CVE-Exploits
Vulnerability exploits
A collection of proof-of-concept exploits for specific software vulnerabilities
PoC exploits for software vulnerabilities
675 stars
33 watching
160 forks
Language: C
last commit: about 4 years ago
Linked from 1 awesome list
Related projects:
| Repository | Description | Stars |
|---|---|---|
| | Automates CVE vulnerability detection from Git commit messages | 402 |
| | An exploit for a Java vulnerability | 9 |
| | A database of security vulnerabilities with metadata on affected languages and modules. | 129 |
| | A platform to manage and monitor the CVE database, synchronizing data from multiple reliable sources and providing features for searching, filtering, and organizing vulnerabilities. | 1,830 |
| | A script to identify vulnerabilities in software packages on Linux systems | 222 |
| | Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
| | A comprehensive database of vulnerability and exploitation reports | 248 |
| | An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
| | Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities | 155 |
| | Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
| | A tool for detecting common bugs in binary executables. | 1,155 |
| | A tool for detecting vulnerabilities in web applications | 113 |
| | A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| | Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 |
| | Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |