Proof of Concepts for CVE-2016–3714 |
500 | 2025-06-28T17:56:38Z | dirtycow-vdso | https://github.com/scumjr/dirtycow-vdso | PoC for Dirty COW (CVE-2016-5195) |
160 | 2025-04-30T22:25:29Z | CVE-2016-6366 | https://github.com/RiskSense-Ops/CVE-2016-6366 | Public repository for improvements to the EXTRABACON exploit |
190 | 2025-05-15T10:44:11Z | CVE-2016-2107 | https://github.com/FiloSottile/CVE-2016-2107 | Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107) |
114 | 2025-06-22T15:05:32Z | cve-2016-0189 | https://github.com/theori-io/cve-2016-0189 | Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) |
81 | 2025-01-30T09:21:36Z | CVE-2016-7255 | https://github.com/FSecureLABS/CVE-2016-7255 | An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit |
139 | 2025-05-01T22:12:25Z | chakra-2016-11 | https://github.com/theori-io/chakra-2016-11 | Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) |
354 | 2025-06-17T05:44:00Z | ExtractKeyMaster | https://github.com/laginimaineb/ExtractKeyMaster | Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431 |
153 | 2025-04-17T01:56:01Z | BadKernel | https://github.com/secmob/BadKernel | Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016 |
79 | 2024-08-12T19:22:45Z | CVE-2016-0801 | https://github.com/abdsec/CVE-2016-0801 | |
69 | 2025-03-01T10:01:35Z | CVE-2016-3714 | https://github.com/Hood3dRob1n/CVE-2016-3714 | ImaegMagick Code Execution (CVE-2016-3714) |
53 | 2025-02-12T04:00:36Z | cve-2016-1764 | https://github.com/moloch--/cve-2016-1764 | Extraction of iMessage Data via XSS |
107 | 2025-04-07T00:45:44Z | jscpwn | https://github.com/saelo/jscpwn | PoC exploit for CVE-2016-4622 |
98 | 2024-08-12T19:25:15Z | PegasusX | https://github.com/jndok/PegasusX | OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656 |
67 | 2025-06-29T04:11:40Z | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
45 | 2024-08-12T19:21:36Z | cve-2016-0040 | https://github.com/Rootkitsmm-zz/cve-2016-0040 | Exploiting CVE-2016-0040 uninitialized pointer |
266 | 2025-06-05T02:54:32Z | VIKIROOT | https://github.com/hyln9/VIKIROOT | CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow |
53 | 2024-08-12T19:26:30Z | exploit-CVE-2016-6515 | https://github.com/opsxcq/exploit-CVE-2016-6515 | OpenSSH remote DOS exploit and vulnerable container |
64 | 2025-06-24T07:30:56Z | cve-2016-2431 | https://github.com/laginimaineb/cve-2016-2431 | Qualcomm TrustZone kernel privilege escalation |
81 | 2025-02-19T10:25:40Z | MS16-032 | https://github.com/zcgonvh/MS16-032 | MS16-032(CVE-2016-0099) for SERVICE ONLY |
49 | 2023-09-07T17:01:10Z | CVE-2016-2434 | https://github.com/jianqiangzhao/CVE-2016-2434 | |
54 | 2025-01-09T11:58:06Z | CVE-2016-3309_Reloaded | https://github.com/siberas/CVE-2016-3309_Reloaded | Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques |
84 | 2025-02-07T01:44:56Z | mach_race | https://github.com/gdbinit/mach_race | Exploit code for CVE-2016-1757 |
50 | 2024-08-12T19:31:38Z | jenkins-cve-2016-0792 | https://github.com/jpiechowka/jenkins-cve-2016-0792 | Exploit for Jenkins serialization vulnerability - CVE-2016-0792 |
Wechat Pay | AliPay | Paypal | BTC Pay | BCH Pay |
---|---|---|---|---|
![]() |
![]() |
paypal miracletalent@gmail.com | ![]() |
![]() |