106 Open Source Cve Software Projects
Free and open source cve code projects including engines, APIs, generators, and tools.
Penetration_testing_poc 2238 ⭐
渗透测试有关的POC、EXP、脚本、提权、小工具等，欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Sudo_killer 829 ⭐
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo
Hardware And Firmware Security Guidance 354 ⭐
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
Cve 2019 1003000 Jenkins Rce Poc 267 ⭐
Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)
Threatpinchlookup 245 ⭐
Documentation and Sharing Repository for ThreatPinch Lookup Chrome & Firefox Extension
Sbt Dependency Check 176 ⭐
SBT Plugin for OWASP DependencyCheck. Monitor your dependencies and report if there are any publicly known vulnerabilities (e.g. CVEs). :rainbow:
Cve Bin Tool 156 ⭐
This tool scans for a number of common, vulnerable components (openssl, libpng, libxml2, expat and a few others) to let you know if your system includes common libraries with known vulnerabilities.
Linuxflaw 130 ⭐
This repo records all the vulnerabilities of linux software I have reproduced in my local workspace
Dirtycow 87 ⭐
radare2 IO plugin for Linux and Android. Modifies files owned by other users via dirtycow Copy-On-Write cache vulnerability
Pwn Pulse 93 ⭐
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Csirt 89 ⭐
CSIRT is an awesome curated list of links and resources in security and csirt daily activities.
Vulnerability Data Archive 62 ⭐
With the hope that someone finds the data useful, we periodically publish an archive of almost all of the non-sensitive vulnerability information in our vulnerability reports database. See also https://github.com/CERTCC/Vulnerability-Data-Archive-Tools
Igpu Leak 55 ⭐
[CVE-2019-14615] iGPU Leak: An Information Leakage Vulnerability on Intel Integrated GPU
Fkie Cad Iva 42 ⭐
IVA is a system to scan for known vulnerabilities in software products installed inside an organization. IVA uses CPE identifiers to search for CVEs related to a software product.
Detect Cve 2017 15361 Tpm 32 ⭐
Detects Windows and Linux systems with enabled Trusted Platform Modules (TPM) vulnerable to CVE-2017-15361. #nsacyber
Cve Stockpile 31 ⭐
Master list of all my vulnerability discoveries. Mostly 3rd party kernel drivers.
Dep Scan 31 ⭐
Fully open-source security audit for project dependencies based on known vulnerabilities and advisories. Integrates with various CI environments such as Azure Pipelines, CircleCI, Google CloudBuild. No server required!
Pyvfeed 24 ⭐
Python API for vFeed Vulnerability & Threat Intelligence Database Enterprise & Pro Editions
Cve 2020 12112 15 ⭐
BigBlueButton versions lower than 2.2.4 have a LFI vulnerability allowing access to sensitive files. 🚨
Cve 2018 19131 13 ⭐
Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate
Cve 2019 10149 12 ⭐
CVE-2019-10149 : A flaw was found in Exim versions 4.87 to 4.91 (inclusive). Improper validation of recipient address in deliver_message() function in /src/deliver.c may lead to remote command execution.
Sysechk 11 ⭐
System Security Checker is a bundle of small shell scripts to assess your computer security.
Cve 2020 9375 10 ⭐
TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.