CVE-Exploits
Vulnerability exploits
A collection of proof-of-concept exploits for specific software vulnerabilities
PoC exploits for software vulnerabilities
675 stars
33 watching
160 forks
Language: C
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
cve-search/git-vuln-finder | Automates CVE vulnerability detection from Git commit messages | 402 |
babyteam1024/cve-2021-2394 | An exploit for a Java vulnerability | 9 |
victims/victims-cve-db | A database of security vulnerabilities with metadata on affected languages and modules. | 129 |
opencve/opencve | A platform to manage and monitor the CVE database, synchronizing data from multiple reliable sources and providing features for searching, filtering, and organizing vulnerabilities. | 1,830 |
belane/linux-soft-exploit-suggester | A script to identify vulnerabilities in software packages on Linux systems | 222 |
vulnreproduction/linuxflaw | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
gmatuz/inthewilddb | A comprehensive database of vulnerability and exploitation reports | 248 |
hardik05/damn_vulnerable_c_program | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
gobysec/weblogic | Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities | 155 |
vysecurity/cve-2018-4878 | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
fkie-cad/cwe_checker | A tool for detecting common bugs in binary executables. | 1,155 |
bitthebyte/eagle | A tool for detecting vulnerabilities in web applications | 113 |
pyroxenites/boftools | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
pedrib/poc | Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 825 |
corkami/pocs | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |