Skip to content

Latest commit

 

History

History
353 lines (352 loc) · 47.1 KB

README.md

File metadata and controls

353 lines (352 loc) · 47.1 KB

Tweet Follow on Twitter GitHub Followers Top Langs

TOP

all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things

Table of Contents

2024

star updated_at name url des
2276 2024-11-08T11:07:59Z CVE-2024-1086 https://github.com/Notselwyn/CVE-2024-1086 Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
461 2024-10-28T13:01:04Z cve-2024-6387-poc https://github.com/zgzhang/cve-2024-6387-poc a signal handler race condition in OpenSSH's server (sshd)
616 2024-11-06T20:21:23Z CVE-2024-38063 https://github.com/ynwarcs/CVE-2024-38063 poc for CVE-2024-38063 (RCE in tcpip.sys)
511 2024-11-09T07:20:32Z git_rce https://github.com/amalmurali47/git_rce Exploit PoC for CVE-2024-32002
458 2024-11-09T11:43:56Z CVE-2024-6387_Check https://github.com/xaitax/CVE-2024-6387_Check CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH
382 2024-11-09T11:40:14Z cve-2024-6387-poc https://github.com/acrono/cve-2024-6387-poc 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc
205 2024-11-09T11:39:15Z CVE-2024-38077 https://github.com/qi4L/CVE-2024-38077 RDL的堆溢出导致的RCE
317 2024-11-06T10:35:22Z CVE-2024-26229 https://github.com/varwara/CVE-2024-26229 CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code
282 2024-11-03T17:42:55Z CVE-2024-21338 https://github.com/hakaioffsec/CVE-2024-21338 Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.
193 2024-10-28T18:16:25Z CVE-2024-23897 https://github.com/h4x0r-dz/CVE-2024-23897 CVE-2024-23897
253 2024-11-07T12:10:07Z cve_2024_0044 https://github.com/pl4int3xt/cve_2024_0044 CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13
3494 2024-11-09T07:14:27Z xzbot https://github.com/amlweems/xzbot notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)
227 2024-11-08T15:42:35Z CVE-2024-30088 https://github.com/tykawaii98/CVE-2024-30088
686 2024-11-08T18:37:32Z CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability Microsoft-Outlook-Remote-Code-Execution-Vulnerability
226 2024-11-08T12:21:45Z CVE-2024-4577 https://github.com/watchtowrlabs/CVE-2024-4577 PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC
234 2024-11-05T02:50:31Z CVE_2024_30078_POC_WIFI https://github.com/blkph0x/CVE_2024_30078_POC_WIFI basic concept for the latest windows wifi driver CVE
197 2024-11-08T16:26:20Z CVE-2024-35250 https://github.com/varwara/CVE-2024-35250 PoC for the Untrusted Pointer Dereference in the ks.sys driver
211 2024-10-20T02:48:52Z CVE-2024-21111 https://github.com/mansk1es/CVE-2024-21111 Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability
82 2024-10-24T08:04:13Z CVE-2024-30078- https://github.com/lvyitian/CVE-2024-30078- CVE-2024-30078 Detection and Command Execution Script
5 2024-09-23T07:14:32Z CVE-2024-38077-POC https://github.com/SecStarBot/CVE-2024-38077-POC
133 2024-11-08T07:26:32Z CVE-2024-4367-PoC https://github.com/LOURC0D3/CVE-2024-4367-PoC CVE-2024-4367 & CVE-2024-34342 Proof of Concept
117 2024-11-07T23:11:59Z CVE-2024-7479_CVE-2024-7481 https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481 TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.
147 2024-11-09T10:18:33Z CVE-2024-25600 https://github.com/Chocapikk/CVE-2024-25600 Unauthenticated Remote Code Execution – Bricks <= 1.9.6
154 2024-11-06T01:28:23Z CVE-2024-21413 https://github.com/duy-31/CVE-2024-21413 Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC
133 2024-11-07T05:59:54Z cve-2024-20017 https://github.com/mellow-hype/cve-2024-20017 exploits for CVE-2024-20017
110 2024-11-08T17:03:45Z cve-2024-6387-poc https://github.com/lflare/cve-2024-6387-poc MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc
61 2024-11-07T12:43:45Z CVE-2024-3400 https://github.com/0x0d3ad/CVE-2024-3400 CVE-2024-3400
128 2024-10-22T19:32:40Z CVE-2024-20656 https://github.com/Wh04m1001/CVE-2024-20656
143 2024-11-06T23:16:14Z CVE-2024-27198-RCE https://github.com/W01fh4cker/CVE-2024-27198-RCE CVE-2024-27198 & CVE-2024-27199 Authentication Bypass --> RCE in JetBrains TeamCity Pre-2023.11.4
123 2024-10-08T00:52:55Z CVE-2024-21683-RCE https://github.com/W01fh4cker/CVE-2024-21683-RCE CVE-2024-21683 Confluence Post Auth RCE

2023

star updated_at name url des
417 2024-11-05T02:55:02Z qq-tim-elevation https://github.com/vi3t1/qq-tim-elevation CVE-2023-34312
1347 2024-11-09T23:00:44Z cvelist https://github.com/CVEProject/cvelist Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023
778 2024-11-06T13:38:02Z CVE-2023-38831-winrar-exploit https://github.com/b1tg/CVE-2023-38831-winrar-exploit CVE-2023-38831 winrar exploit generator
479 2024-11-08T21:25:15Z Windows_LPE_AFD_CVE-2023-21768 https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 LPE exploit for CVE-2023-21768
369 2024-10-27T03:06:47Z CVE-2023-32233 https://github.com/Liuk3r/CVE-2023-32233 CVE-2023-32233: Linux内核中的安全漏洞
384 2024-09-27T13:48:07Z CVE-2023-0386 https://github.com/xkaneiki/CVE-2023-0386 CVE-2023-0386在ubuntu22.04上的提权
379 2024-10-28T23:01:13Z CVE-2023-4911 https://github.com/leesh3288/CVE-2023-4911 PoC for CVE-2023-4911
307 2024-11-03T14:30:40Z CVE-2023-21752 https://github.com/Wh04m1001/CVE-2023-21752
623 2024-10-29T09:10:17Z keepass-password-dumper https://github.com/vdohney/keepass-password-dumper Original PoC for CVE-2023-32784
266 2024-11-07T03:54:09Z CVE-2023-21608 https://github.com/hacksysteam/CVE-2023-21608 Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit
53 2024-11-03T14:35:16Z CVE-2023-21839 https://github.com/ASkyeye/CVE-2023-21839 Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE)
315 2024-11-01T16:02:36Z CVE-2023-4863 https://github.com/mistymntncop/CVE-2023-4863
224 2024-11-06T11:37:49Z CVE-2023-44487 https://github.com/bcdannyboy/CVE-2023-44487 Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487
234 2024-11-06T10:18:55Z CVE-2023-36874 https://github.com/Wh04m1001/CVE-2023-36874
163 2024-07-23T13:20:26Z CVE-2023-36745 https://github.com/N1k0la-T/CVE-2023-36745
232 2024-10-12T16:14:33Z CVE-2023-20887 https://github.com/sinsinology/CVE-2023-20887 VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)
340 2024-10-28T18:14:31Z CVE-2023-23397-POC-Powershell https://github.com/api0cradle/CVE-2023-23397-POC-Powershell
235 2024-11-04T00:38:19Z CVE-2023-7028 https://github.com/Vozec/CVE-2023-7028 This repository presents a proof-of-concept of CVE-2023-7028
172 2024-10-29T09:53:08Z CVE-2023-28252 https://github.com/fortra/CVE-2023-28252
135 2024-10-21T10:38:47Z CVE-2023-34362 https://github.com/horizon3ai/CVE-2023-34362 MOVEit CVE-2023-34362
220 2024-11-07T09:41:05Z CVE-2023-3519 https://github.com/BishopFox/CVE-2023-3519 RCE exploit for CVE-2023-3519
224 2024-11-01T00:37:50Z Weblogic-CVE-2023-21839 https://github.com/DXask88MA/Weblogic-CVE-2023-21839
202 2024-11-06T23:16:13Z CVE-2023-46747-RCE https://github.com/W01fh4cker/CVE-2023-46747-RCE exploit for f5-big-ip RCE cve-2023-46747
227 2024-10-27T22:48:14Z CVE-2023-29357 https://github.com/Chocapikk/CVE-2023-29357 Microsoft SharePoint Server Elevation of Privilege Vulnerability
158 2024-09-02T05:24:27Z CVE-2023-23397_EXPLOIT_0DAY https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY Exploit for the CVE-2023-23397
143 2024-11-08T11:50:58Z cve-2023-29360 https://github.com/Nero22k/cve-2023-29360 Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver
268 2024-11-07T04:28:25Z CVE-2023-25690-POC https://github.com/dhmosfunk/CVE-2023-25690-POC CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability.
163 2024-10-02T00:01:36Z CVE-2023-25157 https://github.com/win3zz/CVE-2023-25157 CVE-2023-25157 - GeoServer SQL Injection - PoC
158 2024-11-06T05:20:32Z Windows_MSKSSRV_LPE_CVE-2023-36802 https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802 LPE exploit for CVE-2023-36802
117 2024-11-06T11:38:43Z CVE-2023-2640-CVE-2023-32629 https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629 GameOver(lay) Ubuntu Privilege Escalation

2022

star updated_at name url des
426 2024-09-27T13:47:21Z CVE-2022-25636 https://github.com/Bonfee/CVE-2022-25636 CVE-2022-25636
460 2024-11-08T14:51:00Z CVE-2022-21882 https://github.com/KaLendsi/CVE-2022-21882 win32k LPE
1091 2024-11-06T07:21:47Z CVE-2022-0847-DirtyPipe-Exploit https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit A root exploit for CVE-2022-0847 (Dirty Pipe)
685 2024-11-04T17:56:04Z CVE-2022-29072 https://github.com/kagancapar/CVE-2022-29072 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.
366 2024-09-19T03:04:05Z CVE-2022-0185 https://github.com/Crusaders-of-Rust/CVE-2022-0185 CVE-2022-0185
494 2024-10-08T20:26:59Z CVE-2022-0995 https://github.com/Bonfee/CVE-2022-0995 CVE-2022-0995 exploit
559 2024-10-21T10:38:22Z CVE-2022-23222 https://github.com/tr3ee/CVE-2022-23222 CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation
220 2024-11-07T07:33:56Z Spring-Cloud-Gateway-CVE-2022-22947 https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 CVE-2022-22947
528 2024-10-28T19:00:04Z OpenSSL-2022 https://github.com/NCSC-NL/OpenSSL-2022 Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3
361 2024-11-02T16:24:21Z CVE-2022-21907 https://github.com/ZZ-SOCMAP/CVE-2022-21907 HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907
366 2024-09-23T13:33:13Z CVE-2022-29464 https://github.com/hakivvi/CVE-2022-29464 WSO2 RCE (CVE-2022-29464) exploit and writeup.
341 2024-11-07T04:30:05Z CVE-2022-40684 https://github.com/horizon3ai/CVE-2022-40684 A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager
466 2024-10-28T18:14:27Z CVE-2022-2588 https://github.com/Markakd/CVE-2022-2588 exploit for CVE-2022-2588
377 2024-10-17T06:37:05Z CVE-2022-39197 https://github.com/its-arun/CVE-2022-39197 CobaltStrike <= 4.7.1 RCE
393 2024-10-21T10:38:32Z CVE-2022-33679 https://github.com/Bdenneu/CVE-2022-33679 One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html
546 2024-11-08T14:08:43Z CVE-2022-0847-DirtyPipe-Exploits https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.
274 2024-10-29T01:28:50Z CVE-2022-0847 https://github.com/r1is/CVE-2022-0847 CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”
453 2024-08-31T13:53:02Z CVE-2022-27254 https://github.com/nonamecoder/CVE-2022-27254 PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)
306 2024-10-16T06:29:46Z CVE-2022-21971 https://github.com/0vercl0k/CVE-2022-21971 PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability"
313 2024-11-07T10:22:57Z CVE-2022-39197-patch https://github.com/burpheart/CVE-2022-39197-patch CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch.
293 2024-11-04T19:00:07Z CVE-2022-21894 https://github.com/Wack0/CVE-2022-21894 baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability
312 2024-10-22T07:08:32Z Spring4Shell-POC https://github.com/reznok/Spring4Shell-POC Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit
266 2024-08-15T09:12:03Z CVE-2022-39952 https://github.com/horizon3ai/CVE-2022-39952 POC for CVE-2022-39952
276 2024-11-05T13:11:56Z cve-2022-27255 https://github.com/infobyte/cve-2022-27255
193 2024-10-29T16:57:35Z CVE-2022-21882 https://github.com/L4ys/CVE-2022-21882
280 2024-10-21T10:38:17Z VMware-CVE-2022-22954 https://github.com/sherlocksecurity/VMware-CVE-2022-22954 POC for VMWARE CVE-2022-22954
115 2024-08-12T20:21:59Z CVE-2022-22963 https://github.com/dinosn/CVE-2022-22963 CVE-2022-22963 PoC
215 2024-10-24T17:24:02Z CVE-2022-30075 https://github.com/aaronsvk/CVE-2022-30075 Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075)
238 2024-08-12T20:20:25Z CVE-2022-20699 https://github.com/Audiobahn/CVE-2022-20699 Cisco Anyconnect VPN unauth RCE (rwx stack)
184 2024-08-12T20:21:35Z CVE-2022-0778 https://github.com/drago-96/CVE-2022-0778 Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt

2021

star updated_at name url des
1339 2024-11-08T07:33:38Z noPac https://github.com/cube0x0/noPac CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.
1838 2024-11-09T22:43:59Z CVE-2021-1675 https://github.com/cube0x0/CVE-2021-1675 C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527
1962 2024-11-01T11:32:00Z CVE-2021-4034 https://github.com/berdav/CVE-2021-4034 CVE-2021-4034 1day
1593 2024-11-06T08:13:28Z CVE-2021-40444 https://github.com/lockedbyte/CVE-2021-40444 CVE-2021-40444 PoC
1056 2024-10-30T17:51:59Z CVE-2021-4034 https://github.com/arthepsy/CVE-2021-4034 PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)
954 2024-11-01T09:34:03Z CVE-2021-3156 https://github.com/blasty/CVE-2021-3156
1013 2024-11-09T22:43:25Z CVE-2021-1675 https://github.com/calebstewart/CVE-2021-1675 Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)
484 2024-10-25T02:13:38Z CVE-2021-21972 https://github.com/NS-Sp4ce/CVE-2021-21972 CVE-2021-21972 Exploit
981 2024-10-21T20:24:07Z sam-the-admin https://github.com/safebuffer/sam-the-admin Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
799 2024-11-06T08:13:58Z CVE-2021-40444 https://github.com/klezVirus/CVE-2021-40444 CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit
416 2024-10-29T15:28:06Z CVE-2021-1732-Exploit https://github.com/KaLendsi/CVE-2021-1732-Exploit CVE-2021-1732 Exploit
737 2024-11-08T06:25:11Z CVE-2021-3156 https://github.com/worawit/CVE-2021-3156 Sudo Baron Samedit Exploit
821 2024-11-06T11:55:26Z CVE-2021-31166 https://github.com/0vercl0k/CVE-2021-31166 Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.
851 2024-11-06T12:32:28Z CVE-2021-44228-Scanner https://github.com/logpresso/CVE-2021-44228-Scanner Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228
1805 2024-11-08T21:55:09Z log4j-shell-poc https://github.com/kozmer/log4j-shell-poc A Proof-Of-Concept for the CVE-2021-44228 vulnerability.
800 2024-11-09T10:36:47Z noPac https://github.com/Ridter/noPac Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user
407 2024-10-31T11:34:39Z CVE-2021-3493 https://github.com/briskets/CVE-2021-3493 Ubuntu OverlayFS Local Privesc
330 2024-09-19T12:06:30Z CVE-2021-1675-LPE https://github.com/hlldz/CVE-2021-1675-LPE Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527
1106 2024-10-11T18:48:29Z log4shell-vulnerable-app https://github.com/christophetd/log4shell-vulnerable-app Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).
435 2024-10-03T05:15:58Z log4j-finder https://github.com/fox-it/log4j-finder Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)
169 2024-11-07T12:05:52Z exprolog https://github.com/herwonowr/exprolog ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065)
432 2024-10-17T00:12:21Z CVE-2021-3156 https://github.com/stong/CVE-2021-3156 PoC for CVE-2021-3156 (sudo heap overflow)
175 2024-10-15T07:30:29Z ProxyVulns https://github.com/hosch3n/ProxyVulns [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.
266 2024-11-04T11:58:08Z CVE-2021-22205 https://github.com/Al1ex/CVE-2021-22205 CVE-2021-22205& GitLab CE/EE RCE
148 2024-11-06T23:16:22Z CVE-2021-41773_CVE-2021-42013 https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013 CVE-2021-41773 CVE-2021-42013漏洞批量检测工具
3403 2024-11-06T08:34:17Z log4j-scan https://github.com/fullhunt/log4j-scan A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228
251 2024-11-02T20:25:44Z CVE-2021-21972 https://github.com/horizon3ai/CVE-2021-21972 Proof of Concept Exploit for vCenter CVE-2021-21972
344 2024-10-15T07:29:40Z CVE-2021-44228_scanner https://github.com/CERTCC/CVE-2021-44228_scanner Scanners for Jar files that may be vulnerable to CVE-2021-44228
353 2024-10-28T23:22:59Z Grafana-CVE-2021-43798 https://github.com/jas502n/Grafana-CVE-2021-43798 Grafana Unauthorized arbitrary file reading vulnerability
252 2024-11-06T01:07:04Z CVE-2021-36260 https://github.com/Aiminsun/CVE-2021-36260 command injection vulnerability in the web server of some Hikvision product. Due to the insufficient input validation, attacker can exploit the vulnerability to launch a command injection attack by sending some messages with malicious commands.

2020

star updated_at name url des
4121 2024-11-09T13:16:49Z exphub https://github.com/zhzyker/exphub Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
1726 2024-11-06T20:46:51Z CVE-2020-1472 https://github.com/SecuraBV/CVE-2020-1472 Test tool for CVE-2020-1472
2008 2024-11-06T09:55:44Z weblogicScanner https://github.com/0xn0ne/weblogicScanner weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883
1303 2024-11-07T17:59:37Z CVE-2020-0796 https://github.com/danigargu/CVE-2020-0796 CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost
1188 2024-11-06T04:28:56Z CVE-2020-1472 https://github.com/dirkjanm/CVE-2020-1472 PoC for Zerologon - all research credits go to Tom Tervoort of Secura
284 2024-09-20T12:44:24Z CVE-2020-14882 https://github.com/jas502n/CVE-2020-14882 CVE-2020–14882、CVE-2020–14883
320 2024-11-01T02:37:51Z cve-2020-0688 https://github.com/Ridter/cve-2020-0688 cve-2020-0688
630 2024-11-01T14:52:47Z zerologon https://github.com/risksense/zerologon Exploit for zerologon cve-2020-1472
665 2024-11-07T17:59:52Z SMBGhost https://github.com/ly4k/SMBGhost Scanner for CVE-2020-0796 - SMBv3 RCE
372 2024-08-12T20:03:24Z CVE-2020-5902 https://github.com/jas502n/CVE-2020-5902 CVE-2020-5902 BIG-IP
538 2024-11-09T12:28:11Z CVE-2020-0796-RCE-POC https://github.com/jamf/CVE-2020-0796-RCE-POC CVE-2020-0796 Remote Code Execution POC
338 2024-11-09T01:08:37Z CVEAC-2020 https://github.com/thesecretclub/CVEAC-2020 EasyAntiCheat Integrity check bypass by mimicking memory changes
131 2024-08-12T19:58:18Z CVE_2020_2546 https://github.com/hktalent/CVE_2020_2546 CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,
886 2024-09-13T00:18:47Z CurveBall https://github.com/ly4k/CurveBall PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)
293 2024-10-14T16:36:43Z CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner Cnvd-2020-10487 / cve-2020-1938, scanner tool
215 2024-08-20T11:51:10Z SAP_RECON https://github.com/chipik/SAP_RECON PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)
351 2024-10-25T12:58:36Z CVE-2020-0688 https://github.com/zcgonvh/CVE-2020-0688 Exploit and detect tools for CVE-2020-0688
162 2024-10-21T23:41:44Z cve-2020-0688 https://github.com/random-robbie/cve-2020-0688 cve-2020-0688
333 2024-11-01T02:37:51Z CVE-2020-2551 https://github.com/Y4er/CVE-2020-2551 Weblogic IIOP CVE-2020-2551
97 2024-10-05T14:11:12Z dnspooq https://github.com/knqyf263/dnspooq DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685)
712 2024-10-29T15:29:52Z CVE-2020-0787-EXP-ALL-WINDOWS-VERSION https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION Support ALL Windows Version
251 2024-10-14T17:46:04Z BlueGate https://github.com/ly4k/BlueGate PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE
382 2024-10-31T23:36:05Z CVE-2020-1472 https://github.com/VoidSec/CVE-2020-1472 Exploit Code for CVE-2020-1472 aka Zerologon
321 2024-10-29T21:41:51Z CVE-2020-0796-PoC https://github.com/eerykitty/CVE-2020-0796-PoC PoC for triggering buffer overflow via CVE-2020-0796
337 2024-08-12T19:56:40Z chainoffools https://github.com/kudelskisecurity/chainoffools A PoC for CVE-2020-0601
220 2024-11-07T09:22:37Z CVE-2020-0041 https://github.com/bluefrostsecurity/CVE-2020-0041 Exploits for Android Binder bug CVE-2020-0041
339 2024-11-08T14:50:48Z CVE-2020-0683 https://github.com/padovah4ck/CVE-2020-0683 CVE-2020-0683 - Windows MSI “Installer service” Elevation of Privilege
119 2024-10-10T05:37:18Z CVE-2020-11651-poc https://github.com/jasperla/CVE-2020-11651-poc PoC exploit of CVE-2020-11651 and CVE-2020-11652
362 2024-11-06T09:26:29Z Ghostcat-CNVD-2020-10487 https://github.com/00theway/Ghostcat-CNVD-2020-10487 Ghostcat read file/code execute,CNVD-2020-10487(CVE-2020-1938)
439 2024-11-07T15:31:55Z CVE-2020-15368 https://github.com/stong/CVE-2020-15368 CVE-2020-15368, aka "How to exploit a vulnerable driver"

2019

star updated_at name url des
2008 2024-11-06T09:55:44Z weblogicScanner https://github.com/0xn0ne/weblogicScanner weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883
4121 2024-11-09T13:16:49Z exphub https://github.com/zhzyker/exphub Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340
1792 2024-11-07T08:23:51Z phuip-fpizdam https://github.com/neex/phuip-fpizdam Exploit for CVE-2019-11043
1174 2024-10-31T00:43:46Z BlueKeep https://github.com/Ekultek/BlueKeep Proof of concept for CVE-2019-0708
491 2024-08-12T19:49:06Z CVE-2019-0708 https://github.com/n1xbyte/CVE-2019-0708 dump
388 2024-11-01T02:37:48Z CVE-2019-0708 https://github.com/k8gege/CVE-2019-0708 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)
438 2024-10-15T07:32:48Z CVE-2019-2725 https://github.com/lufeirider/CVE-2019-2725 CVE-2019-2725 命令回显
639 2024-10-11T13:48:12Z CVE-2019-5736-PoC https://github.com/Frichetten/CVE-2019-5736-PoC PoC for CVE-2019-5736
796 2024-11-08T18:12:27Z esp32_esp8266_attacks https://github.com/Matheus-Garbelini/esp32_esp8266_attacks Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)
571 2024-10-15T14:57:17Z cve-2019-19781 https://github.com/trustedsec/cve-2019-19781 This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.
350 2024-11-08T15:58:08Z COMahawk https://github.com/apt69/COMahawk Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322
361 2024-09-11T02:56:59Z CVE-2019-11510 https://github.com/projectzeroindia/CVE-2019-11510 Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)
371 2024-08-12T19:56:29Z CVE-2019-19781 https://github.com/projectzeroindia/CVE-2019-19781 Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]
133 2024-10-24T07:25:48Z CVE-2019-0604 https://github.com/linhlhq/CVE-2019-0604 CVE-2019-0604
326 2024-11-07T16:20:25Z CVE-2019-13272 https://github.com/jas502n/CVE-2019-13272 Linux 4.10 < 5.1.17 PTRACE_TRACEME local root
617 2024-10-23T06:30:25Z CVE-2019-11708 https://github.com/0vercl0k/CVE-2019-11708 Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.
310 2024-10-10T03:13:49Z cve-2019-1003000-jenkins-rce-poc https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
199 2024-08-12T19:53:38Z CVE-2019-11932 https://github.com/awakened1712/CVE-2019-11932 Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif
348 2024-11-07T07:24:42Z CVE-2019-18935 https://github.com/noperator/CVE-2019-18935 RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX.
242 2024-08-12T19:47:37Z CVE-2019-0841 https://github.com/rogue-kdc/CVE-2019-0841 PoC code for CVE-2019-0841 Privilege Escalation vulnerability
257 2024-08-12T19:47:00Z CVE-2019-5786 https://github.com/exodusintel/CVE-2019-5786 FileReader Exploit
269 2024-10-12T20:37:42Z CVE-2019-11932 https://github.com/dorkerdevil/CVE-2019-11932 double-free bug in WhatsApp exploit poc
894 2024-10-10T05:10:08Z rdpscan https://github.com/robertdavidgraham/rdpscan A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability.
289 2024-08-24T09:50:01Z bluekeep https://github.com/0xeb-bp/bluekeep Public work for CVE-2019-0708
249 2024-11-04T18:58:55Z CVE-2019-1040 https://github.com/Ridter/CVE-2019-1040 CVE-2019-1040 with Exchange
189 2024-10-29T01:02:33Z CVE-2019-2725 https://github.com/TopScrew/CVE-2019-2725 CVE-2019-2725命令回显+webshell上传+最新绕过
227 2024-11-01T02:37:48Z CVE-2019-9810 https://github.com/0vercl0k/CVE-2019-9810 Exploit for CVE-2019-9810 Firefox on Windows 64-bit.
3 2024-08-12T19:49:08Z CVE-2019-0708 https://github.com/victor0013/CVE-2019-0708 Scanner PoC for CVE-2019-0708 RDP RCE vuln
191 2024-09-19T03:32:29Z CVE-2019-16098 https://github.com/Barakat/CVE-2019-16098 Local privilege escalation PoC exploit for CVE-2019-16098
161 2024-11-05T20:24:46Z CVE-2019-7609 https://github.com/LandGrey/CVE-2019-7609 exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts

2018

star updated_at name url des
2008 2024-11-06T09:55:44Z weblogicScanner https://github.com/0xn0ne/weblogicScanner weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883
494 2024-09-14T22:01:50Z CVE-2018-8120 https://github.com/rip1s/CVE-2018-8120 CVE-2018-8120 Windows LPE exploit
487 2024-09-09T06:55:53Z CVE-2018-20250 https://github.com/WyAtu/CVE-2018-20250 exp for https://research.checkpoint.com/extracting-code-execution-from-winrar
521 2024-11-08T16:08:38Z CVE-2018-15473-Exploit https://github.com/Rhynorater/CVE-2018-15473-Exploit Exploit written in Python for CVE-2018-15473 with threading and export formats
370 2024-10-14T09:09:40Z Exchange2domain https://github.com/Ridter/Exchange2domain CVE-2018-8581
250 2024-08-26T04:25:13Z CVE-2018-13379 https://github.com/milo2012/CVE-2018-13379 CVE-2018-13379
496 2024-10-04T07:02:46Z CVE-2018-10933 https://github.com/blacknbunny/CVE-2018-10933 Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)
523 2024-10-09T18:44:30Z CVE-2018-9995_dvr_credentials https://github.com/ezelf/CVE-2018-9995_dvr_credentials (CVE-2018-9995) Get DVR Credentials
270 2024-09-27T06:14:01Z CVE-2018-0802 https://github.com/rxwx/CVE-2018-0802 PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
411 2024-11-05T14:50:43Z CVE-2018-8897 https://github.com/can1357/CVE-2018-8897 Arbitrary code execution with kernel privileges using CVE-2018-8897.
293 2024-08-12T19:39:09Z CVE-2018-8120 https://github.com/alpha1ab/CVE-2018-8120 CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7
348 2024-10-09T20:09:29Z CVE-2018-7600 https://github.com/a2u/CVE-2018-7600 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002
331 2024-09-19T11:51:58Z CVE-2018-8581 https://github.com/WyAtu/CVE-2018-8581 CVE-2018-8581
78 2024-08-12T19:37:50Z CVE-2018-2628 https://github.com/shengqi158/CVE-2018-2628 CVE-2018-2628 & CVE-2018-2893
508 2024-11-05T12:33:59Z WinboxPoC https://github.com/BasuCert/WinboxPoC Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)
145 2024-11-07T04:28:43Z CVE-2018-13382 https://github.com/milo2012/CVE-2018-13382 CVE-2018-13382
138 2024-08-29T01:22:24Z CVE-2018-8174_EXP https://github.com/Yt1g3r/CVE-2018-8174_EXP CVE-2018-8174_python
301 2024-11-04T11:13:26Z struts-pwn_CVE-2018-11776 https://github.com/mazen160/struts-pwn_CVE-2018-11776 An exploit for Apache Struts CVE-2018-11776
201 2024-09-25T11:21:13Z CVE-2018-0296 https://github.com/yassineaboukir/CVE-2018-0296 Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.
167 2024-09-13T14:17:13Z CVE-2018-3245 https://github.com/pyn3rd/CVE-2018-3245 CVE-2018-3245-PoC
163 2024-08-12T19:38:37Z cve-2018-8120 https://github.com/bigric3/cve-2018-8120
120 2024-08-12T19:44:57Z cve-2018-8453-exp https://github.com/ze0r/cve-2018-8453-exp cve-2018-8453 exp
130 2024-11-07T00:15:54Z CVE-2018-7600 https://github.com/pimps/CVE-2018-7600 Exploit for Drupal 7 <= 7.57 CVE-2018-7600
166 2024-08-12T19:35:27Z RTF_11882_0802 https://github.com/Ridter/RTF_11882_0802 PoC for CVE-2018-0802 And CVE-2017-11882
181 2024-11-03T09:27:33Z CVE-2018-15982_EXP https://github.com/Ridter/CVE-2018-15982_EXP exp of CVE-2018-15982
167 2024-09-13T15:40:47Z CVE-2018-8174-msf https://github.com/0x09AL/CVE-2018-8174-msf CVE-2018-8174 - VBScript memory corruption exploit.
261 2024-09-19T11:51:28Z credssp https://github.com/preempt/credssp A code demonstrating CVE-2018-0886
60 2023-11-02T05:10:34Z bluetoothdPoC https://github.com/rani-i/bluetoothdPoC CVE-2018-4087 PoC
129 2024-08-12T19:42:04Z CVE-2018-17182 https://github.com/jas502n/CVE-2018-17182 Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day
136 2024-11-09T17:50:22Z CVE-2018-2894 https://github.com/LandGrey/CVE-2018-2894 CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script

2017

star updated_at name url des
539 2024-09-20T02:06:21Z CVE-2017-11882 https://github.com/Ridter/CVE-2017-11882 CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882
723 2024-10-24T11:05:05Z CVE-2017-0199 https://github.com/bhdresh/CVE-2017-0199 Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
2008 2024-11-06T09:55:44Z weblogicScanner https://github.com/0xn0ne/weblogicScanner weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883
757 2024-11-06T01:07:29Z spectre-attack https://github.com/Eugnis/spectre-attack Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715)
462 2024-10-20T16:30:15Z CVE-2017-0785 https://github.com/ojasookert/CVE-2017-0785 Blueborne CVE-2017-0785 Android information leak vulnerability
493 2024-09-10T06:16:46Z CVE-2017-11882 https://github.com/embedi/CVE-2017-11882 Proof-of-Concept exploits for CVE-2017-11882
390 2024-10-25T18:17:53Z CVE-2017-12617 https://github.com/cyberheartmi9/CVE-2017-12617 Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution
317 2024-08-12T19:32:35Z CVE-2017-8759 https://github.com/bhdresh/CVE-2017-8759 Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration.
326 2024-10-14T13:13:16Z CVE-2017-11882 https://github.com/rip1s/CVE-2017-11882 CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum.
185 2024-08-12T19:35:23Z CVE-2017-8570 https://github.com/rxwx/CVE-2017-8570 Proof of Concept exploit for CVE-2017-8570
378 2024-10-12T17:01:13Z exploit-CVE-2017-7494 https://github.com/opsxcq/exploit-CVE-2017-7494 SambaCry exploit and vulnerable container (CVE-2017-7494)
256 2024-10-28T18:13:54Z CVE-2017-7494 https://github.com/joxeankoret/CVE-2017-7494 Remote root exploit for the SAMBA CVE-2017-7494 vulnerability
322 2024-10-28T18:13:55Z eternal_scanner https://github.com/peterpt/eternal_scanner An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)
270 2024-09-27T06:14:01Z CVE-2018-0802 https://github.com/rxwx/CVE-2018-0802 PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)
173 2024-08-12T19:32:34Z CVE-2017-8759 https://github.com/vysecurity/CVE-2017-8759 CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.
255 2024-08-12T19:32:34Z CVE-2017-8759-Exploit-sample https://github.com/Voulnet/CVE-2017-8759-Exploit-sample Running CVE-2017-8759 exploit sample.
86 2024-09-19T20:07:53Z iis6-exploit-2017-CVE-2017-7269 https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269 iis6 exploit 2017 CVE-2017-7269
425 2024-11-03T20:59:29Z struts-pwn https://github.com/mazen160/struts-pwn An exploit for Apache Struts CVE-2017-5638
177 2024-09-24T17:57:02Z cve-2017-7494 https://github.com/betab0t/cve-2017-7494 Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)
187 2024-11-05T04:49:25Z Jira-Scan https://github.com/random-robbie/Jira-Scan CVE-2017-9506 - SSRF
134 2024-10-24T10:24:53Z cve-2017-7269 https://github.com/zcgonvh/cve-2017-7269 fixed msf module for cve-2017-7269
166 2024-08-12T19:35:27Z RTF_11882_0802 https://github.com/Ridter/RTF_11882_0802 PoC for CVE-2018-0802 And CVE-2017-11882
43 2024-08-12T19:34:15Z CVE-2017-11882 https://github.com/starnightcyber/CVE-2017-11882 CVE-2017-11882 exploitation
206 2024-11-01T02:37:43Z jboss-_CVE-2017-12149 https://github.com/yunxu1/jboss-_CVE-2017-12149 CVE-2017-12149 jboss反序列化 可回显
249 2024-10-16T07:20:46Z struts-pwn_CVE-2017-9805 https://github.com/mazen160/struts-pwn_CVE-2017-9805 An exploit for Apache Struts CVE-2017-9805
138 2024-11-06T02:08:21Z CVE-2017-0781 https://github.com/ojasookert/CVE-2017-0781 Blueborne CVE-2017-0781 Android heap overflow vulnerability
141 2024-08-12T19:35:04Z CVE-2017-10271 https://github.com/c0mmand3rOpSec/CVE-2017-10271 WebLogic Exploit
56 2024-08-12T19:29:24Z Exploit-Development https://github.com/wetw0rk/Exploit-Development CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
54 2024-08-12T19:47:51Z CVE-2017-1000353 https://github.com/vulhub/CVE-2017-1000353 jenkins CVE-2017-1000353 POC
98 2024-09-09T11:48:19Z CVE-2017-11882-metasploit https://github.com/0x09AL/CVE-2017-11882-metasploit This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about.

2016

star updated_at name url des
955 2024-10-25T15:51:10Z CVE-2016-5195 https://github.com/timwr/CVE-2016-5195 CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android
859 2024-11-08T17:34:57Z dirtycow https://github.com/firefart/dirtycow Dirty Cow exploit - CVE-2016-5195
2008 2024-11-06T09:55:44Z weblogicScanner https://github.com/0xn0ne/weblogicScanner weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883
328 2024-09-10T15:01:32Z CVE-2016-0051 https://github.com/koczkatamas/CVE-2016-0051 EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)
405 2024-10-31T10:36:47Z exploit-CVE-2016-10033 https://github.com/opsxcq/exploit-CVE-2016-10033 PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container
314 2024-09-25T19:15:44Z CVE-2016-5195 https://github.com/gbonacini/CVE-2016-5195 A CVE-2016-5195 exploit example.
499 2024-10-19T07:31:26Z PoCs https://github.com/ImageTragick/PoCs Proof of Concepts for CVE-2016–3714
491 2024-10-11T13:05:27Z dirtycow-vdso https://github.com/scumjr/dirtycow-vdso PoC for Dirty COW (CVE-2016-5195)
158 2024-09-01T09:27:31Z CVE-2016-6366 https://github.com/RiskSense-Ops/CVE-2016-6366 Public repository for improvements to the EXTRABACON exploit
186 2024-10-09T09:51:06Z CVE-2016-2107 https://github.com/FiloSottile/CVE-2016-2107 Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107)
114 2024-08-12T19:23:28Z cve-2016-0189 https://github.com/theori-io/cve-2016-0189 Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)
138 2024-08-12T19:26:57Z chakra-2016-11 https://github.com/theori-io/chakra-2016-11 Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)
82 2024-09-18T15:26:25Z CVE-2016-7255 https://github.com/FSecureLABS/CVE-2016-7255 An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit
339 2024-10-30T04:41:42Z ExtractKeyMaster https://github.com/laginimaineb/ExtractKeyMaster Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431
153 2024-08-12T19:26:18Z BadKernel https://github.com/secmob/BadKernel Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016
79 2024-08-12T19:22:45Z CVE-2016-0801 https://github.com/abdsec/CVE-2016-0801
68 2024-08-12T19:22:42Z CVE-2016-3714 https://github.com/Hood3dRob1n/CVE-2016-3714 ImaegMagick Code Execution (CVE-2016-3714)
52 2024-10-03T05:12:17Z cve-2016-1764 https://github.com/moloch--/cve-2016-1764 Extraction of iMessage Data via XSS
104 2024-10-23T03:00:46Z jscpwn https://github.com/saelo/jscpwn PoC exploit for CVE-2016-4622
98 2024-08-12T19:25:15Z PegasusX https://github.com/jndok/PegasusX OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656
56 2024-08-12T19:29:24Z Exploit-Development https://github.com/wetw0rk/Exploit-Development CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002
45 2024-08-12T19:21:36Z cve-2016-0040 https://github.com/Rootkitsmm-zz/cve-2016-0040 Exploiting CVE-2016-0040 uninitialized pointer
50 2024-08-12T19:25:00Z CVE-2016-3308 https://github.com/55-AA/CVE-2016-3308 Use CVE-2016-3308 corrupt win32k desktop heap
265 2024-10-25T15:48:29Z VIKIROOT https://github.com/hyln9/VIKIROOT CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow
53 2024-08-12T19:26:30Z exploit-CVE-2016-6515 https://github.com/opsxcq/exploit-CVE-2016-6515 OpenSSH remote DOS exploit and vulnerable container
59 2024-08-14T03:32:31Z cve-2016-2431 https://github.com/laginimaineb/cve-2016-2431 Qualcomm TrustZone kernel privilege escalation
80 2024-10-24T10:25:23Z MS16-032 https://github.com/zcgonvh/MS16-032 MS16-032(CVE-2016-0099) for SERVICE ONLY
83 2024-04-12T16:03:01Z mach_race https://github.com/gdbinit/mach_race Exploit code for CVE-2016-1757
49 2023-09-07T17:01:10Z CVE-2016-2434 https://github.com/jianqiangzhao/CVE-2016-2434
53 2024-07-19T10:46:33Z CVE-2016-3309_Reloaded https://github.com/siberas/CVE-2016-3309_Reloaded Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques

2015

star updated_at name url des
542 2024-09-08T18:04:38Z CVE-2015-7547 https://github.com/fjserna/CVE-2015-7547 Proof of concept for CVE-2015-7547
286 2024-10-25T16:14:23Z CVE-2015-1701 https://github.com/hfiref0x/CVE-2015-1701 Win32k LPE vulnerability used in APT attack
270 2024-11-09T15:25:05Z iovyroot https://github.com/dosomder/iovyroot CVE-2015-1805 root tool
203 2024-08-12T19:19:13Z cve-2015-1538-1 https://github.com/jduck/cve-2015-1538-1 An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution
131 2023-08-04T13:41:05Z CVE-2015-3636 https://github.com/fi01/CVE-2015-3636 PoC code for 32 bit Android OS
117 2024-10-30T22:24:19Z cve-2015-6639 https://github.com/laginimaineb/cve-2015-6639 QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)
116 2024-08-12T19:18:23Z PoCForCVE-2015-1528 https://github.com/secmob/PoCForCVE-2015-1528 I'll submit the poc after blackhat
395 2024-10-22T06:19:36Z tpwn https://github.com/kpwn/tpwn xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time
129 2024-08-12T19:27:01Z exploit-CVE-2015-3306 https://github.com/t0kx/exploit-CVE-2015-3306 ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container
64 2024-08-27T11:12:39Z cve-2015-5477 https://github.com/robertdavidgraham/cve-2015-5477 PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure
339 2024-10-30T04:41:42Z ExtractKeyMaster https://github.com/laginimaineb/ExtractKeyMaster Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431
67 2024-08-12T19:20:59Z CVE-2015-6086 https://github.com/payatu/CVE-2015-6086 PoC for CVE-2015-6086
102 2024-08-12T19:20:36Z juniper-cve-2015-7755 https://github.com/hdm/juniper-cve-2015-7755 Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS
43 2023-06-30T06:36:02Z libpingpong_exploit https://github.com/android-rooting-tools/libpingpong_exploit CVE-2015-3636 exploit
31 2023-09-27T08:05:00Z CVE-2015-1805 https://github.com/panyu6325/CVE-2015-1805
23 2024-07-27T20:22:39Z CVE-2015-6612 https://github.com/secmob/CVE-2015-6612
43 2024-01-13T17:58:48Z mysslstrip https://github.com/duo-labs/mysslstrip CVE-2015-3152 PoC
50 2024-08-12T19:21:28Z bluebox https://github.com/JackOfMostTrades/bluebox Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049
22 2020-12-24T15:36:05Z CVE-2015-2546-Exploit https://github.com/k0keoyo/CVE-2015-2546-Exploit
39 2023-09-07T17:08:30Z CVE-2015-6620-POC https://github.com/flankerhqd/CVE-2015-6620-POC POC for CVE-2015-6620, AMessage unmarshal arbitrary write
32 2024-08-12T19:27:02Z exploit-CVE-2015-1427 https://github.com/t0kx/exploit-CVE-2015-1427 Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container
11 2024-09-13T15:02:06Z privesc-CVE-2015-5602 https://github.com/t0kx/privesc-CVE-2015-5602 Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container
30 2024-10-09T15:10:03Z serialator https://github.com/roo7break/serialator Python script to exploit CVE-2015-4852.
23 2024-08-12T19:24:38Z CVE-2015-0057 https://github.com/55-AA/CVE-2015-0057 翻译文章,CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC )
21 2019-12-08T12:35:07Z cve-2015-0313 https://github.com/SecurityObscurity/cve-2015-0313
3 2024-08-12T19:18:54Z libping_unhash_exploit_POC https://github.com/askk/libping_unhash_exploit_POC CVE-2015-3636 exploit
20 2024-08-12T19:57:57Z CVE-2015-7501 https://github.com/ianxtianxt/CVE-2015-7501 (CVE-2015-7501)JBoss JMXInvokerServlet 反序列化漏洞
15 2021-12-20T20:47:43Z CVE-2015-6132 https://github.com/hexx0r/CVE-2015-6132 Microsoft Office / COM Object DLL Planting
18 2024-01-19T07:25:53Z CVE-2015-3636 https://github.com/a7vinx/CVE-2015-3636 Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.
13 2024-08-12T19:19:12Z CVE-2015-5119_walkthrough https://github.com/CiscoCXSecurity/CVE-2015-5119_walkthrough Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough

Donation

Wechat Pay AliPay Paypal BTC Pay BCH Pay
paypal miracletalent@gmail.com