zulloper/cve-poc

GitHub: zulloper/cve-poc

一个自动监控并汇总 GitHub 上最新 CVE 漏洞 PoC(概念验证)代码仓库的列表工具。

Stars: 6 | Forks: 3

# CVE PoC 仓库监控 最后更新:2026-03-09 00:10:56 | CVE ID | 仓库 | 描述 | 语言 | Stars | 更新 | |--------|------|------|------|-------|----------| | CVE-2024-56348 | [cve-2024-56348](https://github.com/joshuavanderpoll/cve-2024-56348) | CVE-2024-56348 — JetBrains TeamCity <2024.12 auth bypass + RCE exploit (unauthenticated SYSTEM_ADMIN... | FreeMarker | 1 | 2026-03-08 | | CVE-2024-2083 | [zenml-CVE-2024-2083-POC](https://github.com/Saptaktdk/zenml-CVE-2024-2083-POC) | Dockerized vulnerable lab demonstrating CVE-2024-2083 in ZenML, a path traversal vulnerability in th... | N/A | 0 | 2026-03-08 | | CVE-2025-32433 | [cve-2025-32433](https://github.com/joshuavanderpoll/cve-2025-32433) | Go PoC for CVE-2025-32433 — unauthenticated RCE in Erlang/OTP SSH. | Go | 1 | 2026-03-07 | | CVE-2024-25096 | [Metasploit-Wordpress-Canto-Exploit-RCE](https://github.com/puppetma4ster/Metasploit-Wordpress-Canto-Exploit-RCE) | this is a metasploit exploit module for CVE-2024-25096 and CVE-2023-3452 | Ruby | 0 | 2026-03-06 | | CVE-2023-21746 | [PEREDBOEMPATAT-BOF](https://github.com/TailoredSecOps/PEREDBOEMPATAT-BOF) | LocalPotato NTLM reflection exploit (CVE-2023-21746) as a Cobalt Strike Beacon Object File | C | 0 | 2026-03-06 | | CVE-2024-3912 | [CVE-2024-3912](https://github.com/H4rk3nz0/CVE-2024-3912) | Asus Router Arbitrary File Write to Remote Code Execution PoC - Fk Mirai | Python | 0 | 2026-03-06 | | CVE-2026-21385 | [qualcomm-vulnerability-scanner](https://github.com/automate-it0/qualcomm-vulnerability-scanner) | A tool to scan Android devices for the recently exploited Qualcomm flaw CVE-2026-21385, providing a ... | Python | 1 | 2026-03-07 | | CVE-2023-3452 | [CVE-2023-3452---WordPress-Canto-Plugin-RCE](https://github.com/Alpastx/CVE-2023-3452---WordPress-Canto-Plugin-RCE) | CVE-2023-3452 exploit for WordPress Canto plugin RCE, HTTPS support included | Python | 0 | 2026-03-03 | | CVE-2023-46229 | [Yasa-CVE-2023-46229](https://github.com/JarvisDing-sdu/Yasa-CVE-2023-46229) | Python exploit for CVE-2023-46229 with Yasa | Python | 1 | 2026-03-02 | | CVE-2025-69985 | [CVE-2025-69985](https://github.com/joshuavanderpoll/CVE-2025-69985) | CVE-2025-69985: FUXA ≤1.2.8 Auth Bypass + RCE via /api/runscript | Python | 1 | 2026-02-25 | | CVE-2023-4966 | [LockBit-Ransomware-Analysis](https://github.com/vignesh-hp/LockBit-Ransomware-Analysis) | Threat intelligence and incident response case study on LockBit ransomware exploiting CVE-2023-4966 ... | N/A | 0 | 2026-02-25 | | CVE-2026-25643 | [CVE-2026-25643](https://github.com/joshuavanderpoll/CVE-2026-25643) | CVE-2026-25643: Frigate ≤0.16.3 Blind RCE via go2rtc exec injection | Python | 4 | 2026-03-01 | | CVE-2023-43208 | [CVE-2023-43208](https://github.com/Pegasus0xx/CVE-2023-43208) | PoC for Mirth Connect Remote Code Execution (RCE) | C++ | 1 | 2026-03-01 | | CVE-2025-36911 | [BLUE-SPY](https://github.com/Athexhacker/BLUE-SPY) | BLUE-SPY (Bluetooth Low Energy Universal Exploit - Security Penetration Testing) is a professional s... | Python | 0 | 2026-02-19 | | CVE-2020-0688 | [Cyber-Attack-Analysis](https://github.com/iamwajd/Cyber-Attack-Analysis) | A deep-dive security analysis into the 2020 Virgin Mobile KSA data breach. This study dissects the e... | N/A | 0 | 2026-02-18 | | CVE-2025-4517 | [CVE-2025-4517-POC-Sudoers](https://github.com/bgutowski/CVE-2025-4517-POC-Sudoers) | Exploit for CVE-2024-6232 - Python Tarfile Realpath Overflow | Python | 0 | 2026-02-18 | | CVE-2024-34444 | [CVE-2024-34444-Exploit-Poc](https://github.com/dzmind2312/CVE-2024-34444-Exploit-Poc) | N/A | Python | 0 | 2026-02-15 | | CVE-2024-37383 | [CVE-2024-37383_PoC](https://github.com/hyungin0505/CVE-2024-37383_PoC) | CVE-2024-37383 Proof of Concept | Python | 0 | 2026-02-14 | | CVE-2025-6018 | [CVE-2025-6018-6019](https://github.com/DesertDemons/CVE-2025-6018-6019) | CVE-2025-6018 CVE-2025-6019 PoC Exploit - Local Privilege Escalation in openSUSE/SUSE Linux Enterpri... | Shell | 1 | 2026-02-14 | | CVE-2024-2887 | [CVE-2024-2887](https://github.com/junfuture1103/CVE-2024-2887) | CVE-2024-2887 POC | HTML | 0 | 2026-02-12 | | CVE-2024-11003 | [CVE-2024-11003-POC](https://github.com/sychikov/CVE-2024-11003-POC) | Poc for easily exploit CVE-2024-11003 | N/A | 0 | 2026-02-12 | | CVE-2026-21510 | [CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass](https://github.com/andreassudo/CVE-2026-21510-CVSS-8.8-Important-Windows-Shell-security-feature-bypass) | CVE-2026-21510 (CVSS 8.8, Important) — Windows Shell security feature bypass. An attacker can trick ... | N/A | 1 | 2026-02-12 | | CVE-2023-4220 | [CVE-2023-4220-Chamilo-LMS](https://github.com/Rai2en/CVE-2023-4220-Chamilo-LMS) | This is a script written in Python that allows the exploitation of the Chamilo's LMS software securi... | Python | 5 | 2026-02-09 | | CVE-2023-4147 | [Exploit-en-Python-para-CVE-2023-4147](https://github.com/murdok1982/Exploit-en-Python-para-CVE-2023-4147) | N/A | Python | 0 | 2026-02-07 | | CVE-2025-70886 | [CVE-2025-70886](https://github.com/HowieHz/CVE-2025-70886) | A Proof of Concept (PoC) exploit for CVE-2025-70886, a persistent denial-of-service vulnerability in... | JavaScript | 0 | 2026-02-07 | | CVE-2023-33107 | [CVE-2023-33107](https://github.com/keto0422/CVE-2023-33107) | full exploit code | C | 0 | 2026-02-06 | | CVE-2024-8856 | [CVE-2024-8856-PoC](https://github.com/Evillm/CVE-2024-8856-PoC) | N/A | Python | 0 | 2026-02-04 | | CVE-2024-45590 | [CVE-2024-45590-PoC](https://github.com/Evillm/CVE-2024-45590-PoC) | N/A | Python | 0 | 2026-02-04 | | CVE-2024-46987 | [CVE-2024-46987](https://github.com/Goultarde/CVE-2024-46987) | This Python PoC exploits CVE-2024-46987, a Path Traversal bug in Camaleon CMS 2.8.0 < 2.8.2 (work o... | Python | 22 | 2026-03-05 | | CVE-2023-23752 | [CVE-2023-23752-EXPLOIT](https://github.com/K3ysTr0K3R/CVE-2023-23752-EXPLOIT) | A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7 | Python | 13 | 2026-02-01 | | CVE-2023-40028 | [CVE-2023-40028](https://github.com/Stp1t/CVE-2023-40028) | Exploit for CVE-2023-40028 (for educational purposes) | Python | 1 | 2026-01-31 | | CVE-2026-21509 | [CVE-2026-21509-PoC](https://github.com/IncursioHack/CVE-2026-21509-PoC) | Educational PoC for CVE‑2026‑21509 (Microsoft Office security feature bypass). Generates a harmless ... | Python | 0 | 2026-01-28 | | CVE-2024-11467 | [CVE-2024-11467](https://github.com/null-event/CVE-2024-11467) | VMWare Horizon client for macOS LPE due to an XPC logic flaw. Belated POC for an 0-day I responsibly... | C | 0 | 2026-01-27 | | CVE-2024-23334 | [CVE-2024-23334-PoC](https://github.com/Sn0wBaall/CVE-2024-23334-PoC) | N/A | Python | 0 | 2026-01-27 | | CVE-2023-38817 | [CVE-2023-38817](https://github.com/SecSecBurger/CVE-2023-38817) | Exploit Code for CVE-2023-38817 | C | 0 | 2026-01-26 | | CVE-2024-6651 | [CVE-2024-6651](https://github.com/yup-Ivan/CVE-2024-6651) | POC (XSS) -> CVE-2024-6651 | N/A | 1 | 2026-01-26 | | CVE-2023-47125 | [TYPO3-HTML-Sanitizer-XSS-CVE-2023-47125](https://github.com/nikn0laty/TYPO3-HTML-Sanitizer-XSS-CVE-2023-47125) | Stored XSS (exploit) in TYPO3 HTML Sanitizer (CVE-2023-47125). DOM processing instructions are not h... | N/A | 0 | 2026-01-23 | | CVE-2012-1823 | [Vulnerable-Lab-Exploitation](https://github.com/hackherMind-Pixel/Vulnerable-Lab-Exploitation) | A hands-on project demonstrating the setup of virtual security lab, network reconnaissance, and expl... | N/A | 0 | 2026-01-22 | | CVE-2024-10924 | [0-click-RCE-Exploit-for-CVE-2024-10924](https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2024-10924) | Unauthenticated authentication bypass to RCE exploit for CVE-2024-10924. Abuses an authentication an... | PHP | 5 | 2026-01-25 | | CVE-2023-51409 | [0-click-RCE-Exploit-for-CVE-2023-51409](https://github.com/JoshuaProvoste/0-click-RCE-Exploit-for-CVE-2023-51409) | Unauthenticated 0-click RCE exploit for CVE-2023-51409. Abuses an arbitrary file upload flaw in the ... | PHP | 0 | 2026-01-22 | | CVE-2023-52271 | [BYOVD-CVE-2023-52271-POC](https://github.com/victoni/BYOVD-CVE-2023-52271-POC) | Exploit for CVE-2023-52271 in C++. The code exploits the vulnerable driver wsftprm.sys kernel driver... | C++ | 3 | 2026-01-22 | | CVE-2024-23700 | [CVE-2024-23700](https://github.com/canyie/CVE-2024-23700) | PoC for CVE-2024-23700, Android slient privilege escalation allow to read/write contacts, SMS, calen... | Java | 42 | 2026-01-25 | | CVE-2024-38063 | [CVE-2024-38063](https://github.com/Avidan1/CVE-2024-38063) | Final Project in Fundamental network security,POC CVE-202438063 | Python | 0 | 2026-01-21 | | CVE-2024-58290 | [CVE-2024-58290-Xhibiter-SQLi](https://github.com/SohelYousef/CVE-2024-58290-Xhibiter-SQLi) | Proof of Concept (PoC) for SQL Injection in Xhibiter NFT Marketplace 1.10.2 (Collections Endpoint). ... | Python | 0 | 2026-01-21 | | CVE-2023-21768 | [Windows-11-Exploit](https://github.com/Feede33/Windows-11-Exploit) | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | N/A | 0 | 2026-01-20 | | CVE-2024-8465 | [CVE-2024-8465-Po](https://github.com/Sholls000/CVE-2024-8465-PoC) | N/A | PHP | 0 | 2026-01-19 | | CVE-2024-50050 | [LlamaStack-RCE-Deterministic-Supply-Chain-Exploitation-Hardening-Framework-CVE-2024-50050-](https://github.com/sastraadiwiguna-purpleeliteteaming/LlamaStack-RCE-Deterministic-Supply-Chain-Exploitation-Hardening-Framework-CVE-2024-50050-) | LlamaStack-RCE: Deterministic Supply Chain Exploitation & Hardening Framework [CVE-2024-50050] Focus... | N/A | 0 | 2026-01-18 | | CVE-2023-1773 | [CVE-2023-1773-Exploit](https://github.com/C1oudfL0w0/CVE-2023-1773-Exploit) | CVE-2023-1773 Exploit | Python | 0 | 2026-01-10 | | CVE-2019-0708 | [Windows-2](https://github.com/GopeshKachhadiya/Windows-2) | A hands-on Windows 7 lab designed to demonstrate the real-world impact of the BlueKeep (CVE-2019-070... | N/A | 0 | 2026-01-09 | | CVE-2026-21858 | [CVE-2026-21858](https://github.com/Chocapikk/CVE-2026-21858) | n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) | Python | 195 | 2026-01-11 | | CVE-2024-45427 | [CVE-2024-45427-Exploit](https://github.com/MHamdy24/CVE-2024-45427-Exploit) | PoC for PhpSpreadsheet XSS | Python | 0 | 2026-01-07 | | CVE-2025-14998 | [CVE-2025-14998](https://github.com/KTN1990/CVE-2025-14998) | CVE-2025-14998 Wordpress Plugin - Branda – White Label & Branding, Free Login Page Customizer <= 3.4... | N/A | 0 | 2026-01-05 | | CVE-2025-15390 | [CVE-2025-15390](https://github.com/rsecroot/CVE-2025-15390) | A security flaw has been discovered in PHPGurukul Small CRM 4.0. This impacts an unknown function of... | N/A | 0 | 2026-01-01 | | CVE-2024-41997 | [CVE-2024-41997](https://github.com/xpcmdshell/CVE-2024-41997) | CVE-2024-41997 PoC - accompanies https://0day.gg/blog/warp-terminal-rce/ | HTML | 0 | 2026-01-01 | | CVE-2024-52005 | [cve-2024-52005-poc](https://github.com/andrewd-cg/cve-2024-52005-poc) | Proof-of-Concept for CVE-2024-52005: ANSI escape sequence injection in Git. Demonstrates incorrect '... | Python | 0 | 2025-12-29 | | CVE-2024-44083 | [CVE-2024-44083](https://github.com/dynamicx64/CVE-2024-44083) | my CVE-2024-44083 poc. | N/A | 1 | 2025-12-29 | | CVE-2025-14847 | [mongobleed-exploit-CVE-2025-14847](https://github.com/franksec42/mongobleed-exploit-CVE-2025-14847) | Explot, Lab, Scanner - external and docker container, for SMongobleed-CVE-2025-14847 plus phoenix se... | Python | 1 | 2025-12-31 | | CVE-2023-5360 | [CVE-2023-5360-exploit-with-native-libraries](https://github.com/LaviruDilshan/CVE-2023-5360-exploit-with-native-libraries) | CVE-2023-5360 PoC: Unauthenticated arbitrary file upload leading to RCE in Royal Elementor Addons (≤... | Python | 0 | 2025-12-27 | | CVE-2024-30167 | [CVE-2024-30167](https://github.com/RIZZZIOM/CVE-2024-30167) | PoC For CVE-2024-30167 (Atlona OME Authenticated Command Injection) | N/A | 0 | 2025-12-28 | | CVE-2023-30253 | [POC-exploit-for-Dolibarr](https://github.com/1lkla/POC-exploit-for-Dolibarr) | POC exploit for Dolibarr <= 17.0.0 (CVE-2023-30253) | Python | 0 | 2025-12-24 | | CVE-2024-47554 | [CVE-2024-47554-PoC](https://github.com/PawelMurdzek/CVE-2024-47554-PoC) | Proof of concept of CVE-2024-47554 | JavaScript | 0 | 2025-12-23 | | CVE-2025-68613 | [CVE-2025-68613-POC](https://github.com/TheStingR/CVE-2025-68613-POC) | Public PoC + Scanner and research for CVE-2025-68613: Critical RCE in n8n Workflow Automation via Ex... | Python | 9 | 2025-12-26 | | CVE-2023-0704 | [exploit-CVE-2023-0704](https://github.com/hex01e/exploit-CVE-2023-0704) | N/A | HTML | 0 | 2025-12-19 | | CVE-2023-27350 | [CVE-2023-27350](https://github.com/dezso-dfield/CVE-2023-27350) | PaperCut NG/MG Authentication Bypass and Remote Code Execution (RCE) Exploit Tool. A standalone Bash... | Shell | 0 | 2025-12-19 | | CVE-2025-33053 | [CVE-2025-33053-POC](https://github.com/Cyberw1ng/CVE-2025-33053-POC) | POC for CVE-2025-33053 WebDav Exploit, demonstrating how the vulnerability can be triggered in a rea... | Python | 0 | 2025-12-18 | | CVE-2024-34361 | [CVE-2024-34361-Pi-Hole-SSRF-to-RCE](https://github.com/T0X1Cx/CVE-2024-34361-Pi-Hole-SSRF-to-RCE) | This repository contains an exploit for CVE-2024-34361, a critical Pi-hole vulnerability (CVSS 8.6).... | Python | 1 | 2026-01-30 | | CVE-2024-27198 | [CVE-2024-27198-POC](https://github.com/EynaExp/CVE-2024-27198-POC) | proof-of-concept mass scanner targeting JetBrains TeamCity instances affected by CVE-2024-27198 | Python | 0 | 2025-12-17 | | CVE-2024-12227 | [POC-CVE-2024-12227](https://github.com/HI0U/POC-CVE-2024-12227) | # CVE-2024-12227 - NTIOLib_X64.sys DoS PoC | Python | 2 | 2025-12-18 | | CVE-2024-10914 | [CVE-2024-10914__POC](https://github.com/0xSS3K/CVE-2024-10914__POC) | PoC para explotar el CVE-2024-10914 | Python | 0 | 2025-12-13 | | CVE-2023-46747 | [F5-BIG-IP-SmuggleShell-CVE-2023-46747-Exploit](https://github.com/Razzlemouse/F5-BIG-IP-SmuggleShell-CVE-2023-46747-Exploit) | # F5 BIG-IP CVE-2023-46747 – Unauth RCE + Auto Reverse Shell Modified Nuclei template by raguraman ✓... | Python | 4 | 2025-12-14 | | CVE-2014-6287 | [rejjeto_hfs-rce-exploit-cve-2014-6287](https://github.com/JoaZ94/rejjeto_hfs-rce-exploit-cve-2014-6287) | Remote Command Execution exploit for Rejetto HTTP File Server 2.3.x (CVE-2014-6287) rewritten in Pyt... | Python | 0 | 2025-12-07 | | CVE-2014-6271 | [bash-apocalypse](https://github.com/mtaha-sec/bash-apocalypse) | Recreating Shellshock (CVE-2014-6271) - the bash vulnerability that endangered millions of servers. ... | N/A | 0 | 2025-12-15 | | CVE-2025-9074 | [CVE-2025-9074-PoC](https://github.com/BridgerAlderson/CVE-2025-9074-PoC) | A vulnerability has been identified in Docker Desktop. A remote attacker could exploit this vulnerab... | Shell | 1 | 2025-12-07 | | CVE-2025-55182 | [CVE-2025-55182](https://github.com/Chocapikk/CVE-2025-55182) | Next.js React Server Components RCE exploit for CVE-2025-55182 | Python | 16 | 2025-12-09 | | CVE-2024-12828 | [CVE-2024-12828-PoC](https://github.com/fanjm2025-jeremy/CVE-2024-12828-PoC) | Webmin CGI Command Injection Remote Code Execution Vulnerability | Python | 0 | 2025-12-05 | | CVE-2023-35813 | [CVE-2023-35813](https://github.com/Rezy-Dev/CVE-2023-35813) | Exploit CVE-2023-35813 PoC Script | Python | 0 | 2025-11-30 | | CVE-2024-21545 | [CVE-2024-21545-PoC](https://github.com/SpiralBL0CK/CVE-2024-21545-PoC) | Proxmox VE Arbitrary File Read -> Full System Compromise . Not Testeted yet... will test them this w... | Python | 1 | 2025-12-01 | | CVE-2023-46136 | [WerkGhost](https://github.com/JawadPy/WerkGhost) | Exploit for Werkzeug < 3.1.4 (CVE-2023-46136) | Python | 0 | 2025-11-29 | | CVE-2021-3129 | [CVE-2021-3129](https://github.com/joshuavanderpoll/CVE-2021-3129) | Laravel RCE Exploit Script - CVE-2021-3129 | Python | 122 | 2026-01-15 | | CVE-2023-1189 | [CVE-2023-1189](https://github.com/le0s1mba/CVE-2023-1189) | CVE-2023-1189 PoC & Exploit | C | 0 | 2025-11-26 | | CVE-2023-36845 | [CVE-2023-36845](https://github.com/kopfjager007/CVE-2023-36845) | Juniper JunOS J-Web PHP external variable modification (CVE-2023-36845) exploit. | Python | 0 | 2025-11-24 | | CVE-2024-12084 | [CVE-2024-12084](https://github.com/InkeyP/CVE-2024-12084) | A easy poc for CVE-2024-12084. | Python | 0 | 2025-11-24 | | CVE-2023-39910 | [BTCDetect-Scientific-Methodology](https://github.com/zoeir/BTCDetect-Scientific-Methodology) | 🔐 Advanced cryptanalytic framework for Bitcoin wallet vulnerability research | CVE-2023-39910 (Milk ... | Jupyter Notebook | 0 | 2025-11-28 | | CVE-2025-63888 | [cve-2025-63888-exploit](https://github.com/AN5I/cve-2025-63888-exploit) | Security research tool for detecting and testing CVE-2025-63888 (ThinkPHP 5.0.24 File Inclusion RCE ... | Python | 1 | 2025-11-21 | | CVE-2025-64446 | [cve-2025-64446-fortiweb-exploit](https://github.com/AN5I/cve-2025-64446-fortiweb-exploit) | Security research tool for detecting and testing CVE-2025-64446 (FortiWeb Path Traversal RCE vulnera... | Python | 1 | 2025-11-21 | | CVE-2023-22527 | [AtlassianPwn](https://github.com/mylo-2001/AtlassianPwn) | Fully automated Confluence RCE exploit (CVE-2023-22527 + OGNL injection) 100% from scratch • Pytho... | Python | 0 | 2025-11-21 | | CVE-2025-60013 | [Scalar-Venom-Attack](https://github.com/demining/Scalar-Venom-Attack) | Scalar Venom Attack: A critical HSM initialization vulnerability (CVE-2025-60013) enables private Bi... | N/A | 2 | 2025-11-19 | | CVE-2023-33177 | [Xibo-CMS-Zip-Slip-RCE-Exploit-CVE-2023-33177](https://github.com/complexusprada/Xibo-CMS-Zip-Slip-RCE-Exploit-CVE-2023-33177) | This exploit demonstrates a **path traversal vulnerability** in Xibo CMS (CVE-2023-33177) that allow... | Python | 0 | 2025-11-17 | | CVE-2024-0670 | [CVE-2024-0670](https://github.com/magicrc/CVE-2024-0670) | PoC for CVE-2024-0670 | PowerShell | 0 | 2025-11-16 | | CVE-2023-46604 | [CVE-2023-46604-LAB](https://github.com/pavanaa4k/CVE-2023-46604-LAB) | Detection, Exploit and Mitigation for CVE 2023 46604. | N/A | 0 | 2025-11-15 | | CVE-2025-7771 | [throttlestop-exploit-rw](https://github.com/AmrHuss/throttlestop-exploit-rw) | Arbitrary physical memory read/write exploitation using ThrottleStop.sys (CVE-2025-7771) with superf... | C++ | 3 | 2025-11-18 | | CVE-2024-0044 [CVE-2024-0044_PoC](https://github.com/HoyoenKim/CVE-2024-0044_PoC) | CVE-2024-0044_PoC | N/A | 0 | 2025-11-13 | | CVE-2024-4890 | [needrestart-sudo-escalate-cve-2024-4890](https://github.com/nekr0ff/needrestart-sudo-escalate-cve-2024-4890) | PoC exploit for CVE-2024-4890: Sudo privilege escalation via neecdrestart (>=3.8). Ethical lab-only.... | Shell | 0 | 2025-11-12 | | CVE-2024-48910 | [CVE-2024-48910-PoC](https://github.com/Mitchellzhou1/CVE-2024-48910-PoC) | N/A | N/A | 0 | 2025-11-11 | | CVE-2025-11953 | [cve-2025-11953-vulnerability-demo](https://github.com/SaidBenaissa/cve-2025-11953-vulnerability-demo) | CVE-2025-11953 demonstration: Critical RCE vulnerability in React Native CLI (CVSS 9.8). Educational... | PowerShell | 2 | 2025-11-05 | | CVE-2024-5932 | [CVE-2024-5932](https://github.com/autom4il/CVE-2024-5932) | PoC for CVE-2024-5932. | Python | 0 | 2025-11-04 | | CVE-2025-59287 | [cve-2025-59287-exploit-poc](https://github.com/dexterm300/cve-2025-59287-exploit-poc) | Exploitation proof-of-concept for CVE-2025-59287 - a critical vulnerability in the Windows Server Up... | Python | 0 | 2025-11-03 | | CVE-2024-48990 | [CVE-2024-48990](https://github.com/Mr-DJ/CVE-2024-48990) | PoC for CVE-2024-48990 | Shell | 1 | 2025-10-31 | | CVE-2025-31702 | [CVE-2025-31702](https://github.com/purpleghosts/CVE-2025-31702) | Repository with tools, exploits, and material associated with the analysis and discovery process of ... | N/A | 1 | 2025-11-20 | | CVE-2023-26360 | [CVE-2023-26360-RCE](https://github.com/H3rm1tR3b0rn/CVE-2023-26360-RCE) | Exploit for Remote Code Execution in ColdFusion 2021 (CVE-2023-26360) | Python | 1 | 2025-10-28 | | CVE-2024-56800 | [cve-2024-56800-poc](https://github.com/cyhe50/cve-2024-56800-poc) | N/A | TypeScript | 0 | 2025-10-24 | | CVE-2023-45612 | [cve-2023-45612_exploit](https://github.com/clemfavre/cve-2023-45612_exploit) | Reproduction of a high severty security problem that allows XXE (XML eXternal Entity) attacks on Kto... | Kotlin | 0 | 2025-10-22 | | CVE-2024-9348 | [CVE-2024-9348-poc](https://github.com/Nimisha17/CVE-2024-9348-poc) | N/A | N/A | 0 | 2025-10-21 | | CVE-2018-17240 | [Netgrave](https://github.com/Xewdy444/Netgrave) | A tool for retrieving login credentials from Netwave IP cameras using a memory dump vulnerability (C... | Python | 7 | 2026-02-20 | | CVE-2025-31258 | [CVE-2025-31258-PoC](https://github.com/BODE987/CVE-2025-31258-PoC) | 1day practice - Escape macOS sandbox (partial) using RemoteViewServices | Objective-C | 2 | 2025-10-19 | | CVE-2025-30208 | [CVE-2025-30208-EXP](https://github.com/Dany60-98/CVE-2025-30208-EXP) | 🛠️ Detect and exploit the Vite development server's arbitrary file read vulnerability (CVE-2025-3020... | Python | 0 | 2025-10-19 | | CVE-2025-5419 | [CVE-2025-5419](https://github.com/somprasong-tukman/CVE-2025-5419) | 🔍 Exploit CVE-2025-5419 to understand its impact and develop effective mitigation strategies for enh... | JavaScript | 0 | 2025-10-19 | | CVE-2023-30799 | [MikroTik-RouterOS-6.49.18-Exploit-Kit](https://github.com/alzeer711/MikroTik-RouterOS-6.49.18-Exploit-Kit) | 📋 ملخص مشروع MikroTik RouterOS 6.49.18 Exploit Kit 🎯 نظرة عامة تم إنشاء مشروع احترافي وشامل لاختراق ... | N/A | 0 | 2025-10-19 | | CVE-2022-30190 | [LetsDefend-SOC173-Follina-0-Day-Detected](https://github.com/Arkha-Corvus/LetsDefend-SOC173-Follina-0-Day-Detected) | We are presented with a security alert indicating the detection of the Follina (CVE-2022-30190) vuln... | N/A | 0 | 2025-10-18 | | CVE-2025-40634 | [CVE-2025-40634](https://github.com/hacefresko/CVE-2025-40634) | Exploit for stack-based buffer overflow found in the conn-indicator binary in the TP-Link Archer AX5... | Python | 28 | 2025-10-16 | | CVE-2024-31497 | [Onderzoek_CVE-2024-31497-POC](https://github.com/LukaWynants/Onderzoek_CVE-2024-31497-POC) | N/A | N/A | 0 | 2025-10-16 | | CVE-2025-10184 | [ColorOS-CVE-2025-10184](https://github.com/ENGWes/ColorOS-CVE-2025-10184) | 🔍 Identify and analyze the CVE-2025-10184 vulnerability in ColorOS, affecting SMS data access in OPP... | Java | 0 | 2025-10-15 | | CVE-2025-11171 | [CVE-2025-11171---GitHub-Security-Advisory](https://github.com/SnailSploit/CVE-2025-11171---GitHub-Security-Advisory) | CVE-2025-11171 | N/A | 0 | 2025-10-14 | | CVE-2025-53770 | [CVE-2025-53770](https://github.com/taqiaferdianshah/CVE-2025-53770) | 🔍 Explore Microsoft SharePoint CVE-2025-53770 with this proof of concept for educational use, emphas... | N/A | 0 | 2025-10-14 | | CVE-2024-36971 | [CVE-2024-36971](https://github.com/Kronk-imp/CVE-2024-36971) | Poc for CVE-2024-36971 | C | 0 | 2025-10-14 | | CVE-2024-27304 | [CVE-2024-27304-PoC](https://github.com/roaris/CVE-2024-27304-PoC) | PoC of "DEF CON 32 - SQL Injection Isn't Dead Smuggling Queries at the Protocol Level - Paul Gerste" | Go | 0 | 2025-10-12 | | CVE-2024-39309 | [POC_SQL_injection_in_Parse_Server_prior_6.5.7_-_7.1.0](https://github.com/HeavyGhost-le/POC_SQL_injection_in_Parse_Server_prior_6.5.7_-_7.1.0) | Advanced PostgreSQL database enumeration tool exploiting CVE-2024-39309 in Parse Server - Comprehens... | Python | 0 | 2025-10-07 | | CVE-2024-30088 | [cve-2024-30088-binary](https://github.com/ramzihafiz/cve-2024-30088-binary) | compiled poc binary | N/A | 0 | 2025-10-06 | | CVE-2024-38820 | [POC-CVE-2024-38820](https://github.com/kadamnayan/POC-CVE-2024-38820) | N/A | Java | 0 | 2025-10-06 | | CVE-2024-28157 | [PoC_CVE-2024-28157](https://github.com/shinigami-777/PoC_CVE-2024-28157) | Proof of Concept for CVE-2024-28157 | N/A | 0 | 2025-10-05 | | CVE-2024-7627 | [CVE-2024-7627](https://github.com/lkmn1/CVE-2024-7627) | POC CVE-2024-7627 | Python | 0 | 2025-10-04 | | CVE-2021-4034 | [pkexec-exploit-CVE](https://github.com/zaaraZiof0/pkexec-exploit-CVE) | This repository contains ZAARA's implementation of the exploit for CVE-2021-4034 (PwnKit), a local p... | Python | 0 | 2025-10-03 | | CVE-2025-2945 | [cve-2025-2945-poc](https://github.com/Cycloctane/cve-2025-2945-poc) | Python PoC script for pgAdmin4 Query Tool Authenticated RCE (CVE-2025-2945) | Python | 5 | 2025-12-01 | | CVE-2023-40289 | [CVE-2023-40289](https://github.com/s-hamann/CVE-2023-40289) | Exploit for CVE-2023-40289, a command injection vulnerability in several Baseband Management Control... | Python | 0 | 2025-09-29 | | CVE-2025-9999 | [ExploitScript](https://github.com/umxr286/ExploitScript) | Exploit Research & Mitigation for CVE-2025-9999 This repository documents the technical analysis of ... | N/A | 0 | 2025-09-27 | | CVE-2024-32002 | [cve-2024-32002-poc](https://github.com/JoaoLeonello/cve-2024-32002-poc) | N/A | Shell | 0 | 2025-09-25 | | CVE-2023-20048 | [cisco-rv-rce-poc](https://github.com/oguzhanozuzun301/cisco-rv-rce-poc) | PoC and exploit scripts for CVE-2023-20048 - Remote Code Execution vulnerability affecting Cisco RV ... | Python | 0 | 2025-09-22 | | CVE-2017-5638 | [Computer-Security-Equifax-2017](https://github.com/kaylertee/Computer-Security-Equifax-2017) | A hands-on simulation of CVE-2017-5638 (Apache Struts2 RCE), showcasing exploit reproduction, OS-lev... | Jupyter Notebook | 0 | 2025-09-19 | | CVE-2024-43630 | [CVE-2024-43630-POC](https://github.com/QuasarBinary/CVE-2024-43630-POC) | NtCopyFileChunk stack buffer overflow POC | C | 1 | 2025-09-18 | | CVE-2017-13156 | [threatDemos](https://github.com/nictjh/threatDemos) | Comprehensive Android security vulnerability demonstrations featuring CVE-2017-13156 (Janus), broadc... | JavaScript | 1 | 2025-09-17 | | CVE-2024-4701 | [CVE-2024-4701-POC](https://github.com/JinhyukKo/CVE-2024-4701-POC) | N/A | Python | 0 | 2025-09-17 | | CVE-2021-3493 | [UbuntuTouchSecurityVAPTReport](https://github.com/spideyctf/UbuntuTouchSecurityVAPTReport) | A penetration test of Ubuntu Touch 16.04 that identified 7 vulnerabilities, including a critical ker... | Shell | 0 | 2025-09-13 | | CVE-2018-15473 | [py-network-scanner](https://github.com/anonymous121029034720384234234/py-network-scanner) | Advanced network penetration testing toolkit with SSH vulnerability assessment, CVE-2018-15473 explo... | Python | 0 | 2025-09-11 | | CVE-2023-30990 | [CVE-2023-30990](https://github.com/silentsignal/CVE-2023-30990) | CVE-2023-30990 exploits | Python | 4 | 2025-09-08 | | CVE-2024-1086 | [CVE-2024-1086-Exploit](https://github.com/karim4353/CVE-2024-1086-Exploit) | Educational, non-functional Linux kernel exploit template for CVE-2024-1086 — lab-only security rese... | Java | 0 | 2025-09-04 | | CVE-2023-22515 | [CVE-2023-22515](https://github.com/kh4sh3i/CVE-2023-22515) | CVE-2023-22515 - Broken Access Control Vulnerability in Confluence Data Center and Server | Python | 4 | 2025-09-02 | | CVE-2024-48307 | [CVE-2024-48307POC](https://github.com/jisi-001/CVE-2024-48307POC) | jeecg-boot getDictItemsByTable接口存在SQL注入漏洞 | Python | 1 | 2025-09-02 | | CVE-2024-53677 | [CVE-2024-53677-POC](https://github.com/Cythonic1/CVE-2024-53677-POC) | a proof of concept of CVE-2024-53677 | Go | 0 | 2025-09-02 | | CVE-2024-47875 | [CVE-2024-47875-PhpSpreadsheet-XSS-PoC](https://github.com/roj1py/CVE-2024-47875-PhpSpreadsheet-XSS-PoC) | This is a PoC/Exploit for the CVE-2024-47875 PhpSpreadsheet XSS Vuln | Python | 0 | 2025-09-02 | | CVE-2024-25765 | [CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection](https://github.com/dennismendes10/CMD-Exploit-CVE-2024-RCE-AboRady-FUD-25765-Injection) 🔍 Exploit CVE-2024-25765 for RCE vulnerabilities with AboRady's FUD injection method, enhancing secu... | Visual Basic .NET | 0 | 2025-09-01 | | CVE-2023-45866 | [BlueDucky](https://github.com/Sergeb250/BlueDucky) | BlueDucky exploits a Bluetooth vulnerability, specifically CVE-2023-45866, which allows an attacker ... | Python | 1 | 2025-08-28 | | CVE-2024-5083 | [CVE-2024-5083](https://github.com/Roronoawjd/CVE-2024-5083) | Nexus Repository 2 SXSS POC | N/A | 0 | 2025-08-27 | | CVE-2021-42287 | [CVE-Scanner](https://github.com/Chrisync/CVE-Scanner) | CVE-2021-42287/CVE-2021-42278/OTHER Scanner & Exploiter. | N/A | 0 | 2026-02-21 | | CVE-2025-55188 | [CVE-2025-55188-7z-exploit](https://github.com/rhllsingh/CVE-2025-55188-7z-exploit) | 🛠️ Demonstrate CVE-2025-55188, a 7-Zip vulnerability allowing symlink attacks to overwrite files, hi... | Shell | 0 | 2025-08-25 | | CVE-2021-29447 | [Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets-](https://github.com/ArtemCyberLab/Project-Project-Chimera-Exploiting-a-Modern-WordPress-XXE-to-Pillage-Secrets-) | The objective is to conduct a full-scale security assessment of a WordPress-based web application, c... | N/A | 1 | 2025-08-23 | | CVE-2025-32463 | [CVE-2025-32463-PoC](https://github.com/FreeDurok/CVE-2025-32463-PoC) | Proof of Concept for CVE-2025-32463 Local privilege escalation exploit targeting sudo -R on vulnerab... | Shell | 5 | 2025-08-23 | | CVE-2024-37054 | [CVE-2024-37054-MLflow-RCE](https://github.com/NiteeshPujari/CVE-2024-37054-MLflow-RCE) | NiteeshPujari/CVE-2024-37054, This repository contains a Proof of Concept (PoC) a critical deseriali... | Python | 1 | 2025-08-22 | | CVE-2023-35078 | [CVE-2023-35078](https://github.com/0nsec/CVE-2023-35078) | CVE-2023-35078 - Ivanti MobileIron Core Remote Unauthenticated API Access Exploit tool | Python | 0 | 2025-08-21 | | CVE-2024-3721 | [CVE-2024-3721---POC](https://github.com/qalvynn/CVE-2024-3721---POC) | POC on how mirai can target " CVE-2024-3721 " { TBK DVR-4104 and DVR-4216 } | Go | 0 | 2025-08-21 | | CVE-2023-2598 | [CVE-2023-2598](https://github.com/SpongeBob-369/CVE-2023-2598) | The exploitation of CVE-2023-2598 about io_uring | C | 1 | 2025-08-20 | | CVE-2024-28397 | [CVE-2024-28397-command-execution-poc](https://github.com/waleed-hassan569/CVE-2024-28397-command-execution-poc) | This vulnerability arises from incomplete sandboxing in js2py, where crafted JavaScript can traverse... | JavaScript | 1 | 2025-08-17 | | CVE-2024-3660 | [CVE-2024-3660-PoC](https://github.com/aaryanbhujang/CVE-2024-3660-PoC) | A PoC for CVE-2024-3660. Arbitrary Code Execution in Keras. | Dockerfile | 0 | 2025-08-15 | | CVE-2024-47533 | [CVE-2024-47533-PoC](https://github.com/00xCanelo/CVE-2024-47533-PoC) | N/A | Python | 1 | 2025-08-13 | | CVE-2024-7591 | [CVE-2024-7591-PoC](https://github.com/butyraldehyde/CVE-2024-7591-PoC) | These PoC python scripts test the Kemp LoadMaster for remote code execution. | Python | 0 | 2025-08-12 | | CVE-2011-2523 | [CVE-2011-2523](https://github.com/BolivarJ/CVE-2011-2523) | Python exploit for vsftpd 2.3.4 - Backdoor Command Execution | Python | 1 | 2025-08-11 | | CVE-2023-32434 | [Trigon](https://github.com/alfiecg24/Trigon) | Deterministic kernel exploit based on CVE-2023-32434. | C | 104 | 2025-08-11 | | CVE-2024-0000 | [CVE-2024-0000-PoC](https://github.com/nullsquirtle/CVE-2024-0000-PoC) | PoC and Exploit monitoring and save every day. 🔥 Subscribe: @autoPoC | N/A | 0 | 2025-08-09 | | CVE-2017-9841 | [Argus](https://github.com/joelindra/Argus) | "Argus" is a security tool designed to scan a list of websites for a known vulnerability in the PHPU... | Python | 0 | 2025-08-08 | | CVE-2024-32019 | [CVE-2024-32019-POC](https://github.com/AzureADTrent/CVE-2024-32019-POC) | POC for netdata ndsudo vulnerability - CVE-2024-32019 | C | 4 | 2025-08-08 | | CVE-2025-30406 | [CVE-2025-30406](https://github.com/Gersonaze/CVE-2025-30406) | Explore the CVE-2025-30406 ViewState exploit PoC for ASP.NET applications. Test security with this s... | Python | 0 | 2025-08-07 | | CVE-2023-38831 | [Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution](https://github.com/Tolu12wani/Demonstration-of-CVE-2023-38831-via-Reverse-Shell-Execution) | This project demonstrates a simulated exploitation of the WinRAR vulnerability CVE-2023-38831 to exe... | N/A | 0 | 2025-08-03 | | CVE-2024-2771 | [CVE-2024-2771-PoC](https://github.com/whale93/CVE-2024-2771-PoC) | CVE-2024-2771 Proof-of-Concept | N/A | 0 | 2025-08-03 | | CVE-2024-2782 | [CVE-2024-2782-PoC](https://github.com/whale93/CVE-2024-2782-PoC) | CVE-2024-2782 Proof-of-Concept | N/A | 0 | 2025-08-03 | | CVE-2023-42931 | [CVE-2023-42931](https://github.com/tageniu/CVE-2023-42931) | The exploit targets a LPE works on macOS 14.0-14.1.2, 13.0-13.6.2, 12.0-12.7.1 | Shell | 2 | 2025-07-31 | | CVE-2023-22809 | [CVE-2023-22809-automated-python-exploits](https://github.com/spidoman/CVE-2023-22809-automated-python-exploits) | automatically exploit the sudoedit vulnerability fo CVE-2023-22809 | Python | 0 | 2025-07-30 | | CVE-2023-51385 | [CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC](https://github.com/saarcastified/CVE-2023-51385---OpenSSH-ProxyCommand-Injection-PoC) | This repository contains a proof-of-concept (PoC) for exploiting the OpenSSH ProxyCommand vulnerabil... | N/A | 0 | 2025-07-29 | | CVE-2025-32429 | [CVE-2025-32429](https://github.com/amir-othman/CVE-2025-32429) | Proof-of-Concept exploit for CVE-2025-32429 (SQL Injection in PHP PDO prepared statements) – for edu... | C | 0 | 2025-07-26 | | CVE-2023-2640 | [phpMyAdmin-RCE-Exploit-Lab](https://github.com/filippo-zullo98/phpMyAdmin-RCE-Exploit-Lab) | Dimostrazione di una vulnerabilità RCE (Remote Code Execution) in phpMyAdmin 4.8.1, con exploit per ... | Shell | 0 | 2025-07-24 | | CVE-2024-6485 | [Bootstrap-with-XSS](https://github.com/Yumeae/Bootstrap-with-XSS) | A poc for Bootstrap XSS(CVE-2024-6485、CVE-2016-10735、CVE-2019-8331、CVE-2018-14040) | HTML | 1 | 2025-07-24 | | CVE-2024-4947 | [CVE-2024-4947](https://github.com/DiabloX90911/CVE-2024-4947) | Explore CVE-2024-4947, a V8 type confusion bug, with analysis and PoCs. Join the discussion on GitHu... | JavaScript | 0 | 2025-07-23 | | CVE-2019-7139 | [Magento-CVE-2019-7139-SQLi-PoC](https://github.com/adhammedhat111/Magento-CVE-2019-7139-SQLi-PoC) | Proof-of-Concept (PoC) exploit for CVE-2019-7139, an unauthenticated SQL injection vulnerability in ... | Python | 2 | 2025-07-22 | | CVE-2023-7028 | [CVE-2023-7028](https://github.com/szybnev/CVE-2023-7028) | This FORK of repository presents a proof-of-concept of CVE-2023-7028. I am only improve exploit usag... | Python | 0 | 2025-07-21 | | CVE-2024-8118 | [POC-CVE-2024-8118](https://github.com/nurarifin05/POC-CVE-2024-8118) | Berikut untuk POC grafana CVE-2024-8118 | Python | 0 | 2025-07-21 | | CVE-2024-47575 | [CVE-2024-47575](https://github.com/AnnnNix/CVE-2024-47575) | PoC for CVE-2024-47575 | Shell | 0 | 2025-07-19 | | CVE-2023-44487 | [CVE-2023-44487](https://github.com/moften/CVE-2023-44487) | HTTP/2 Rapid Reset Exploit PoC | Python | 0 | 2025-07-14 | | CVE-2024-9264 | [CVE-2024-9264](https://github.com/rvizx/CVE-2024-9264) | Authenticated RCE in Grafana (v11.0) via SQL Expressions - PoC Exploit | Shell | 2 | 2025-07-11 | | CVE-2024-42008 | [Roundcube-CVE-2024-42008-POC](https://github.com/rpgsec/Roundcube-CVE-2024-42008-POC) | N/A | Python | 0 | 2025-07-09 | | CVE-2024-31964 | [CVE-2024-31964](https://github.com/d-Raco/CVE-2024-31964) | CVE-2024-31964 PoC: Mitel 6900w Series SIP Phone - Temporary Authentication Bypass | N/A | 0 | 2025-07-07 | | CVE-2024-55963 | [CVE-2024-55963](https://github.com/superswan/CVE-2024-55963) | CVE-2024-55963, allows unauthenticated remote code execution on Appsmith Enterprise platform due to ... | Python | 0 | 2025-07-06 | | CVE-2024-48061 | [CVE-2024-48061](https://github.com/BwithE/CVE-2024-48061) | CVE-2024-48061 - poc | Python | 0 | 2025-07-05 | | CVE-2024-4040 | [CrushFTP-CVE-2024-4040-illdeed](https://github.com/ill-deed/CrushFTP-CVE-2024-4040-illdeed) | Exploit for CVE-2024-4040 – Authentication bypass in CrushFTP via CrushAuth cookie and AWS-style hea... | Python | 0 | 2025-07-04 | | CVE-2024-40898 | [CVE-2024-40898-SSL-Bypass-Detection](https://github.com/ForceEA001/CVE-2024-40898-SSL-Bypass-Detection) | This Python script is a Proof-of-Concept (PoC) scanner for detecting the vulnerability CVE-2024-4089... | Python | 1 | 2025-07-02 | | CVE-2024-8636 | [Chrome-Skia-CVE-2024-8636](https://github.com/HyHy100/Chrome-Skia-CVE-2024-8636) | PoC for a Chrome integer overflow -> OOB write vulnerability I reported to Google in Skia. | Python | 0 | 2025-07-02 | | CVE-2024-7966 | [Chrome-Skia-CVE-2024-7966](https://github.com/HyHy100/Chrome-Skia-CVE-2024-7966) | PoC for a Chrome SKSL bypass + integer overflow -> OOB write vulnerability I reported to Google in S... | Python | 0 | 2025-07-02 | | CVE-2024-8198 | [Chrome-Skia-CVE-2024-8198](https://github.com/HyHy100/Chrome-Skia-CVE-2024-8198) | PoC for a Chrome integer overflow -> OOB write vulnerability I reported to Google in Skia. | Python | 0 | 5-07-02 | | CVE-2024-8193 | [Chrome-Skia-CVE-2024-8193](https://github.com/HyHy100/Chrome-Skia-CVE-2024-8193) | PoC for a Chrome integer overflow -> OOB write vulnerability I reported to Google in Skia. | Python | 0 | 2025-07-02 | | CVE-2024-39930 | [CVE-2024-39930-PoC](https://github.com/theMcSam/CVE-2024-39930-PoC) | Exploit Code for CVE-2024-39930 gogs ssh server RCE | Python | 0 | 2025-07-01 | | CVE-2024-54085 | [CVE-2024-54085](https://github.com/Mr-Zapi/CVE-2024-54085) | Just poc for CVE 2024-54085 | Python | 0 | 2025-06-29 | | CVE-2024-43425 | [CVE-2024-43425-Poc](https://github.com/aninfosec/CVE-2024-43425-Poc) | N/A | Python | 0 | 2025-06-28 | | CVE-2024-4367 | [cve-2024-4367-poc](https://github.com/pS3ud0RAnD0m/cve-2024-4367-poc) | POC for PDF JS' CVE-2024-4367 vuln | Python | 1 | 2025-06-28 | | CVE-2023-5180 | [HeimShell](https://github.com/superswan/HeimShell) | CVE-2023-5180 LinuxServer.io Heimdall before 2.5.7 does not prevent use of icons that have non-image... | Python | 0 | 2025-06-26 | | CVE-2024-38819 | [CVE-2024-38819-POC2](https://github.com/vishalnoza/CVE-2024-38819-POC2) | N/A | Java | 1 | 2025-06-25 | | CVE-2024-43917 | [CVE-2024-43917](https://github.com/sug4r-wr41th/CVE-2024-43917) | TI WooCommerce Wishlist (WordPress plugin) <= 2.8.2 CVE-2024-43917 PoC | Python | 0 | 2025-06-25 | | CVE-2025-12654 | [Anydesk-Exploit-CVE-2025-12654-RCE-Builder](https://github.com/Taowmz/Anydesk-Exploit-CVE-2025-12654-RCE-Builder) | Exploit development targets vulnerabilities using tools like exploitation frameworks. CVE databases ... | Visual Basic .NET | 0 | 2025-06-22 | | CVE-2023-33538 | [CVE-2023-33538](https://github.com/explxx/CVE-2023-33538) | Python Exploit for TP-Link TL-WR940N/TL-WR841N Command Injection Vulnerability | Python | 0 | 2025-06-22 | | CVE-2023-3244 | [POC-CVE-2023-3244](https://github.com/drnull03/POC-CVE-2023-3244) | This is a Proof of Concept (PoC) for CVE-2023-3244, a vulnerability in comment-like-dislike. The PoC... | Python | 2 | 2025-06-21 | | CVE-2024-9796 | [CVE-2024-9796](https://github.com/BwithE/CVE-2024-9796) | CVE-2024-9796 poc | Python | 0 | 2025-06-20 | | CVE-2017-0143 | [offensive-security-lab-1](https://github.com/Mafiosohack/offensive-security-lab-1) | A hands-on vulnerability assessment and exploitation of a Windows 7 VM using the EternalBlue (CVE-20... | N/A | 0 | 2025-06-17 | | CVE-2023-1698 | [CVE-2023-1698](https://github.com/ibrahmsql/CVE-2023-1698) | CVE-2023-1698 exploit with golang | Go | 1 | 2025-06-16 | | CVE-2024-22371 | [POC_for_-CVE-2024-22371](https://github.com/vishalborkar7/POC_for_-CVE-2024-22371) | N/A | Java | 0 | 2025-06-10 | | CVE-2024-50379 | [CVE-2024-50379-POC](https://github.com/Yuri08loveElaina/CVE-2024-50379-POC) | Cve exploiting | Python | 0 | 2025-06-14 | | CVE-2022-44268 | [Automate_Exploit_CVE-2022-44268](https://github.com/J0ey17/Automate_Exploit_CVE-2022-44268) | An exploit automation script that builds upon the work of Voidzone security. | Python | 0 | 2025-06-04 | | CVE-2025-34028 | [CVE-2025-34028-PoC-Commvault-RCE](https://github.com/Mattb709/CVE-2025-34028-PoC-Commvault-RCE) | Proof-of-Concept (PoC) for CVE-2025-34028, a Remote Code Execution vulnerability in Commvault Comman... | Python | 1 | 2025-05-09 | | CVE-2019-15107 | [CVE-2019-15107-Webmin-RCE-PoC](https://github.com/Mattb709/CVE-2019-15107-Webmin-RCE-PoC) | A Python proof-of-concept exploit for CVE-2019-15107 - an unauthenticated remote code execution vuln... | Python | 1 | 2025-05-13 | | CVE-2024-55591 | [CVE-2024-55591-POC](https://github.com/exfil0/CVE-2024-55591-POC) | A comprehensive all-in-one Python-based Proof of Concept script to discover and exploit a critical a... | Python | 12 | 2025-05-26 | | CVE-2023-25690 | [CVE-2023-25690-POC](https://github.com/oOCyginXOo/CVE-2023-25690-POC) | CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions ... | Dockerfile | 0 | 2025-06-01 | | CVE-2023-27163 | [Exploit_CVE-2023-27163](https://github.com/J0ey17/Exploit_CVE-2023-27163) | Proof of Concept exploit for Server Side Request Forgery vulnerability in Requests Basket v1.2.1 and... | Python | 0 | 2025-06-03 | | CVE-2025-32756 | [CVE-2025-32756-POC](https://github.com/kn0x0x/CVE-2025-32756-POC) | Proof of Concept for CVE-2025-32756 - A critical stack-based buffer overflow vulnerability affecting... | Python | 18 | 2025-06-08 | | CVE-2021-30862 | [CVE-2021-30862](https://github.com/3h6-1/CVE-2021-30862) | Write-up and proof of concepts for my vulnerability CVE-2021-30862, 1-click RCE in iOS iTunes U | JavaScript | 1 | 2025-06-07 | | CVE-2023-6199 | [php_filter_chain_oracle_poc](https://github.com/4xura/php_filter_chain_oracle_poc) | PoC scripts to exploit LFR (Local File Read) via PHP filters chain oracle (php://filter), especially... | Python | 2 | 2025-03-31 | | CVE-2023-4911 | [CVE-2023-4911-Exploit](https://github.com/shacojx/CVE-2023-4911-Exploit) | CVE-2023-4911 exploit | Java | 1 | 2025-04-02 | | CVE-2023-30258 | [CVE-2023-30258-magnus-billing-v7-exploit](https://github.com/tinashelorenzi/CVE-2023-30258-magnus-billing-v7-exploit) | N/A | Python | 4 | 2025-05-17 | | CVE-2023-21173 | [MultiExploit](https://github.com/vesu-nights/MultiExploit) | CVE-2023-21173 Exploit - Remote Code Execution in SQL Server 2022 | Python | 0 | 2025-03-18 | | CVE-2023-41991 | [appsign](https://github.com/dmytrozykov/appsign) | iOS/macOS library that exploits CVE-2023-41991 for signing iOS applications. | C | 0 | 2025-05-18 | | CVE-2023-0830 | [CVE-2023-0830](https://github.com/xbz0n/CVE-2023-0830) | Exploit for EasyNAS version 1.1.0. The vulnerability exploited is a command injection flaw, which re... | Python | 1 | 2025-03-20 | | CVE-2023-45878 | [CVE-2023-45878](https://github.com/nrazv/CVE-2023-45878) | CVE-2023-45878 easy exploit | revers sehell | Go | 0 | 2025-03-26 | | CVE-2023-29357 | [SOC227-Microsoft-SharePoint-Server-Elevation-of-Privilege-Possible-CVE-2023-29357-Exploitation](https://github.com/DeividasTerechovas/SOC227-Microsoft-SharePoint-Server-Elevation-of-Privilege-Possible-CVE-2023-29357-Exploitation) | N/A | N/A | 0 | 2025-04-01 | | CVE-2023-46988 | [OnlyOffice-path-traversal](https://github.com/mihat2/OnlyOffice-path-traversal) | CVE-2023-46988: ONLYOFFICE Path Traversal Exploit | Python | 0 | 2025-04-03 | | CVE-2023-20198 | [Cisco-IOS-XE-CVE-2023-20198](https://github.com/G4sul1n/Cisco-IOS-XE-CVE-2023-20198) | Exploit PoC for CVE-2023-20198 | Python | 2 | 2025-05-17 | | CVE-2023-46818 | [CVE-2023-46818-Exploit](https://github.com/blindma1den/CVE-2023-46818-Exploit) | This is my own exploit for CVE-2023-46818 happy hacking! | Python | 6 | 2025-05-18 | | CVE-2023-27997 | [fgt-cve-2023-27997-exploit](https://github.com/onurkerembozkurt/fgt-cve-2023-27997-exploit) | FortiGate SSL-VPN CVE-2023-27997 Exploit PoC Script with ROP Chain | Python | 0 | 2025-04-18 | | CVE-2023-34839 | [CVE-2023-34839](https://github.com/sahiloj/CVE-2023-34839) | CVE-2023-34839 | Issabel PBX v.4.0.0-6 | CSRF vulnerability allows privilege gain via custom exploit... | HTML | 4 | 2025-04-25 | | CVE-2023-1389 | [CVE2023-1389](https://github.com/ibrahimsql/CVE2023-1389) | TP-Link Archer AX21 Command Injection Exploit (CVE-2023-1389) This script exploits a command inject... | Python | 2 | 2025-06-07 | | CVE-2022-42092 | [CVE-2022-42092](https://github.com/ajdumanhug/CVE-2022-42092) | CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Authenticated Remote Command Execution (RC... | Python | 2 | 2025-05-13 | | CVE-2023-27372 | [spip-cve-2023-27372-rce](https://github.com/1Ronkkeli/spip-cve-2023-27372-rce) | SPIP CVE-2023-27372 Unauthenticated RCE Exploit (Web Shell Upload) | Python | 2 | 2025-05-04 | | CVE-2023-22518 | [analyze-Exploit-CVE-2023-22518-Confluence](https://github.com/ductink98lhp/analyze-Exploit-CVE-2023-22518-Confluence) | N/A | N/A | 1 | 2025-05-05 | | CVE-2025-29927 | [x-middleware-exploit](https://github.com/EarthAngel666/x-middleware-exploit) | x-middleware exploit for next.js CVE-2023–46298 cache poisoning and CVE-2025-29927 bypass | Python | 0 | 2025-05-08 | | CVE-2023-4504 | [CUPS-Exploit](https://github.com/djjohnson565/CUPS-Exploit) | Heap-based buffer overflow example based on CVE-2023-4504 | C | 3 | 2025-05-09 | | CVE-2023-28293 | [CVE-2023-28293](https://github.com/HexilionLabs/CVE-2023-28293) | Exploit for CVE-2023-28293 | C++ | 1 | 2025-05-29 | | CVE-2023-36802 | [CVE-2023-36802](https://github.com/ISH2YU/CVE-2023-36802) | Procedure to Recreate the Exploit for CVE-2023-36802 targeting MSKSSRV.SYS driver | C | 2 | 2025-06-08 | | CVE-2023-42442 | [blackjump](https://github.com/tarihub/blackjump) | JumpServer 堡垒机未授权综合漏洞利用, Exploit for CVE-2023-42442 / CVE-2023-42820 / RCE 2021 | Python | 247 | 2025-06-07 | | CVE-2024-12905 | [CVE-2024-12905-PoC](https://github.com/theMcSam/CVE-2024-12905-PoC) | tar-fs file write/overwrite vulnerability | Python | 1 | 2025-04-25 | | CVE-2024-32830 | [CVE-2024-32830-poc](https://github.com/ptrstr/CVE-2024-32830-poc) | PoC code to download files with CVE-2024-32830 | Python | 0 | 2025-04-25 | | CVE2024-4577 | [CVE-2024-4577-PHP-RCE](https://github.com/ZephrFish/CVE-2024-4577-PHP-RCE) | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and a nuclei template | Go | 26 | 2025-04-26 | | CVE-2024-36401 | [CVE-2024-36401_Geoserver_RCE_POC](https://github.com/amoy6228/CVE-2024-36401_Geoserver_RCE_POC) | 本脚本是针对 GeoServer 的远程代码执行漏洞(CVE-2024-36401)开发的 PoC(Proof of Concept)探测工具。该漏洞允许攻击者通过构造特定请求,在目标服务器上执行任意... | Python | 1 | 2025-05-07 | | CVE-2024-23897 | [CVE-2024-23897](https://github.com/Maalfer/CVE-2024-23897) | Poc para explotar la vulnerabilidad CVE-2024-23897 en versiones 2.441 y anteriores de Jenkins, media... | Python | 9 | 2025-05-19 | | CVE-2024-40635 | [CVE-2024-40635_POC](https://github.com/yen5004/CVE-2024-40635_POC) | Proof of Concept code for proving CVE-2024-40635 vulnerability | Python | 0 | 2025-04-30 | | CVE-2024-31317 | [CVE-2024-31317-PoC-Deployer](https://github.com/WebLDix/CVE-2024-31317-PoC-Deployer) | N/A | Shell | 6 | 2025-06-07 | | CVE-2024-2961 | [CVE-2024-2961-Remote-File-Read](https://github.com/kyotozx/CVE-2024-2961-Remote-File-Read) | This script demonstrates a proof-of-concept (PoC) for exploiting a file read vulnerability in the ic... | Python | 5 | 2025-06-05 | | CVE-2024-21532 | [CVE-2024-21532-PoC-ggit](https://github.com/lirantal/CVE-2024-21532-PoC-ggit) | CVE-2024-21532 PoC ggit | N/A | 0 | 2025-05-10 | | CVE-2024-21533 | [CVE-2024-21533-PoC-ggit](https://github.com/lirantal/CVE-2024-21533-PoC-ggit) | CVE-2024-21533 PoC ggit | N/A | 0 | 2025-05-10 | | CVE-2024-44258 | [POC-CVE-2024-44258-Py](https://github.com/missaels235/POC-CVE-2024-44258-Py) | N/A | Python | 0 | 2025-05-18 | | CVE-2024-41713 | [CVE-2024-41713-PoC-exploit](https://github.com/gunyakit/CVE-2024-41713-PoC-exploit) | Mitel MiCollab Authentication Bypass to Arbitrary File Read | Shell | 0 | 2025-05-18 | | CVE-2024-35205 | [Dirty_Stream-Android-POC](https://github.com/cyb3r-w0lf/Dirty_Stream-Android-POC) | Android - Dirty Stream exploit for MI-File Explorer V1-210567 version. CVE-2024-35205 | Java | 10 | 2025-06-05 | | CVE-2024-21762 | [CVE-2024-21762_FortiNet_PoC](https://github.com/abrewer251/CVE-2024-21762_FortiNet_PoC) | Proof-of-concept scanner targeting CVE-2024-21762 in FortiOS SSL VPN’s /remote/hostcheck_validate en... | Python | 0 | 2025-05-22 | | CVE-2024-21626 | [CVE-2024-21626](https://github.com/KubernetesBachelor/CVE-2024-21626) | POC | N/A | 2 | 2025-05-27 | | CVE-2024-42009 | [CVE-2024-42009-PoC](https://github.com/DaniTheHack3r/CVE-2024-42009-PoC) | CVE-2024-42009 Proof of Concept | Python | 2 | 2025-05-30 | | CVE-2024-7399 | [CVE-2024-7399-POC](https://github.com/davidxbors/CVE-2024-7399-POC) | N/A | Python | 0 | 2025-05-30 | | CVE-2024-45870 | [bandiview-7.05-vuln-PoC](https://github.com/bshyuunn/bandiview-7.05-vuln-PoC) | bandiview (7.05) vuln PoC | CVE-2024-45870, CVE-2024-45871, CVE-2024-45872 | N/A | 0 | 2025-06-01 | | CVE-2024-39924 | [PoC-CVE-2024-39924](https://github.com/l4rm4nd/PoC-CVE-2024-39924) | PoC for CVE-2024-39924 | Dockerfile | 1 | 2025-06-06 | | CVE-2024-28784 | [CVE-2024-28784](https://github.com/CainSoulless/CVE-2024-28784) | Technical disclosure for CVE-2024-28784 — a stored XSS vulnerability in IBM QRadar SIEM 7.5.0 Update... | N/A | 0 | 2025-06-02 | | CVE-2024-53703 | [cve-2024-53703-poc](https://github.com/scrt/cve-2024-53703-poc) | POC for exploiting CVE-2024-53703, a stack-based buffer overflow in SonicWall SMA mod_httprp.so | Python | 0 | 2025-06-05 | | CVE-2024-21413 | [CVE-2024-21413](https://github.com/ThemeHackers/CVE-2024-21413) | CVE-2024-21413 | Microsoft Outlook Remote Code Execution Vulnerability PoC | Python | 13 | 2025-06-05 | | CVE-2024-21006 | [CVE-2024-21006_POC](https://github.com/d3fudd/CVE-2024-21006_POC) | N/A | Java | 0 | 2025-06-07 | | CVE-2024-43535 | [KTM_POCS](https://github.com/jayesther/KTM_POCS) | Reports and POCs for CVE 2024-43570 and CVE-2024-43535 | C | 3 | 2025-06-08 | | CVE-2024-51482 | [CVE-2024-51482](https://github.com/BwithE/CVE-2024-51482) | CVE-2024-51482 poc | Python | 0 | 2025-06-08 | | CVE-2024-40453 | [CVE-2024-40453](
标签:CISA项目, Cobalt Strike, GitHub安全, PE 加载器, POC收集, POC验证, RCE, Red Teaming, Web报告查看器, XXE攻击, 域名收集, 威胁情报, 开发者工具, 恶意样本开发, 攻击诱捕, 权限绕过, 浏览器漏洞利用框架, 消息认证码, 漏洞分析, 漏洞库, 白帽工具, 编程工具, 网络安全, 自动化收集, 误配置预防, 路径探测, 路径遍历, 远程代码执行, 逆向工具, 防御加固, 隐私保护