CVE-Exploits

Vulnerability exploits

A collection of proof-of-concept exploits for specific software vulnerabilities

PoC exploits for software vulnerabilities

GitHub

675 stars
33 watching
160 forks
Language: C
last commit: over 3 years ago
Linked from 1 awesome list


Backlinks from these awesome lists:

Related projects:

Repository Description Stars
cve-search/git-vuln-finder Automates CVE vulnerability detection from Git commit messages 402
babyteam1024/cve-2021-2394 An exploit for a Java vulnerability 9
victims/victims-cve-db A database of security vulnerabilities with metadata on affected languages and modules. 129
opencve/opencve A platform to manage and monitor the CVE database, synchronizing data from multiple reliable sources and providing features for searching, filtering, and organizing vulnerabilities. 1,830
belane/linux-soft-exploit-suggester A script to identify vulnerabilities in software packages on Linux systems 222
vulnreproduction/linuxflaw Records reproductions of Linux vulnerabilities in various virtual machines. 399
gmatuz/inthewilddb A comprehensive database of vulnerability and exploitation reports 248
hardik05/damn_vulnerable_c_program An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. 681
gobysec/weblogic Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities 155
vysecurity/cve-2018-4878 Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. 87
fkie-cad/cwe_checker A tool for detecting common bugs in binary executables. 1,155
bitthebyte/eagle A tool for detecting vulnerabilities in web applications 113
pyroxenites/boftools A collection of tools and techniques for exploiting vulnerabilities in software applications. 17
pedrib/poc Contains public advisories, exploits, and code related to vulnerabilities and hacking. 825
corkami/pocs Research and experimentation with potential vulnerabilities in data hashing algorithms. 1,480