CVE-Exploits
Vulnerability exploits
A collection of proof-of-concept exploits for specific software vulnerabilities
PoC exploits for software vulnerabilities
675 stars
33 watching
160 forks
Language: C
last commit: over 3 years ago
Linked from 1 awesome list
Related projects:
Repository | Description | Stars |
---|---|---|
| Automates CVE vulnerability detection from Git commit messages | 402 |
| An exploit for a Java vulnerability | 9 |
| A database of security vulnerabilities with metadata on affected languages and modules. | 129 |
| A platform to manage and monitor the CVE database, synchronizing data from multiple reliable sources and providing features for searching, filtering, and organizing vulnerabilities. | 1,830 |
| A script to identify vulnerabilities in software packages on Linux systems | 222 |
| Records reproductions of Linux vulnerabilities in various virtual machines. | 399 |
| A comprehensive database of vulnerability and exploitation reports | 248 |
| An example C program demonstrating common types of vulnerabilities, designed to be fuzzed using various tools. | 681 |
| Exploring and documenting WebLogic vulnerabilities to aid researchers in identifying and exploiting post-deserialization vulnerabilities | 155 |
| Exploits a vulnerability in outdated Shockwave Flash player to gain control of Internet Explorer and execute malicious code. | 87 |
| A tool for detecting common bugs in binary executables. | 1,155 |
| A tool for detecting vulnerabilities in web applications | 113 |
| A collection of tools and techniques for exploiting vulnerabilities in software applications. | 17 |
| Contains public advisories, exploits, and code related to vulnerabilities and hacking. | 826 |
| Research and experimentation with potential vulnerabilities in data hashing algorithms. | 1,480 |