Calana2/Exploits
GitHub: Calana2/Exploits
收录多个经典 CVE 漏洞的复现代码与 PoC,涵盖本地提权、内核漏洞、浏览器漏洞及认证绕过等类型。
Stars: 0 | Forks: 0
# CVE 漏洞利用与 PoC
为学习目的而重新实现的现有 PoC
## 列表
[CVE-2019-18634 (Sudo pwfeedback)](https://github.com/Calana2/CVE-exploits/tree/main/CVE-2019-18634)
[CVE-2016-5195 (Dirty Cow)](https://github.com/Calana2/CVE-exploits/tree/main/CVE-2016-5195)
[CVE-2007-0038 (Animated Cursor Stack Overflow)](https://github.com/Calana2/CVE-exploits/tree/main/CVE-2007-0038)
[CVE-2018-17463 (V8 < 70.0.3538.64 Side Effect Anotation)](https://github.com/Calana2/CVE-exploits/tree/main/CVE-2018-17463)
[CVE-2018-1160 (Netatalk < 3.1.12 Authentication Bypass)](https://github.com/Calana2/Exploits/tree/main/CVE-2018-1160)
标签:Cutter, CVE复现, Dirty Cow, exploit开发, Go语言工具, Netatalk, PE 加载器, PoC验证码, Sudo, V8引擎, Web报告查看器, 子域名枚举, 客户端加密, 提权漏洞, 攻击脚本, 漏洞分析, 漏洞靶场, 系统安全, 缓冲区溢出, 编程工具, 网络安全, 路径探测, 远程代码执行, 逆向工具, 防御检测, 隐私保护