all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things
- 2022 year top total 30
- 2021 year top total 30
- 2020 year top total 30
- 2019 year top total 30
- 2018 year top total 30
- 2017 year top total 30
- 2016 year top total 30
- 2015 year top total 30
- 2014 year top total 30
- 2013 year top total 30
star | name | url | des |
---|---|---|---|
960 | CVE-2022-0847-DirtyPipe-Exploit | https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit | A root exploit for CVE-2022-0847 (Dirty Pipe) |
667 | CVE-2022-29072 | https://github.com/kagancapar/CVE-2022-29072 | 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. |
494 | CVE-2022-23222 | https://github.com/tr3ee/CVE-2022-23222 | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation |
471 | CVE-2022-0995 | https://github.com/Bonfee/CVE-2022-0995 | CVE-2022-0995 exploit |
427 | CVE-2022-21882 | https://github.com/KaLendsi/CVE-2022-21882 | win32k LPE |
396 | CVE-2022-25636 | https://github.com/Bonfee/CVE-2022-25636 | CVE-2022-25636 |
383 | CVE-2022-27254 | https://github.com/nonamecoder/CVE-2022-27254 | PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254) |
363 | CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 |
329 | CVE-2022-0185 | https://github.com/Crusaders-of-Rust/CVE-2022-0185 | CVE-2022-0185 |
323 | pxplan | https://github.com/GREENHAT7/pxplan | CVE-2022-2022 |
301 | CVE-2022-29464 | https://github.com/hakivvi/CVE-2022-29464 | WSO2 RCE (CVE-2022-29464) exploit and writeup. |
298 | CVE-2022-0847-DirtyPipe-Exploits | https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. |
294 | Spring4Shell-POC | https://github.com/BobTheShoplifter/Spring4Shell-POC | Spring4Shell Proof Of Concept/And vulnerable application CVE-2022-22965 |
279 | CVE-2022-21971 | https://github.com/0vercl0k/CVE-2022-21971 | PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability" |
269 | VMware-CVE-2022-22954 | https://github.com/sherlocksecurity/VMware-CVE-2022-22954 | POC for VMWARE CVE-2022-22954 |
264 | Spring4Shell-POC | https://github.com/reznok/Spring4Shell-POC | Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit |
256 | CVE-2022-26134 | https://github.com/Nwqda/CVE-2022-26134 | CVE-2022-26134 - Atlassian Confluence unauthenticated OGNL injection vulnerability (RCE). |
234 | CVE-2022-20699 | https://github.com/Audiobahn/CVE-2022-20699 | Cisco Anyconnect VPN unauth RCE (rwx stack) |
216 | CVE-2022-1388 | https://github.com/horizon3ai/CVE-2022-1388 | POC for CVE-2022-1388 |
189 | CVE-2022-0847 | https://github.com/r1is/CVE-2022-0847 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” |
183 | Spring-Cloud-Gateway-CVE-2022-22947 | https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 | CVE-2022-22947 |
175 | CVE-2022-0778 | https://github.com/drago-96/CVE-2022-0778 | Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt |
174 | CVE-2022-27666 | https://github.com/plummm/CVE-2022-27666 | Exploit for CVE-2022-27666 |
170 | CVE-2022-21882 | https://github.com/L4ys/CVE-2022-21882 | |
166 | CVE-2022-30075 | https://github.com/aaronsvk/CVE-2022-30075 | Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075) |
134 | PoC-CVE-2022-30190 | https://github.com/JMousqueton/PoC-CVE-2022-30190 | POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina |
105 | SpringShell | https://github.com/TheGejr/SpringShell | Spring4Shell - Spring Core RCE - CVE-2022-22965 |
99 | CVE-2022-22963 | https://github.com/dinosn/CVE-2022-22963 | CVE-2022-22963 PoC |
92 | CVE-2022-30190 | https://github.com/onecloudemoji/CVE-2022-30190 | CVE-2022-30190 Follina POC |
88 | zabbix-saml-bypass-exp | https://github.com/jweny/zabbix-saml-bypass-exp | cve-2022-23131 exp |
star | name | url | des |
---|---|---|---|
1631 | CVE-2021-4034 | https://github.com/berdav/CVE-2021-4034 | CVE-2021-4034 1day |
1596 | CVE-2021-1675 | https://github.com/cube0x0/CVE-2021-1675 | C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527 |
1449 | log4j-shell-poc | https://github.com/kozmer/log4j-shell-poc | A Proof-Of-Concept for the CVE-2021-44228 vulnerability. |
1435 | CVE-2021-40444 | https://github.com/lockedbyte/CVE-2021-40444 | CVE-2021-40444 PoC |
1128 | noPac | https://github.com/cube0x0/noPac | CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter. |
1001 | log4shell-vulnerable-app | https://github.com/christophetd/log4shell-vulnerable-app | Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228). |
900 | CVE-2021-4034 | https://github.com/arthepsy/CVE-2021-4034 | PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034) |
835 | CVE-2021-44228-Scanner | https://github.com/logpresso/CVE-2021-44228-Scanner | Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228 |
832 | sam-the-admin | https://github.com/WazeHell/sam-the-admin | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
828 | CVE-2021-3156 | https://github.com/blasty/CVE-2021-3156 | |
823 | CVE-2021-1675 | https://github.com/calebstewart/CVE-2021-1675 | Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare) |
817 | CVE-2021-31166 | https://github.com/0vercl0k/CVE-2021-31166 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. |
698 | CVE-2021-40444 | https://github.com/klezVirus/CVE-2021-40444 | CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit |
529 | CVE-2021-3156 | https://github.com/worawit/CVE-2021-3156 | Sudo Baron Samedit Exploit |
431 | CVE-2021-3156 | https://github.com/stong/CVE-2021-3156 | PoC for CVE-2021-3156 (sudo heap overflow) |
427 | log4j-finder | https://github.com/fox-it/log4j-finder | Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105) |
399 | CVE-2021-21972 | https://github.com/NS-Sp4ce/CVE-2021-21972 | CVE-2021-21972 Exploit |
387 | CVE-2021-1732-Exploit | https://github.com/KaLendsi/CVE-2021-1732-Exploit | CVE-2021-1732 Exploit |
382 | noPac | https://github.com/Ridter/noPac | Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user |
339 | CVE-2021-44228_scanner | https://github.com/CERTCC/CVE-2021-44228_scanner | Scanners for Jar files that may be vulnerable to CVE-2021-44228 |
330 | CVE-2021-1675-LPE | https://github.com/hlldz/CVE-2021-1675-LPE | Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527 |
304 | CVE-2021-3493 | https://github.com/briskets/CVE-2021-3493 | Ubuntu OverlayFS Local Privesc |
283 | CVE-2021-26084_Confluence | https://github.com/h3v0x/CVE-2021-26084_Confluence | Confluence Server Webwork OGNL injection |
274 | Grafana-CVE-2021-43798 | https://github.com/jas502n/Grafana-CVE-2021-43798 | Grafana Unauthorized arbitrary file reading vulnerability |
222 | laravel-exploits | https://github.com/ambionics/laravel-exploits | Exploit for CVE-2021-3129 |
206 | CVE-2021-41773 | https://github.com/blasty/CVE-2021-41773 | CVE-2021-41773 playground |
138 | ProxyVulns | https://github.com/hosch3n/ProxyVulns | [ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains. |
135 | CVE-2021-41773_CVE-2021-42013 | https://github.com/inbug-team/CVE-2021-41773_CVE-2021-42013 | CVE-2021-41773 CVE-2021-42013漏洞批量检测工具 |
127 | exprolog | https://github.com/herwonowr/exprolog | ProxyLogon Full Exploit Chain PoC (CVE-2021–26855, CVE-2021–26857, CVE-2021–26858, CVE-2021–27065) |
110 | CVE-2021-26855 | https://github.com/charlottelatest/CVE-2021-26855 | CVE-2021-26855 exp |
star | name | url | des |
---|---|---|---|
3493 | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
1488 | CVE-2020-1472 | https://github.com/SecuraBV/CVE-2020-1472 | Test tool for CVE-2020-1472 |
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1212 | CVE-2020-0796 | https://github.com/danigargu/CVE-2020-0796 | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost |
946 | CVE-2020-1472 | https://github.com/dirkjanm/CVE-2020-1472 | PoC for Zerologon - all research credits go to Tom Tervoort of Secura |
876 | CurveBall | https://github.com/ly4k/CurveBall | PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll) |
633 | CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | https://github.com/cbwang505/CVE-2020-0787-EXP-ALL-WINDOWS-VERSION | Support ALL Windows Version |
621 | SMBGhost | https://github.com/ly4k/SMBGhost | Scanner for CVE-2020-0796 - SMBv3 RCE |
470 | CVE-2020-0796-RCE-POC | https://github.com/ZecOps/CVE-2020-0796-RCE-POC | CVE-2020-0796 Remote Code Execution POC |
449 | zerologon | https://github.com/risksense/zerologon | Exploit for zerologon cve-2020-1472 |
369 | CVE-2020-5902 | https://github.com/jas502n/CVE-2020-5902 | CVE-2020-5902 BIG-IP |
340 | chainoffools | https://github.com/kudelskisecurity/chainoffools | A PoC for CVE-2020-0601 |
327 | CVE-2020-0688 | https://github.com/zcgonvh/CVE-2020-0688 | Exploit and detect tools for CVE-2020-0688 |
316 | CVE-2020-1472 | https://github.com/VoidSec/CVE-2020-1472 | Exploit Code for CVE-2020-1472 aka Zerologon |
302 | cve-2020-0688 | https://github.com/Ridter/cve-2020-0688 | cve-2020-0688 |
297 | CVE-2020-2551 | https://github.com/Y4er/CVE-2020-2551 | Weblogic IIOP CVE-2020-2551 |
291 | CVEAC-2020 | https://github.com/thesecretclub/CVEAC-2020 | EasyAntiCheat Integrity check bypass by mimicking memory changes |
289 | CVE-2020-0796-PoC | https://github.com/eerykitty/CVE-2020-0796-PoC | PoC for triggering buffer overflow via CVE-2020-0796 |
267 | CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner | Cnvd-2020-10487 / cve-2020-1938, scanner tool |
264 | CVE-2020-14882 | https://github.com/jas502n/CVE-2020-14882 | CVE-2020–14882、CVE-2020–14883 |
254 | BlueGate | https://github.com/ly4k/BlueGate | PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE |
240 | CVE-2020-0796-LPE-POC | https://github.com/ZecOps/CVE-2020-0796-LPE-POC | CVE-2020-0796 Local Privilege Escalation POC |
228 | CVE-2020-1362 | https://github.com/Q4n/CVE-2020-1362 | writeup of CVE-2020-1362 |
204 | CVE-2020-0674-Exploit | https://github.com/maxpl0it/CVE-2020-0674-Exploit | This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7. |
197 | SAP_RECON | https://github.com/chipik/SAP_RECON | PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability) |
193 | CVE-2020-0041 | https://github.com/bluefrostsecurity/CVE-2020-0041 | Exploits for Android Binder bug CVE-2020-0041 |
158 | cve-2020-0688 | https://github.com/random-robbie/cve-2020-0688 | cve-2020-0688 |
132 | CVE_2020_2546 | https://github.com/hktalent/CVE_2020_2546 | CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3, |
109 | CVE-2020-11651-poc | https://github.com/jasperla/CVE-2020-11651-poc | PoC exploit of CVE-2020-11651 and CVE-2020-11652 |
79 | dnspooq | https://github.com/knqyf263/dnspooq | DNSpooq - dnsmasq cache poisoning (CVE-2020-25686, CVE-2020-25684, CVE-2020-25685) |
star | name | url | des |
---|---|---|---|
3493 | exphub | https://github.com/zhzyker/exphub | Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340 |
1729 | phuip-fpizdam | https://github.com/neex/phuip-fpizdam | Exploit for CVE-2019-11043 |
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
1113 | BlueKeep | https://github.com/Ekultek/BlueKeep | Proof of concept for CVE-2019-0708 |
862 | rdpscan | https://github.com/robertdavidgraham/rdpscan | A quick scanner for the CVE-2019-0708 "BlueKeep" vulnerability. |
727 | esp32_esp8266_attacks | https://github.com/Matheus-Garbelini/esp32_esp8266_attacks | Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588) |
598 | CVE-2019-11708 | https://github.com/0vercl0k/CVE-2019-11708 | Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit. |
592 | CVE-2019-5736-PoC | https://github.com/Frichetten/CVE-2019-5736-PoC | PoC for CVE-2019-5736 |
553 | cve-2019-19781 | https://github.com/trustedsec/cve-2019-19781 | This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first. |
480 | CVE-2019-0708 | https://github.com/n1xbyte/CVE-2019-0708 | dump |
422 | CVE-2019-2725 | https://github.com/lufeirider/CVE-2019-2725 | CVE-2019-2725 命令回显 |
373 | CVE-2019-0708 | https://github.com/k8gege/CVE-2019-0708 | 3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check) |
368 | CVE-2019-19781 | https://github.com/projectzeroindia/CVE-2019-19781 | Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ] |
355 | CVE-2019-11510 | https://github.com/projectzeroindia/CVE-2019-11510 | Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510) |
346 | bluekeep_CVE-2019-0708_poc_to_exploit | https://github.com/algo7/bluekeep_CVE-2019-0708_poc_to_exploit | An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits |
314 | CVE-2019-2107 | https://github.com/marcinguy/CVE-2019-2107 | CVE-2019-2107 |
297 | COMahawk | https://github.com/apt69/COMahawk | Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322 |
292 | bluekeep | https://github.com/0xeb-bp/bluekeep | Public work for CVE-2019-0708 |
292 | cve-2019-1003000-jenkins-rce-poc | https://github.com/adamyordan/cve-2019-1003000-jenkins-rce-poc | Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative) |
289 | CVE-2019-13272 | https://github.com/jas502n/CVE-2019-13272 | Linux 4.10 < 5.1.17 PTRACE_TRACEME local root |
257 | CVE-2019-5786 | https://github.com/exodusintel/CVE-2019-5786 | FileReader Exploit |
256 | CVE-2019-11932 | https://github.com/dorkerdevil/CVE-2019-11932 | double-free bug in WhatsApp exploit poc |
244 | CVE-2019-18935 | https://github.com/noperator/CVE-2019-18935 | RCE exploit for a .NET JSON deserialization vulnerability in Telerik UI for ASP.NET AJAX. |
234 | CVE-2019-0841 | https://github.com/rogue-kdc/CVE-2019-0841 | PoC code for CVE-2019-0841 Privilege Escalation vulnerability |
222 | CVE-2019-1040 | https://github.com/Ridter/CVE-2019-1040 | CVE-2019-1040 with Exchange |
197 | cve-2019-5736-poc | https://github.com/q3k/cve-2019-5736-poc | Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape) |
182 | CVE-2019-11932 | https://github.com/awakened1712/CVE-2019-11932 | Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif |
178 | CVE-2019-2725 | https://github.com/TopScrew/CVE-2019-2725 | CVE-2019-2725命令回显+webshell上传+最新绕过 |
170 | CVE-2019-3396_EXP | https://github.com/Yt1g3r/CVE-2019-3396_EXP | CVE-2019-3396 confluence SSTI RCE |
134 | CVE-2019-0604 | https://github.com/linhlhq/CVE-2019-0604 | CVE-2019-0604 |
star | name | url | des |
---|---|---|---|
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
527 | Drupalgeddon2 | https://github.com/dreadlocked/Drupalgeddon2 | Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 / CVE-2018-7600 / SA-CORE-2018-002) |
496 | CVE-2018-15473-Exploit | https://github.com/Rhynorater/CVE-2018-15473-Exploit | Exploit written in Python for CVE-2018-15473 with threading and export formats |
484 | CVE-2018-10933 | https://github.com/blacknbunny/CVE-2018-10933 | Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH) |
482 | CVE-2018-8120 | https://github.com/unamer/CVE-2018-8120 | CVE-2018-8120 Windows LPE exploit |
481 | CVE-2018-20250 | https://github.com/WyAtu/CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
474 | CVE-2018-9995_dvr_credentials | https://github.com/ezelf/CVE-2018-9995_dvr_credentials | (CVE-2018-9995) Get DVR Credentials |
470 | WinboxPoC | https://github.com/BasuCert/WinboxPoC | Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) |
405 | CVE-2018-8897 | https://github.com/can1357/CVE-2018-8897 | Arbitrary code execution with kernel privileges using CVE-2018-8897. |
345 | CVE-2018-7600 | https://github.com/a2u/CVE-2018-7600 | 💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002 |
340 | Exchange2domain | https://github.com/Ridter/Exchange2domain | CVE-2018-8581 |
329 | CVE-2018-8581 | https://github.com/WyAtu/CVE-2018-8581 | CVE-2018-8581 |
298 | struts-pwn_CVE-2018-11776 | https://github.com/mazen160/struts-pwn_CVE-2018-11776 | An exploit for Apache Struts CVE-2018-11776 |
291 | CVE-2018-8120 | https://github.com/alpha1ab/CVE-2018-8120 | CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 |
267 | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
247 | CVE-2018-13379 | https://github.com/milo2012/CVE-2018-13379 | CVE-2018-13379 |
220 | poc_CVE-2018-1002105 | https://github.com/evict/poc_CVE-2018-1002105 | PoC for CVE-2018-1002105. |
192 | CVE-2018-0296 | https://github.com/yassineaboukir/CVE-2018-0296 | Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information. |
181 | CVE-2018-15982_EXP | https://github.com/Ridter/CVE-2018-15982_EXP | exp of CVE-2018-15982 |
167 | CVE-2018-8174-msf | https://github.com/0x09AL/CVE-2018-8174-msf | CVE-2018-8174 - VBScript memory corruption exploit. |
166 | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
165 | cve-2018-8120 | https://github.com/bigric3/cve-2018-8120 | |
163 | CVE-2018-3245 | https://github.com/pyn3rd/CVE-2018-3245 | CVE-2018-3245-PoC |
143 | CVE-2018-13382 | https://github.com/milo2012/CVE-2018-13382 | CVE-2018-13382 |
137 | CVE-2018-8174_EXP | https://github.com/Yt1g3r/CVE-2018-8174_EXP | CVE-2018-8174_python |
134 | CVE-2018-2894 | https://github.com/LandGrey/CVE-2018-2894 | CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script |
124 | cve-2018-8453-exp | https://github.com/ze0r/cve-2018-8453-exp | cve-2018-8453 exp |
99 | CVE-2018-7600 | https://github.com/pimps/CVE-2018-7600 | Exploit for Drupal 7 <= 7.57 CVE-2018-7600 |
96 | CVE-2018-2893 | https://github.com/pyn3rd/CVE-2018-2893 | CVE-2018-2893-PoC |
79 | CVE-2018-2628 | https://github.com/shengqi158/CVE-2018-2628 | CVE-2018-2628 & CVE-2018-2893 |
star | name | url | des |
---|---|---|---|
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
711 | spectre-attack | https://github.com/Eugnis/spectre-attack | Example of using revealed "Spectre" exploit (CVE-2017-5753 and CVE-2017-5715) |
685 | CVE-2017-0199 | https://github.com/bhdresh/CVE-2017-0199 | Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF/PPSX file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
529 | CVE-2017-11882 | https://github.com/Ridter/CVE-2017-11882 | CVE-2017-11882 from https://github.com/embedi/CVE-2017-11882 |
491 | CVE-2017-11882 | https://github.com/embedi/CVE-2017-11882 | Proof-of-Concept exploits for CVE-2017-11882 |
445 | CVE-2017-0785 | https://github.com/ojasookert/CVE-2017-0785 | Blueborne CVE-2017-0785 Android information leak vulnerability |
405 | struts-pwn | https://github.com/mazen160/struts-pwn | An exploit for Apache Struts CVE-2017-5638 |
373 | CVE-2017-12617 | https://github.com/cyberheartmi9/CVE-2017-12617 | Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution |
317 | CVE-2017-8759 | https://github.com/bhdresh/CVE-2017-8759 | Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit / meterpreter / other payload to victim without any complex configuration. |
313 | exploit-CVE-2017-7494 | https://github.com/opsxcq/exploit-CVE-2017-7494 | SambaCry exploit and vulnerable container (CVE-2017-7494) |
304 | CVE-2017-11882 | https://github.com/unamer/CVE-2017-11882 | CVE-2017-11882 Exploit accepts over 17k bytes long command/code in maximum. |
291 | eternal_scanner | https://github.com/peterpt/eternal_scanner | An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance) |
267 | CVE-2018-0802 | https://github.com/rxwx/CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) |
256 | CVE-2017-8759-Exploit-sample | https://github.com/Voulnet/CVE-2017-8759-Exploit-sample | Running CVE-2017-8759 exploit sample. |
249 | CVE-2017-7494 | https://github.com/joxeankoret/CVE-2017-7494 | Remote root exploit for the SAMBA CVE-2017-7494 vulnerability |
245 | struts-pwn_CVE-2017-9805 | https://github.com/mazen160/struts-pwn_CVE-2017-9805 | An exploit for Apache Struts CVE-2017-9805 |
183 | CVE-2017-8570 | https://github.com/rxwx/CVE-2017-8570 | Proof of Concept exploit for CVE-2017-8570 |
180 | cve-2017-7494 | https://github.com/betab0t/cve-2017-7494 | Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share) |
174 | CVE-2017-8759 | https://github.com/vysecurity/CVE-2017-8759 | CVE-2017-8759 - A vulnerability in the SOAP WDSL parser. |
171 | Jira-Scan | https://github.com/random-robbie/Jira-Scan | CVE-2017-9506 - SSRF |
166 | RTF_11882_0802 | https://github.com/Ridter/RTF_11882_0802 | PoC for CVE-2018-0802 And CVE-2017-11882 |
160 | jboss-_CVE-2017-12149 | https://github.com/yunxu1/jboss-_CVE-2017-12149 | CVE-2017-12149 jboss反序列化 可回显 |
136 | CVE-2017-10271 | https://github.com/c0mmand3rOpSec/CVE-2017-10271 | WebLogic Exploit |
127 | cve-2017-7269 | https://github.com/zcgonvh/cve-2017-7269 | fixed msf module for cve-2017-7269 |
98 | CVE-2017-11882-metasploit | https://github.com/0x09AL/CVE-2017-11882-metasploit | This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office-vulnerability-you-didnt-know-about. |
96 | CVE-2017-8759 | https://github.com/nccgroup/CVE-2017-8759 | NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements |
83 | CVE-2017-8759 | https://github.com/Lz1y/CVE-2017-8759 | CVE-2017-8759 |
56 | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
52 | iis6-exploit-2017-CVE-2017-7269 | https://github.com/g0rx/iis6-exploit-2017-CVE-2017-7269 | iis6 exploit 2017 CVE-2017-7269 |
42 | CVE-2017-11882 | https://github.com/starnightcyber/CVE-2017-11882 | CVE-2017-11882 exploitation |
star | name | url | des |
---|---|---|---|
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
903 | CVE-2016-5195 | https://github.com/timwr/CVE-2016-5195 | CVE-2016-5195 (dirtycow/dirtyc0w) proof of concept for Android |
631 | dirtycow | https://github.com/firefart/dirtycow | Dirty Cow exploit - CVE-2016-5195 |
481 | PoCs | https://github.com/ImageTragick/PoCs | Proof of Concepts for CVE-2016–3714 |
415 | dirtycow-vdso | https://github.com/scumjr/dirtycow-vdso | PoC for Dirty COW (CVE-2016-5195) |
381 | exploit-CVE-2016-10033 | https://github.com/opsxcq/exploit-CVE-2016-10033 | PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container |
329 | CVE-2016-0051 | https://github.com/koczkatamas/CVE-2016-0051 | EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016) |
320 | ExtractKeyMaster | https://github.com/laginimaineb/ExtractKeyMaster | Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431 |
262 | CVE-2016-5195 | https://github.com/gbonacini/CVE-2016-5195 | A CVE-2016-5195 exploit example. |
180 | CVE-2016-2107 | https://github.com/FiloSottile/CVE-2016-2107 | Simple test for the May 2016 OpenSSL padding oracle (CVE-2016-2107) |
154 | BadKernel | https://github.com/secmob/BadKernel | Full exploit of CVE-2016-6754(BadKernel) and slide of SyScan360 2016 |
153 | CVE-2016-6366 | https://github.com/RiskSense-Ops/CVE-2016-6366 | Public repository for improvements to the EXTRABACON exploit |
139 | chakra-2016-11 | https://github.com/theori-io/chakra-2016-11 | Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201) |
111 | cve-2016-0189 | https://github.com/theori-io/cve-2016-0189 | Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11) |
92 | PegasusX | https://github.com/jndok/PegasusX | OS X 10.11.6 LPE PoC for CVE-2016-4655 / CVE-2016-4656 |
91 | jscpwn | https://github.com/saelo/jscpwn | PoC exploit for CVE-2016-4622 |
85 | CVE-2016-7255 | https://github.com/FSecureLABS/CVE-2016-7255 | An exploit for CVE-2016-7255 on Windows 7/8/8.1/10(pre-anniversary) 64 bit |
82 | CVE-2016-0801 | https://github.com/abdsec/CVE-2016-0801 | |
82 | mach_race | https://github.com/gdbinit/mach_race | Exploit code for CVE-2016-1757 |
67 | CVE-2016-3714 | https://github.com/Hood3dRob1n/CVE-2016-3714 | ImaegMagick Code Execution (CVE-2016-3714) |
56 | Exploit-Development | https://github.com/wetw0rk/Exploit-Development | CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002 |
54 | exploit-CVE-2016-6515 | https://github.com/opsxcq/exploit-CVE-2016-6515 | OpenSSH remote DOS exploit and vulnerable container |
51 | cve-2016-2431 | https://github.com/laginimaineb/cve-2016-2431 | Qualcomm TrustZone kernel privilege escalation |
50 | jenkins-cve-2016-0792 | https://github.com/jpiechowka/jenkins-cve-2016-0792 | Exploit for Jenkins serialization vulnerability - CVE-2016-0792 |
50 | CVE-2016-2434 | https://github.com/jianqiangzhao/CVE-2016-2434 | |
49 | cve-2016-1764 | https://github.com/moloch--/cve-2016-1764 | Extraction of iMessage Data via XSS |
49 | CVE-2016-3308 | https://github.com/55-AA/CVE-2016-3308 | Use CVE-2016-3308 corrupt win32k desktop heap |
48 | CVE-2016-3309_Reloaded | https://github.com/siberas/CVE-2016-3309_Reloaded | Exploits for the win32kfull!bFill vulnerability on Win10 x64 RS2 using Bitmap or Palette techniques |
47 | cve-2016-0040 | https://github.com/Rootkitsmm-zz/cve-2016-0040 | Exploiting CVE-2016-0040 uninitialized pointer |
38 | CVE-2016-0846 | https://github.com/secmob/CVE-2016-0846 | arbitrary memory read/write by IMemroy OOB |
star | name | url | des |
---|---|---|---|
549 | CVE-2015-7547 | https://github.com/fjserna/CVE-2015-7547 | Proof of concept for CVE-2015-7547 |
397 | tpwn | https://github.com/kpwn/tpwn | xnu local privilege escalation via cve-2015-???? & cve-2015-???? for 10.10.5, 0day at the time |
320 | ExtractKeyMaster | https://github.com/laginimaineb/ExtractKeyMaster | Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431 |
282 | CVE-2015-1701 | https://github.com/hfiref0x/CVE-2015-1701 | Win32k LPE vulnerability used in APT attack |
265 | iovyroot | https://github.com/dosomder/iovyroot | CVE-2015-1805 root tool |
196 | cve-2015-1538-1 | https://github.com/jduck/cve-2015-1538-1 | An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution |
130 | CVE-2015-3636 | https://github.com/fi01/CVE-2015-3636 | PoC code for 32 bit Android OS |
117 | PoCForCVE-2015-1528 | https://github.com/secmob/PoCForCVE-2015-1528 | I'll submit the poc after blackhat |
111 | cve-2015-6639 | https://github.com/laginimaineb/cve-2015-6639 | QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639) |
103 | juniper-cve-2015-7755 | https://github.com/hdm/juniper-cve-2015-7755 | Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS |
96 | exploit-CVE-2015-3306 | https://github.com/t0kx/exploit-CVE-2015-3306 | ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container |
66 | CVE-2015-6086 | https://github.com/payatu/CVE-2015-6086 | PoC for CVE-2015-6086 |
64 | cve-2015-5477 | https://github.com/robertdavidgraham/cve-2015-5477 | PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure |
50 | bluebox | https://github.com/JackOfMostTrades/bluebox | Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049 |
43 | mysslstrip | https://github.com/duo-labs/mysslstrip | CVE-2015-3152 PoC |
42 | libpingpong_exploit | https://github.com/android-rooting-tools/libpingpong_exploit | CVE-2015-3636 exploit |
40 | CVE-2015-6620-POC | https://github.com/flankerhqd/CVE-2015-6620-POC | POC for CVE-2015-6620, AMessage unmarshal arbitrary write |
32 | CVE-2015-1805 | https://github.com/panyu6325/CVE-2015-1805 | |
29 | exploit-CVE-2015-1427 | https://github.com/t0kx/exploit-CVE-2015-1427 | Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container |
29 | serialator | https://github.com/roo7break/serialator | Python script to exploit CVE-2015-4852. |
25 | CVE-2015-0057 | https://github.com/55-AA/CVE-2015-0057 | 翻译文章,CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC ) |
24 | CVE-2015-6612 | https://github.com/secmob/CVE-2015-6612 | |
24 | JoomlaMassExploiter | https://github.com/paralelo14/JoomlaMassExploiter | [discontinued] Mass exploiter of CVE 2015-8562 for Joomla! CMS |
22 | CVE-2015-2546-Exploit | https://github.com/k0keoyo/CVE-2015-2546-Exploit | |
21 | cve-2015-0313 | https://github.com/SecurityObscurity/cve-2015-0313 | |
17 | CVE-2015-3636 | https://github.com/a7vinx/CVE-2015-3636 | Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code. |
16 | cve-2015-6612poc-forM | https://github.com/flankerhqd/cve-2015-6612poc-forM | |
15 | CVE-2015-6132 | https://github.com/hexx0r/CVE-2015-6132 | Microsoft Office / COM Object DLL Planting |
13 | CVE-2015-5119_walkthrough | https://github.com/CiscoCXSecurity/CVE-2015-5119_walkthrough | Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough |
10 | privesc-CVE-2015-5602 | https://github.com/t0kx/privesc-CVE-2015-5602 | Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container |
star | name | url | des |
---|---|---|---|
2279 | Heartbleed | https://github.com/FiloSottile/Heartbleed | A checker (site and tool) for CVE-2014-0160 |
1483 | weblogicScanner | https://github.com/0xn0ne/weblogicScanner | weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883 |
574 | heartbleed-masstest | https://github.com/musalbas/heartbleed-masstest | Multi-threaded tool for scanning many hosts for CVE-2014-0160. |
451 | heartbleeder | https://github.com/titanous/heartbleeder | OpenSSL CVE-2014-0160 Heartbleed vulnerability test |
317 | pacemaker | https://github.com/Lekensteyn/pacemaker | Heartbleed (CVE-2014-0160) client exploit |
211 | poodle-PoC | https://github.com/mpgn/poodle-PoC | 🐩 Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 🐩 |
194 | cve-2014-0038 | https://github.com/saelo/cve-2014-0038 | Linux local root exploit for CVE-2014-0038 |
147 | heartbleed-poc | https://github.com/sensepost/heartbleed-poc | Test for SSL heartbeat vulnerability (CVE-2014-0160) |
146 | CVE-2014-7911_poc | https://github.com/retme7/CVE-2014-7911_poc | Local root exploit for Nexus5 Android 4.4.4(KTU84P) |
136 | exploit-CVE-2014-6271 | https://github.com/opsxcq/exploit-CVE-2014-6271 | Shellshock exploit + vulnerable environment |
119 | CVE-2014-3153 | https://github.com/timwr/CVE-2014-3153 | CVE-2014-3153 aka towelroot |
96 | SSRFX | https://github.com/NoneNotNull/SSRFX | CVE-2014-4210+Redis未授权访问 |
89 | CVE-2014-4322_poc | https://github.com/retme7/CVE-2014-4322_poc | Gain privileges:system -> root,as a part of https://github.com/retme7/CVE-2014-7911_poc |
77 | CVE-2014-1266-poc | https://github.com/gabrielg/CVE-2014-1266-poc | Apple OS X/iOS SSL flaw demonstration |
76 | cve-2014-7920-7921 | https://github.com/laginimaineb/cve-2014-7920-7921 | Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1 |
70 | CVE-2014-4377 | https://github.com/feliam/CVE-2014-4377 | |
68 | heartbleed-PoC | https://github.com/mpgn/heartbleed-PoC | 💔 Hearbleed exploit to retrieve sensitive information CVE-2014-0160 💔 |
44 | shellshock_scanner | https://github.com/scottjpack/shellshock_scanner | Python Scanner for "ShellShock" (CVE-2014-6271) |
43 | CVE-2014-4113 | https://github.com/sam-b/CVE-2014-4113 | Trigger and exploit code for CVE-2014-4113 |
32 | springcss-cve-2014-3625 | https://github.com/ilmila/springcss-cve-2014-3625 | spring mvc cve-2014-3625 |
23 | CVE-2014-0816 | https://github.com/tandasat/CVE-2014-0816 | CVE-2014-0816 |
23 | cve-2014-4323 | https://github.com/marcograss/cve-2014-4323 | cve-2014-4323 poc |
21 | cve-2014-4322 | https://github.com/laginimaineb/cve-2014-4322 | CVE-2014-4322 Exploit |
20 | vaas-cve-2014-6271 | https://github.com/hmlio/vaas-cve-2014-6271 | Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshock |
19 | libmsm_vfe_read_exploit | https://github.com/android-rooting-tools/libmsm_vfe_read_exploit | CVE-2014-4321 exploit |
17 | libfutex_exploit | https://github.com/android-rooting-tools/libfutex_exploit | CVE-2014-3153 exploit |
16 | CVE-2014-4378 | https://github.com/feliam/CVE-2014-4378 | |
13 | vaas-cve-2014-0160 | https://github.com/hmlio/vaas-cve-2014-0160 | Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed |
12 | cve-2014-0521 | https://github.com/molnarg/cve-2014-0521 | |
3 | CVE-2014-4113 | https://github.com/johnjohnsp1/CVE-2014-4113 | PowerShell CVE-2014-4113 |
Wechat Pay | AliPay | Paypal | BTC Pay | BCH Pay |
---|---|---|---|---|
![]() |
![]() |
paypal [email protected] | ![]() |
![]() |