194 Open Source Cve Software Projects
Free and open source cve code projects including engines, APIs, generators, and tools.
Penetration_testing_poc 3916 ⭐
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Sudo_killer 1419 ⭐
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Hellraiser 471 ⭐
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Hardware And Firmware Security Guidance 496 ⭐
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Cve 2019 1003000 Jenkins Rce Poc 289 ⭐
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Threatpinchlookup 278 ⭐
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Sbt Dependency Check 215 ⭐
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:
Cve Bin Tool 343 ⭐
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
Linuxflaw 234 ⭐
This repo records all the vulnerabilities of linux software I have reproduced in my local workspace
Dirtycow 93 ⭐
radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Pwn Pulse 123 ⭐
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Csirt 218 ⭐
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
Vulnerability Data Archive 70 ⭐
With the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Igpu Leak 55 ⭐
[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU
Fkie Cad Iva 56 ⭐
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Detect Cve 2017 15361 Tpm 34 ⭐
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
Cve Stockpile 41 ⭐
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Dep Scan 163 ⭐
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Supports both local repos and container images. Integrates with various CI environments such as Azure Pipelines, CircleCI, Google CloudBuild. No server required!
Pyvfeed 48 ⭐
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Bitthebyte Eagle 84 ⭐
Multithreaded Plugin based vulnerability scanner for mass detection of web-based applications vulnerabilities
Cve 2020 12112 14 ⭐
BigBlueButton versions lower than 2.2.4 have a LFI vulnerability allowing access to sensitive files. 🚨
Vulnerability Db 24 ⭐
Vulnerability database and package search for sources such as OSV, NVD, GitHub and npm.
Cve 2018 19131 15 ⭐
Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate
Cve 2019 10149 15 ⭐
CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Sysechk 13 ⭐
System Security Checker is a bundle of small shell scripts to assess your computer security.
Cve 2020 9375 15 ⭐
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.
Kernelhub 1656 ⭐
:palm_tree:Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (Windows提权漏洞合集)