 CVE-Exploits
 CVE-Exploits 
 Vulnerability exploits
 A collection of proof-of-concept exploits for specific software vulnerabilities
PoC exploits for software vulnerabilities
675 stars
 33 watching
 160 forks
 
Language: C 
last commit: about 4 years ago 
Linked from   1 awesome list  
 Related projects:
| Repository | Description | Stars | 
|---|---|---|
|  | Automates CVE vulnerability detection from Git commit messages | 402 | 
|  | An exploit for a Java vulnerability | 9 | 
|  | A database of security vulnerabilities with metadata on affected languages and modules. | 129 | 
|  | A platform to manage and monitor the CVE database, synchronizing data from multiple reliable sources and providing features for searching, filtering, and organizing vulnerabilities. | 1,830 | 
|  | A script to identify vulnerabilities in software packages on Linux systems | 222 | 
|  | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 | 
|  | A comprehensive database of vulnerability and exploitation reports | 248 | 
|  | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 | 
|  | Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities | 155 | 
|  | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 | 
|  | A tool for detecting common bugs in binary executables. | 1,155 | 
|  | A tool for detecting vulnerabilities in web applications | 113 | 
|  | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 | 
|  | Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 | 
|  | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |