all Top Top Top_Codeql TOP All bugbounty pentesting CVE-2022- POC Exp Things
- 2026 year top total 30
- 2025 year top total 30
- 2024 year top total 30
- 2023 year top total 30
- 2022 year top total 30
| star | updated_at | name | url | des |
|---|---|---|---|---|
| 256 | 2026-04-12T13:32:58Z | CVE-2026-21858 | https://github.com/Chocapikk/CVE-2026-21858 | n8n Ni8mare - Unauthenticated Arbitrary File Read to RCE Chain (CVSS 10.0) |
| 201 | 2026-03-30T23:41:42Z | CVE-2026-24061 | https://github.com/SafeBreach-Labs/CVE-2026-24061 | Exploitation of CVE-2026-24061 |
| 104 | 2026-04-10T10:13:18Z | CVE-2026-20817 | https://github.com/oxfemale/CVE-2026-20817 | Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. |
| 136 | 2026-04-08T22:52:47Z | CVE-2026-20841-PoC | https://github.com/BTtea/CVE-2026-20841-PoC | PoC |
| 122 | 2026-04-10T23:08:16Z | CVE-2026-2441-PoC | https://github.com/huseyinstif/CVE-2026-2441-PoC | |
| 8 | 2026-02-13T09:41:35Z | Ashwesker-CVE-2026-21509 | https://github.com/kimstars/Ashwesker-CVE-2026-21509 | CVE-2026-21509 |
| 64 | 2026-04-03T06:12:07Z | CVE-2026-24061-POC | https://github.com/JayGLXR/CVE-2026-24061-POC | |
| 26 | 2026-04-09T13:59:05Z | cve-2026-32746 | https://github.com/jeffaf/cve-2026-32746 | CVE-2026-32746 - GNU InetUtils telnetd LINEMODE SLC Buffer Overflow PoC (pre-auth RCE, CVSS 9.8) |
| 26 | 2026-04-10T03:24:57Z | CVE-2026-21508_POC | https://github.com/0xc4r/CVE-2026-21508_POC | |
| 39 | 2026-04-13T01:42:50Z | CVE-2026-25769 | https://github.com/hakaioffsec/CVE-2026-25769 | Remote Code Execution via Insecure Deserialization in Wazuh Cluster |
| 29 | 2026-04-06T03:00:07Z | CVE-2026-1731 | https://github.com/win3zz/CVE-2026-1731 | CVE-2026-1731 - Critical command injection vulnerability in BeyondTrust Remote Support and Privileged Remote Access due to unsafe Bash arithmetic evaluation in a WebSocket-reachable script |
| 21 | 2026-04-11T02:02:51Z | CVE-2026-21852-PoC | https://github.com/atiilla/CVE-2026-21852-PoC | |
| 91 | 2026-03-24T23:27:18Z | moltbot-1click-rce | https://github.com/ethiack/moltbot-1click-rce | Clawdbot/Moltbot/OpenClaw One-click RCE PoC 🦞 (CVE-2026-25253) |
| 16 | 2026-04-03T18:03:31Z | CVE-2026-21509-PoC | https://github.com/gavz/CVE-2026-21509-PoC | Educational PoC for CVE‑2026‑21509 (Microsoft Office security feature bypass). Generates a harmless DOCX with dummy OLE artifacts to study EDR/AV visibility. Not an exploit. For isolated labs only; see README for 7‑Zip inspection steps and mitigation references. |
| 33 | 2026-04-11T09:52:05Z | CVE-2026-22812-exploit | https://github.com/rohmatariow/CVE-2026-22812-exploit | |
| 14 | 2026-04-06T11:00:16Z | CVE-2026-21643 | https://github.com/0xBlackash/CVE-2026-21643 | CVE-2026-21643 |
| 44 | 2026-04-02T01:33:54Z | STProcessMonitorBYOVD | https://github.com/ANYLNK/STProcessMonitorBYOVD | The PoC for CVE-2025-70795 / CVE-2026-0828 and updated driver |
| 31 | 2026-03-23T05:02:53Z | CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE | https://github.com/zerozenxlabs/CVE-2026-20127---Cisco-SD-WAN-Preauth-RCE | |
| 50 | 2026-04-07T08:08:18Z | CVE-2026-20637-AppleSEPKeyStore-UAF | https://github.com/zeroxjf/CVE-2026-20637-AppleSEPKeyStore-UAF | CVE-2026-20637: AppleSEPKeyStore Use-After-Free — iOS/macOS kernel vulnerability (patched in 26.4) |
| 5 | 2026-04-13T03:43:04Z | Ashwesker-CVE-2026-21962 | https://github.com/boroeurnprach/Ashwesker-CVE-2026-21962 | CVE-2026-21962 |
| 11 | 2026-04-13T18:34:48Z | CVE-2026-5201 | https://github.com/kagancapar/CVE-2026-5201 | CVE-2026-5201: Heap-based buffer overflow in gdk-pixbuf JPEG loader (CWE-122, CVSS 7.5) |
| 21 | 2026-02-04T11:24:56Z | CVE-2026-23745 | https://github.com/Jvr2022/CVE-2026-23745 | Proof of Concept for CVE-2026-23745: Arbitrary File Overwrite vulnerability in node-tar (versions < 7.5.3). |
| 23 | 2026-04-13T14:49:31Z | CVE-2026-XNU-AIO-KEVENT-UAF | https://github.com/crazymind90/CVE-2026-XNU-AIO-KEVENT-UAF | XNU AIO kevent use-after-free — kernel panic from app sandbox on iOS 26.2 (no entitlements). Patched in iOS 26.3 |
| 12 | 2026-03-19T17:10:53Z | POC-CVE-2026-1357 | https://github.com/LucasM0ntes/POC-CVE-2026-1357 | POC-CVE-2026-1357 |
| 0 | 2026-01-07T05:29:02Z | Ashwesker-CVE-2026-21440 | https://github.com/redpack-kr/Ashwesker-CVE-2026-21440 | CVE-2026-21440 |
| 7 | 2026-03-30T23:42:24Z | CVE-2026-24061 | https://github.com/Chocapikk/CVE-2026-24061 | |
| 4 | 2026-04-11T10:08:04Z | CVE-2026-24061-POC | https://github.com/0p5cur/CVE-2026-24061-POC | CVE-2026-24061's poc : a critical authentication bypass in telnetd leading to RCE as root Affects systems with telnetd versions containing the vulnerability from 2015 onwards. |
| 7 | 2026-04-04T03:05:59Z | CVE-2026-24061 | https://github.com/TryA9ain/CVE-2026-24061 | CVE-2026-24061 Batch Scanning Tool |
| 6 | 2026-03-23T08:30:54Z | Ashwesker-CVE-2026-20045 | https://github.com/dkstar11q/Ashwesker-CVE-2026-20045 | CVE-2026-20045 |
| 10 | 2026-03-07T19:11:38Z | CVE-2026-1357 | https://github.com/halilkirazkaya/CVE-2026-1357 | CVE-2026-1357 — WPvivid Backup & Migration ≤ 0.9.123 Unauthenticated RCE Exploit |
| star | updated_at | name | url | des |
|---|---|---|---|---|
| 1400 | 2026-04-12T10:44:17Z | CVE-2025-55182 | https://github.com/msanft/CVE-2025-55182 | Explanation and full RCE PoC for CVE-2025-55182 |
| 2430 | 2026-04-12T16:18:44Z | react2shell-scanner | https://github.com/assetnote/react2shell-scanner | High Fidelity Detection Mechanism for RSC/Next.js RCE (CVE-2025-55182 & CVE-2025-66478) |
| 795 | 2026-04-05T06:03:25Z | CVE-2025-55182-research | https://github.com/ejpir/CVE-2025-55182-research | CVE-2025-55182 POC |
| 493 | 2026-02-23T14:30:59Z | CVE-2018-20250 | https://github.com/WyAtu/CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execution-from-winrar |
| 691 | 2026-04-13T08:09:23Z | CVE-2025-33073 | https://github.com/mverschu/CVE-2025-33073 | PoC Exploit for the NTLM reflection SMB flaw. |
| 519 | 2026-04-13T03:04:54Z | CVE-2025-32463_chwoot | https://github.com/pr0v3rbs/CVE-2025-32463_chwoot | Escalation of Privilege to the root through sudo binary with chroot option. CVE-2025-32463 |
| 249 | 2026-04-11T17:48:49Z | IngressNightmare-PoC | https://github.com/hakaioffsec/IngressNightmare-PoC | This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974). |
| 332 | 2026-04-13T12:57:14Z | redis_exploit | https://github.com/raminfp/redis_exploit | CVE-2025-49844 (RediShell) |
| 458 | 2026-04-12T04:17:02Z | CVE-2025-32463 | https://github.com/kh4sh3i/CVE-2025-32463 | Local Privilege Escalation to Root via Sudo chroot in Linux |
| 270 | 2026-04-06T14:47:06Z | CVE-2025-48799 | https://github.com/Wh04m1001/CVE-2025-48799 | |
| 310 | 2026-04-12T14:40:59Z | CVE-2025-53770-Exploit | https://github.com/soltanali0/CVE-2025-53770-Exploit | SharePoint WebPart Injection Exploit Tool |
| 313 | 2026-04-09T19:11:18Z | CVE-2025-55182 | https://github.com/emredavut/CVE-2025-55182 | RSC/Next.js RCE Vulnerability Detector & PoC Chrome Extension – CVE-2025-55182 & CVE-2025-66478 |
| 133 | 2026-04-02T14:36:58Z | Nextjs_RCE_Exploit_Tool | https://github.com/pyroxenites/Nextjs_RCE_Exploit_Tool | Exploit for CVE-2025-55182 & CVE-2025-66478 |
| 679 | 2026-04-14T01:08:34Z | BYOVD | https://github.com/BlackSnufkin/BYOVD | BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,). |
| 161 | 2026-04-13T12:50:44Z | AirBorne-PoC | https://github.com/ekomsSavior/AirBorne-PoC | poc for CVE-2025-24252 & CVE-2025-24132 |
| 1035 | 2026-04-11T06:35:02Z | React2Shell-CVE-2025-55182-original-poc | https://github.com/lachlan2k/React2Shell-CVE-2025-55182-original-poc | Original Proof-of-Concepts for React2Shell CVE-2025-55182 |
| 403 | 2026-04-09T21:48:11Z | CVE-2025-24071_PoC | https://github.com/0x6rss/CVE-2025-24071_PoC | CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File |
| 198 | 2026-03-30T06:27:36Z | CVE-2025-21298 | https://github.com/ynwarcs/CVE-2025-21298 | Proof of concept & details for CVE-2025-21298 |
| 211 | 2026-03-30T12:41:06Z | CVE-2025-32023 | https://github.com/leesh3288/CVE-2025-32023 | PoC & Exploit for CVE-2025-32023 / PlaidCTF 2025 "Zerodeo" |
| 198 | 2026-04-08T23:50:28Z | CVE-2025-30208-EXP | https://github.com/ThumpBo/CVE-2025-30208-EXP | CVE-2025-30208-EXP |
| 190 | 2026-03-25T19:46:42Z | RSC-Detect-CVE-2025-55182 | https://github.com/alptexans/RSC-Detect-CVE-2025-55182 | RSC Detect CVE 2025 55182 |
| 194 | 2026-04-07T16:11:01Z | iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 | https://github.com/JGoyd/iOS-Attack-Chain-CVE-2025-31200-CVE-2025-31201 | CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025). |
| 276 | 2026-04-09T07:57:08Z | CVE-2025-55182-advanced-scanner- | https://github.com/zack0x01/CVE-2025-55182-advanced-scanner- | |
| 386 | 2026-04-07T01:42:44Z | ColorOS-CVE-2025-10184 | https://github.com/yuuouu/ColorOS-CVE-2025-10184 | ColorOS短信漏洞,以及用户自救方案 |
| 417 | 2026-04-08T01:42:52Z | Next.js-RSC-RCE-Scanner-CVE-2025-66478 | https://github.com/Malayke/Next.js-RSC-RCE-Scanner-CVE-2025-66478 | A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability. |
| 150 | 2026-04-06T02:56:29Z | CVE-2025-11001 | https://github.com/pacbypass/CVE-2025-11001 | Exploit for CVE-2025-11001 or CVE-2025-11002 |
| 186 | 2026-04-13T01:49:47Z | POC-CVE-2025-24813 | https://github.com/absholi7ly/POC-CVE-2025-24813 | his repository contains an automated Proof of Concept (PoC) script for exploiting CVE-2025-24813, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met. |
| 90 | 2025-10-31T02:13:00Z | IngressNightmare-POCs | https://github.com/sandumjacob/IngressNightmare-POCs | CVE-2025-1974 |
| 232 | 2026-04-02T17:11:44Z | CVE-2025-21333-POC | https://github.com/MrAle98/CVE-2025-21333-POC | POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY |
| 353 | 2026-04-09T04:05:50Z | o3_finds_cve-2025-37899 | https://github.com/SeanHeelan/o3_finds_cve-2025-37899 | Artefacts for blog post on finding CVE-2025-37899 with o3 |
| star | updated_at | name | url | des |
|---|---|---|---|---|
| 2442 | 2026-04-13T09:42:16Z | CVE-2024-1086 | https://github.com/Notselwyn/CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images. |
| 692 | 2026-04-12T12:06:24Z | CVE-2024-38063 | https://github.com/ynwarcs/CVE-2024-38063 | poc for CVE-2024-38063 (RCE in tcpip.sys) |
| 492 | 2026-04-12T14:43:21Z | cve-2024-6387-poc | https://github.com/zgzhang/cve-2024-6387-poc | a signal handler race condition in OpenSSH's server (sshd) |
| 515 | 2026-03-15T23:59:21Z | CVE-2024-49113 | https://github.com/SafeBreach-Labs/CVE-2024-49113 | LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113 |
| 530 | 2026-03-30T14:25:22Z | git_rce | https://github.com/amalmurali47/git_rce | Exploit PoC for CVE-2024-32002 |
| 517 | 2026-04-12T14:43:26Z | CVE-2024-6387_Check | https://github.com/xaitax/CVE-2024-6387_Check | CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH |
| 223 | 2026-04-09T07:48:48Z | CVE-2024-38077 | https://github.com/qi4L/CVE-2024-38077 | RDL的堆溢出导致的RCE |
| 382 | 2026-04-10T03:38:38Z | cve-2024-6387-poc | https://github.com/acrono/cve-2024-6387-poc | 32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc |
| 330 | 2026-04-10T00:38:03Z | CVE-2024-0044 | https://github.com/0xbinder/CVE-2024-0044 | CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13 |
| 312 | 2026-04-06T03:01:17Z | CVE-2024-4577 | https://github.com/watchtowrlabs/CVE-2024-4577 | PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC |
| 319 | 2026-04-08T06:13:29Z | CVE-2024-21338 | https://github.com/hakaioffsec/CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled. |
| 288 | 2026-03-21T01:41:47Z | CVE-2024-30088 | https://github.com/tykawaii98/CVE-2024-30088 | |
| 3555 | 2026-04-11T14:01:11Z | xzbot | https://github.com/amlweems/xzbot | notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094) |
| 231 | 2026-04-13T09:36:22Z | CVE-2024-21413 | https://github.com/CMNatic/CVE-2024-21413 | CVE-2024-21413 PoC for THM Lab |
| 203 | 2026-02-16T16:02:26Z | CVE-2024-23897 | https://github.com/h4x0r-dz/CVE-2024-23897 | CVE-2024-23897 |
| 763 | 2026-04-09T08:49:56Z | CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability | Microsoft-Outlook-Remote-Code-Execution-Vulnerability |
| 268 | 2026-04-11T00:29:38Z | CVE-2024-49138-POC | https://github.com/MrAle98/CVE-2024-49138-POC | POC exploit for CVE-2024-49138 |
| 195 | 2026-04-09T14:27:51Z | CVE-2024-4367-PoC | https://github.com/LOURC0D3/CVE-2024-4367-PoC | CVE-2024-4367 & CVE-2024-34342 Proof of Concept |
| 9 | 2026-03-12T22:58:06Z | CVE-2024-38077-POC | https://github.com/SecStarBot/CVE-2024-38077-POC | |
| 123 | 2026-04-07T10:10:04Z | apache-vulnerability-testing | https://github.com/mrmtwoj/apache-vulnerability-testing | Apache HTTP Server Vulnerability Testing Tool |
| 178 | 2026-04-13T18:07:41Z | CVE-2024-6387 | https://github.com/Karmakstylez/CVE-2024-6387 | Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387) |
| 238 | 2026-04-06T03:01:13Z | CVE_2024_30078_POC_WIFI | https://github.com/blkph0x/CVE_2024_30078_POC_WIFI | basic concept for the latest windows wifi driver CVE |
| 216 | 2026-03-30T15:21:20Z | CVE-2024-21111 | https://github.com/mansk1es/CVE-2024-21111 | Oracle VirtualBox Elevation of Privilege (Local Privilege Escalation) Vulnerability |
| 180 | 2026-04-13T09:05:26Z | CVE-2024-25600 | https://github.com/Chocapikk/CVE-2024-25600 | Unauthenticated Remote Code Execution – Bricks <= 1.9.6 |
| 136 | 2026-01-12T15:22:25Z | CVE-2024-7479_CVE-2024-7481 | https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481 | TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006. |
| 81 | 2026-02-10T18:53:01Z | CVE-2024-30078- | https://github.com/lvyitian/CVE-2024-30078- | CVE-2024-30078 Detection and Command Execution Script |
| 146 | 2025-12-08T14:01:02Z | CVE-2024-38200 | https://github.com/passtheticket/CVE-2024-38200 | CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability |
| 157 | 2026-02-24T08:14:52Z | CVE-2024-21413 | https://github.com/duy-31/CVE-2024-21413 | Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC |
| 85 | 2026-04-07T06:49:27Z | CVE-2024-40725-CVE-2024-40898 | https://github.com/TAM-K592/CVE-2024-40725-CVE-2024-40898 | CVE-2024-40725 and CVE-2024-40898, affecting Apache HTTP Server versions 2.4.0 through 2.4.61. These flaws pose significant risks to web servers worldwide, potentially leading to source code disclosure and server-side request forgery (SSRF) attacks. |
| 125 | 2026-03-30T15:21:23Z | CVE-2024-30051 | https://github.com/fortra/CVE-2024-30051 |
| star | updated_at | name | url | des |
|---|---|---|---|---|
| 422 | 2026-02-27T06:42:31Z | qq-tim-elevation | https://github.com/vi3t1/qq-tim-elevation | CVE-2023-34312 |
| 1489 | 2026-04-07T17:26:51Z | cvelist | https://github.com/CVEProject/cvelist | Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023 |
| 788 | 2026-03-20T07:11:11Z | CVE-2023-38831-winrar-exploit | https://github.com/b1tg/CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator |
| 506 | 2026-04-13T23:07:43Z | Windows_LPE_AFD_CVE-2023-21768 | https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768 | LPE exploit for CVE-2023-21768 |
| 374 | 2026-04-09T04:16:34Z | CVE-2023-32233 | https://github.com/Liuk3r/CVE-2023-32233 | CVE-2023-32233: Linux内核中的安全漏洞 |
| 416 | 2026-03-30T02:10:42Z | CVE-2023-0386 | https://github.com/xkaneiki/CVE-2023-0386 | CVE-2023-0386在ubuntu22.04上的提权 |
| 113 | 2026-03-18T08:39:43Z | CVE-2023-21839 | https://github.com/ASkyeye/CVE-2023-21839 | Weblogic CVE-2023-21839 RCE (无需Java依赖一键RCE) |
| 388 | 2026-04-08T16:44:33Z | CVE-2023-4911 | https://github.com/leesh3288/CVE-2023-4911 | PoC for CVE-2023-4911 |
| 323 | 2026-02-17T10:40:33Z | CVE-2023-21752 | https://github.com/Wh04m1001/CVE-2023-21752 | |
| 647 | 2026-04-10T08:05:17Z | keepass-password-dumper | https://github.com/vdohney/keepass-password-dumper | Original PoC for CVE-2023-32784 |
| 283 | 2026-03-12T08:05:37Z | CVE-2023-21608 | https://github.com/hacksysteam/CVE-2023-21608 | Adobe Acrobat Reader - CVE-2023-21608 - Remote Code Execution Exploit |
| 318 | 2026-04-06T09:06:26Z | CVE-2023-4863 | https://github.com/mistymntncop/CVE-2023-4863 | |
| 239 | 2026-04-08T16:44:22Z | CVE-2023-36874 | https://github.com/Wh04m1001/CVE-2023-36874 | |
| 243 | 2026-04-04T06:25:18Z | CVE-2023-44487 | https://github.com/bcdannyboy/CVE-2023-44487 | Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487 |
| 168 | 2025-12-25T23:28:29Z | CVE-2023-36745 | https://github.com/N1k0la-T/CVE-2023-36745 | |
| 243 | 2026-03-05T02:51:13Z | CVE-2023-7028 | https://github.com/Vozec/CVE-2023-7028 | This repository presents a proof-of-concept of CVE-2023-7028 |
| 347 | 2025-10-04T17:42:47Z | CVE-2023-23397-POC-Powershell | https://github.com/api0cradle/CVE-2023-23397-POC-Powershell | |
| 228 | 2026-04-07T10:36:42Z | CVE-2023-3519 | https://github.com/BishopFox/CVE-2023-3519 | RCE exploit for CVE-2023-3519 |
| 231 | 2026-02-20T14:00:18Z | CVE-2023-20887 | https://github.com/sinsinology/CVE-2023-20887 | VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) |
| 140 | 2026-02-16T22:04:04Z | CVE-2023-34362 | https://github.com/horizon3ai/CVE-2023-34362 | MOVEit CVE-2023-34362 |
| 180 | 2026-02-26T16:45:00Z | CVE-2023-28252 | https://github.com/fortra/CVE-2023-28252 | |
| 133 | 2026-03-27T16:14:22Z | CVE-2023-2640-CVE-2023-32629 | https://github.com/g1vi/CVE-2023-2640-CVE-2023-32629 | GameOver(lay) Ubuntu Privilege Escalation |
| 284 | 2026-02-27T06:42:31Z | CVE-2023-25690-POC | https://github.com/dhmosfunk/CVE-2023-25690-POC | CVE 2023 25690 Proof of concept - mod_proxy vulnerable configuration on Apache HTTP Server versions 2.4.0 - 2.4.55 leads to HTTP Request Smuggling vulnerability. |
| 209 | 2026-04-13T17:56:17Z | CVE-2023-46747-RCE | https://github.com/W01fh4cker/CVE-2023-46747-RCE | exploit for f5-big-ip RCE cve-2023-46747 |
| 239 | 2026-04-10T00:37:03Z | Weblogic-CVE-2023-21839 | https://github.com/DXask88MA/Weblogic-CVE-2023-21839 | |
| 153 | 2026-03-26T07:14:42Z | cve-2023-29360 | https://github.com/Nero22k/cve-2023-29360 | Exploit for CVE-2023-29360 targeting MSKSSRV.SYS driver |
| 236 | 2026-03-21T11:26:29Z | CVE-2023-29357 | https://github.com/Chocapikk/CVE-2023-29357 | Microsoft SharePoint Server Elevation of Privilege Vulnerability |
| 166 | 2026-04-08T16:44:35Z | Windows_MSKSSRV_LPE_CVE-2023-36802 | https://github.com/chompie1337/Windows_MSKSSRV_LPE_CVE-2023-36802 | LPE exploit for CVE-2023-36802 |
| 170 | 2026-01-12T08:56:11Z | CVE-2023-25157 | https://github.com/win3zz/CVE-2023-25157 | CVE-2023-25157 - GeoServer SQL Injection - PoC |
| 159 | 2026-04-03T13:37:27Z | CVE-2023-23397_EXPLOIT_0DAY | https://github.com/sqrtZeroKnowledge/CVE-2023-23397_EXPLOIT_0DAY | Exploit for the CVE-2023-23397 |
| star | updated_at | name | url | des |
|---|---|---|---|---|
| 437 | 2026-03-23T04:09:49Z | CVE-2022-25636 | https://github.com/Bonfee/CVE-2022-25636 | CVE-2022-25636 |
| 464 | 2026-03-02T09:48:16Z | CVE-2022-21882 | https://github.com/KaLendsi/CVE-2022-21882 | win32k LPE |
| 1127 | 2026-04-13T09:55:01Z | CVE-2022-0847-DirtyPipe-Exploit | https://github.com/Arinerron/CVE-2022-0847-DirtyPipe-Exploit | A root exploit for CVE-2022-0847 (Dirty Pipe) |
| 673 | 2026-04-09T01:28:21Z | CVE-2022-29072 | https://github.com/kagancapar/CVE-2022-29072 | 7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area. |
| 378 | 2026-03-10T13:22:28Z | CVE-2022-0185 | https://github.com/Crusaders-of-Rust/CVE-2022-0185 | CVE-2022-0185 |
| 500 | 2026-03-23T04:48:34Z | CVE-2022-0995 | https://github.com/Bonfee/CVE-2022-0995 | CVE-2022-0995 exploit |
| 578 | 2026-03-30T03:10:41Z | CVE-2022-23222 | https://github.com/tr3ee/CVE-2022-23222 | CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation |
| 223 | 2026-04-02T16:15:58Z | Spring-Cloud-Gateway-CVE-2022-22947 | https://github.com/lucksec/Spring-Cloud-Gateway-CVE-2022-22947 | CVE-2022-22947 |
| 527 | 2026-04-05T11:55:14Z | OpenSSL-2022 | https://github.com/NCSC-NL/OpenSSL-2022 | Operational information regarding CVE-2022-3602 and CVE-2022-3786, two vulnerabilities in OpenSSL 3 |
| 363 | 2026-02-11T03:04:12Z | CVE-2022-21907 | https://github.com/ZZ-SOCMAP/CVE-2022-21907 | HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907 |
| 356 | 2026-03-10T00:34:53Z | CVE-2022-40684 | https://github.com/horizon3ai/CVE-2022-40684 | A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager |
| 379 | 2026-03-21T13:50:42Z | CVE-2022-29464 | https://github.com/hakivvi/CVE-2022-29464 | WSO2 RCE (CVE-2022-29464) exploit and writeup. |
| 704 | 2026-04-10T22:45:15Z | CVE-2022-0847-DirtyPipe-Exploits | https://github.com/AlexisAhmed/CVE-2022-0847-DirtyPipe-Exploits | A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability. |
| 488 | 2026-03-11T21:48:46Z | CVE-2022-2588 | https://github.com/Markakd/CVE-2022-2588 | exploit for CVE-2022-2588 |
| 414 | 2026-03-19T11:20:37Z | CVE-2022-33679 | https://github.com/Bdenneu/CVE-2022-33679 | One day based on https://googleprojectzero.blogspot.com/2022/10/rc4-is-still-considered-harmful.html |
| 388 | 2026-04-02T16:16:26Z | CVE-2022-39197 | https://github.com/its-arun/CVE-2022-39197 | CobaltStrike <= 4.7.1 RCE |
| 280 | 2026-04-09T07:48:36Z | CVE-2022-0847 | https://github.com/r1is/CVE-2022-0847 | CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞(Dirty Cow),但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe” |
| 320 | 2026-04-06T03:40:35Z | CVE-2022-39197-patch | https://github.com/burpheart/CVE-2022-39197-patch | CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. |
| 351 | 2026-03-27T10:45:35Z | CVE-2022-21894 | https://github.com/Wack0/CVE-2022-21894 | baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability |
| 467 | 2026-02-20T06:34:31Z | CVE-2022-27254 | https://github.com/nonamecoder/CVE-2022-27254 | PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254) |
| 326 | 2026-04-05T02:12:38Z | Spring4Shell-POC | https://github.com/reznok/Spring4Shell-POC | Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit |
| 306 | 2026-01-13T11:23:05Z | CVE-2022-21971 | https://github.com/0vercl0k/CVE-2022-21971 | PoC for CVE-2022-21971 "Windows Runtime Remote Code Execution Vulnerability" |
| 265 | 2026-04-05T11:55:32Z | CVE-2022-39952 | https://github.com/horizon3ai/CVE-2022-39952 | POC for CVE-2022-39952 |
| 283 | 2026-04-13T11:01:04Z | cve-2022-27255 | https://github.com/infobyte/cve-2022-27255 | |
| 538 | 2026-04-12T21:56:38Z | CVE-2022-38694_unlock_bootloader | https://github.com/TomKing062/CVE-2022-38694_unlock_bootloader | This is a one-time signature verification bypass. For persistent signature verification bypass, check https://github.com/TomKing062/CVE-2022-38691_38692 |
| 117 | 2025-12-26T05:38:26Z | CVE-2022-22963 | https://github.com/dinosn/CVE-2022-22963 | CVE-2022-22963 PoC |
| 240 | 2026-04-07T20:25:23Z | CVE-2022-20699 | https://github.com/Audiobahn/CVE-2022-20699 | Cisco Anyconnect VPN unauth RCE (rwx stack) |
| 200 | 2026-04-09T15:13:08Z | CVE-2022-21882 | https://github.com/L4ys/CVE-2022-21882 | |
| 233 | 2026-03-30T08:56:22Z | CVE-2022-30075 | https://github.com/aaronsvk/CVE-2022-30075 | Tp-Link Archer AX50 Authenticated RCE (CVE-2022-30075) |
| 221 | 2026-03-27T11:42:30Z | CVE-2022-34918 | https://github.com/veritas501/CVE-2022-34918 | CVE-2022-34918 netfilter nf_tables 本地提权 POC |
| Wechat Pay | AliPay | Paypal | BTC Pay | BCH Pay |
|---|---|---|---|---|
![]() |
![]() |
paypal miracletalent@gmail.com | ![]() |
![]() |



