mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-05-14 18:57:08 +02:00
Auto Update 2026/05/05 18:54:24
This commit is contained in:
parent
0358af8626
commit
a11ca73943
107 changed files with 1164 additions and 996 deletions
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2026-05-05T02:36:48Z",
|
||||
"updated_at": "2026-05-05T14:13:23Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2408,
|
||||
"watchers_count": 2408,
|
||||
"stargazers_count": 2390,
|
||||
"watchers_count": 2390,
|
||||
"has_discussions": false,
|
||||
"forks_count": 454,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 454,
|
||||
"watchers": 2408,
|
||||
"watchers": 2390,
|
||||
"score": 0,
|
||||
"subscribers_count": 107
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file uploads in WordPress file managers.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T05:54:10Z",
|
||||
"updated_at": "2026-05-05T10:07:37Z",
|
||||
"pushed_at": "2026-05-05T10:07:33Z",
|
||||
"updated_at": "2026-05-05T17:40:13Z",
|
||||
"pushed_at": "2026-05-05T17:40:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -146,10 +146,10 @@
|
|||
"description": "exploit for CVE-2017-1000486 vulnerability with SOCKS proxy support",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T23:09:40Z",
|
||||
"updated_at": "2026-04-28T15:46:05Z",
|
||||
"updated_at": "2026-05-05T15:50:47Z",
|
||||
"pushed_at": "2023-04-18T14:03:27Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
|
@ -169,7 +169,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
|||
|
|
@ -455,10 +455,10 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2026-04-07T10:35:23Z",
|
||||
"updated_at": "2026-05-05T15:52:41Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"stargazers_count": 441,
|
||||
"watchers_count": 441,
|
||||
"has_discussions": false,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
|
|
@ -475,7 +475,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 440,
|
||||
"watchers": 441,
|
||||
"score": 0,
|
||||
"subscribers_count": 21
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "proof-of-concept (PoC) for linux dists based on Debian, CentOS and RedHat - exploit 1",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-08T18:12:03Z",
|
||||
"updated_at": "2024-10-30T17:51:54Z",
|
||||
"updated_at": "2026-05-05T15:52:30Z",
|
||||
"pushed_at": "2018-10-09T16:44:32Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040\/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T19:56:12Z",
|
||||
"updated_at": "2026-05-05T11:46:21Z",
|
||||
"pushed_at": "2026-05-05T11:46:17Z",
|
||||
"updated_at": "2026-05-05T18:15:06Z",
|
||||
"pushed_at": "2026-05-05T18:15:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-14T17:27:37Z",
|
||||
"updated_at": "2026-04-11T12:32:01Z",
|
||||
"updated_at": "2026-05-05T15:52:20Z",
|
||||
"pushed_at": "2019-10-15T01:04:08Z",
|
||||
"stargazers_count": 132,
|
||||
"watchers_count": 132,
|
||||
"stargazers_count": 133,
|
||||
"watchers_count": 133,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 132,
|
||||
"watchers": 133,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
|||
|
|
@ -58,8 +58,8 @@
|
|||
"description": "🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-04T13:21:35Z",
|
||||
"updated_at": "2026-05-05T10:07:26Z",
|
||||
"pushed_at": "2026-05-05T10:07:22Z",
|
||||
"updated_at": "2026-05-05T17:40:03Z",
|
||||
"pushed_at": "2026-05-05T17:39:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2984,8 +2984,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-23T09:39:37Z",
|
||||
"updated_at": "2026-05-01T03:39:30Z",
|
||||
"pushed_at": "2026-05-01T03:39:27Z",
|
||||
"updated_at": "2026-05-05T13:01:27Z",
|
||||
"pushed_at": "2026-05-05T13:01:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2383,8 +2383,8 @@
|
|||
"description": "Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T10:17:38Z",
|
||||
"updated_at": "2026-05-05T11:41:58Z",
|
||||
"pushed_at": "2026-05-05T11:41:54Z",
|
||||
"updated_at": "2026-05-05T17:52:08Z",
|
||||
"pushed_at": "2026-05-05T17:51:43Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2021-1732 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-05T02:11:10Z",
|
||||
"updated_at": "2026-01-25T22:24:20Z",
|
||||
"updated_at": "2026-05-05T13:51:13Z",
|
||||
"pushed_at": "2021-03-05T03:10:26Z",
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"has_discussions": false,
|
||||
"forks_count": 127,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 127,
|
||||
"watchers": 421,
|
||||
"watchers": 422,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE 2021-21315 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-01T18:52:41Z",
|
||||
"updated_at": "2026-02-05T03:16:09Z",
|
||||
"updated_at": "2026-05-05T15:51:49Z",
|
||||
"pushed_at": "2021-06-09T13:27:20Z",
|
||||
"stargazers_count": 159,
|
||||
"watchers_count": 159,
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
|
@ -41,7 +41,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 159,
|
||||
"watchers": 160,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Pre-Auth Blind NoSQL Injection leading to Remote Code Execution in Rocket Chat 3.12.1",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:05:01Z",
|
||||
"updated_at": "2026-03-28T18:38:28Z",
|
||||
"updated_at": "2026-05-05T15:51:27Z",
|
||||
"pushed_at": "2023-06-11T08:47:04Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 59,
|
||||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -80,10 +80,10 @@
|
|||
"description": "[CVE-2021-27905] Apache Solr ReplicationHandler Server Side Request Forgery (SSRF)",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-10T07:49:47Z",
|
||||
"updated_at": "2025-04-02T14:32:02Z",
|
||||
"updated_at": "2026-05-05T15:52:49Z",
|
||||
"pushed_at": "2021-08-10T08:52:16Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -96,7 +96,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -212,8 +212,8 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-28T17:42:44Z",
|
||||
"updated_at": "2026-05-05T11:45:42Z",
|
||||
"pushed_at": "2026-05-05T11:45:38Z",
|
||||
"updated_at": "2026-05-05T18:19:26Z",
|
||||
"pushed_at": "2026-05-05T18:19:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2026-05-01T19:33:23Z",
|
||||
"updated_at": "2026-05-05T15:51:11Z",
|
||||
"pushed_at": "2024-04-02T02:48:18Z",
|
||||
"stargazers_count": 442,
|
||||
"watchers_count": 442,
|
||||
"stargazers_count": 443,
|
||||
"watchers_count": 443,
|
||||
"has_discussions": false,
|
||||
"forks_count": 137,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 442,
|
||||
"watchers": 443,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE-2021-3560 Local PrivEsc Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-11T14:28:43Z",
|
||||
"updated_at": "2026-03-14T19:11:18Z",
|
||||
"updated_at": "2026-05-05T15:53:35Z",
|
||||
"pushed_at": "2021-06-12T17:48:38Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
|
@ -67,7 +67,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 81,
|
||||
"watchers": 82,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
|||
|
|
@ -150,10 +150,10 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2026-05-05T00:25:11Z",
|
||||
"updated_at": "2026-05-05T15:52:31Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 1304,
|
||||
"watchers_count": 1304,
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"has_discussions": false,
|
||||
"forks_count": 204,
|
||||
"allow_forking": true,
|
||||
|
|
@ -166,7 +166,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 204,
|
||||
"watchers": 1304,
|
||||
"watchers": 1305,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
},
|
||||
|
|
@ -2050,8 +2050,8 @@
|
|||
"description": "🚀 Enhance your penetration testing with PwnKit Helper, a simple tool for exploiting the CVE-2021-4034 vulnerability in pkexec for local privilege escalation.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T09:53:03Z",
|
||||
"updated_at": "2026-05-05T10:23:53Z",
|
||||
"pushed_at": "2026-05-05T10:23:49Z",
|
||||
"updated_at": "2026-05-05T17:52:27Z",
|
||||
"pushed_at": "2026-05-05T17:52:23Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2026-04-29T04:31:03Z",
|
||||
"updated_at": "2026-05-05T15:53:22Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 1055,
|
||||
"watchers_count": 1055,
|
||||
"stargazers_count": 1056,
|
||||
"watchers_count": 1056,
|
||||
"has_discussions": false,
|
||||
"forks_count": 193,
|
||||
"allow_forking": true,
|
||||
|
|
@ -33,7 +33,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 193,
|
||||
"watchers": 1055,
|
||||
"watchers": 1056,
|
||||
"score": 0,
|
||||
"subscribers_count": 22
|
||||
},
|
||||
|
|
@ -52,10 +52,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2026-04-30T21:53:51Z",
|
||||
"updated_at": "2026-05-05T15:53:16Z",
|
||||
"pushed_at": "2023-01-29T03:31:27Z",
|
||||
"stargazers_count": 998,
|
||||
"watchers_count": 998,
|
||||
"stargazers_count": 999,
|
||||
"watchers_count": 999,
|
||||
"has_discussions": false,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
|
|
@ -66,7 +66,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 133,
|
||||
"watchers": 998,
|
||||
"watchers": 999,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
|||
|
|
@ -9988,10 +9988,10 @@
|
|||
"description": "Generic Scanner for Apache log4j RCE CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T09:15:47Z",
|
||||
"updated_at": "2026-04-11T10:13:26Z",
|
||||
"updated_at": "2026-05-05T13:55:01Z",
|
||||
"pushed_at": "2021-12-22T09:19:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -10002,7 +10002,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
@ -13958,8 +13958,8 @@
|
|||
"description": "Pentesting caja negra: Shellshock (CVE-2014-6271) + Log4Shell (CVE-2021-44228). Escalada a root. Informe ejecutivo y técnico",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T06:59:35Z",
|
||||
"updated_at": "2026-05-05T07:02:26Z",
|
||||
"pushed_at": "2026-05-05T06:59:58Z",
|
||||
"updated_at": "2026-05-05T18:17:05Z",
|
||||
"pushed_at": "2026-05-05T18:17:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "An unauthenticated data extraction vulnerability in Kyocera printers, which allows for recovery of cleartext address book and domain joined passwords",
|
||||
"fork": false,
|
||||
"created_at": "2023-03-15T14:23:41Z",
|
||||
"updated_at": "2026-04-23T12:18:57Z",
|
||||
"updated_at": "2026-05-05T13:33:59Z",
|
||||
"pushed_at": "2023-03-15T14:33:48Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
|||
|
|
@ -710,10 +710,10 @@
|
|||
"description": "VMware Workspace ONE Access and Identity Manager RCE via SSTI. CVE-2022-22954 - PoC SSTI * exploit+payload+shodan (ну набором)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-03T09:17:12Z",
|
||||
"updated_at": "2023-03-13T03:53:28Z",
|
||||
"updated_at": "2026-05-05T15:51:00Z",
|
||||
"pushed_at": "2022-06-03T09:18:37Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -724,7 +724,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -949,5 +949,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1229958575,
|
||||
"name": "CVE-2022-22963",
|
||||
"full_name": "cyberager\/CVE-2022-22963",
|
||||
"owner": {
|
||||
"login": "cyberager",
|
||||
"id": 25870990,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25870990?v=4",
|
||||
"html_url": "https:\/\/github.com\/cyberager",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cyberager\/CVE-2022-22963",
|
||||
"description": "Simple exploit",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T14:42:13Z",
|
||||
"updated_at": "2026-05-05T15:15:46Z",
|
||||
"pushed_at": "2026-05-05T15:11:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -138,10 +138,10 @@
|
|||
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T00:24:28Z",
|
||||
"updated_at": "2026-04-25T23:07:12Z",
|
||||
"updated_at": "2026-05-05T15:53:15Z",
|
||||
"pushed_at": "2022-08-04T18:26:18Z",
|
||||
"stargazers_count": 325,
|
||||
"watchers_count": 325,
|
||||
"stargazers_count": 326,
|
||||
"watchers_count": 326,
|
||||
"has_discussions": false,
|
||||
"forks_count": 239,
|
||||
"allow_forking": true,
|
||||
|
|
@ -152,7 +152,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 239,
|
||||
"watchers": 325,
|
||||
"watchers": 326,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
|
|
|
|||
|
|
@ -97,5 +97,38 @@
|
|||
"watchers": 20,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 1230156513,
|
||||
"name": "CVE-2022-25636_COPY-FAIL_ONE-LINE",
|
||||
"full_name": "Eduardo2221\/CVE-2022-25636_COPY-FAIL_ONE-LINE",
|
||||
"owner": {
|
||||
"login": "Eduardo2221",
|
||||
"id": 86635699,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86635699?v=4",
|
||||
"html_url": "https:\/\/github.com\/Eduardo2221",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Eduardo2221\/CVE-2022-25636_COPY-FAIL_ONE-LINE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T18:24:56Z",
|
||||
"updated_at": "2026-05-05T18:29:55Z",
|
||||
"pushed_at": "2026-05-05T18:29:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -254,10 +254,10 @@
|
|||
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T18:25:26Z",
|
||||
"updated_at": "2025-11-28T06:40:45Z",
|
||||
"updated_at": "2026-05-05T15:50:48Z",
|
||||
"pushed_at": "2023-05-23T03:42:31Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
|
|
@ -273,7 +273,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -11,10 +11,10 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NeCr00\/CVE-2023-24278",
|
||||
"description": "It was discovered two reflected cross site scripting (XSS) vulnerabilities in the Squidex open source headless CMS software. The Reflected Cross Site Scripting vulnerabilities affect all versions of Squidex prior to 7.4.0 and affect both authenticated and unauthenticated victim users.",
|
||||
"description": "CVE-2023-24278 - Reflected XSS Vulnerabilities in Squidex",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T13:10:47Z",
|
||||
"updated_at": "2026-03-07T21:12:52Z",
|
||||
"updated_at": "2026-05-05T15:41:05Z",
|
||||
"pushed_at": "2024-12-23T13:22:22Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
|
|
@ -25,7 +25,11 @@
|
|||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"cve",
|
||||
"squidexcms",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "oob_entry tfp0 kernel exploit for armv7 iOS (iOS 3.0–10.3.4), using CVE-2023-32434. We will publish a write-up detailing the methods in the coming weeks. 🐙",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-13T09:19:29Z",
|
||||
"updated_at": "2026-05-05T09:57:59Z",
|
||||
"pushed_at": "2026-05-05T09:57:54Z",
|
||||
"updated_at": "2026-05-05T17:29:25Z",
|
||||
"pushed_at": "2026-05-05T17:29:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Public disclosure for CVE-2023-34843.",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-27T20:45:32Z",
|
||||
"updated_at": "2024-08-30T15:12:21Z",
|
||||
"updated_at": "2026-05-05T14:46:25Z",
|
||||
"pushed_at": "2023-06-27T20:51:50Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1064638326,
|
||||
"name": "ktor-xxe-poc",
|
||||
"full_name": "bbugdigger\/ktor-xxe-poc",
|
||||
"owner": {
|
||||
"login": "bbugdigger",
|
||||
"id": 125513127,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125513127?v=4",
|
||||
"html_url": "https:\/\/github.com\/bbugdigger",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bbugdigger\/ktor-xxe-poc",
|
||||
"description": "Proof-of-Concept of CVE-2023-45612",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-26T10:29:23Z",
|
||||
"updated_at": "2026-01-11T13:54:15Z",
|
||||
"pushed_at": "2025-09-26T18:05:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1069201924,
|
||||
"name": "CVE-2023-45612-PoC",
|
||||
|
|
|
|||
|
|
@ -1,4 +1,37 @@
|
|||
[
|
||||
{
|
||||
"id": 863663925,
|
||||
"name": "CVE-2023-47268",
|
||||
"full_name": "suce0155\/CVE-2023-47268",
|
||||
"owner": {
|
||||
"login": "suce0155",
|
||||
"id": 149517309,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149517309?v=4",
|
||||
"html_url": "https:\/\/github.com\/suce0155",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/suce0155\/CVE-2023-47268",
|
||||
"description": "PrusaSlicer Arbitrary Code Execution using .3mf",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-26T17:28:05Z",
|
||||
"updated_at": "2026-05-05T15:47:50Z",
|
||||
"pushed_at": "2024-09-28T12:13:19Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 935598432,
|
||||
"name": "Trickster-HTB",
|
||||
|
|
|
|||
|
|
@ -351,7 +351,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2026-03-30T18:27:24Z",
|
||||
"updated_at": "2026-03-31T14:23:12Z",
|
||||
"pushed_at": "2026-03-31T14:21:55Z",
|
||||
"pushed_at": "2026-05-05T16:24:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-15T16:36:07Z",
|
||||
"updated_at": "2026-05-05T00:21:05Z",
|
||||
"pushed_at": "2026-05-05T00:21:01Z",
|
||||
"updated_at": "2026-05-05T13:45:00Z",
|
||||
"pushed_at": "2026-05-05T13:44:19Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -341,8 +341,8 @@
|
|||
},
|
||||
{
|
||||
"id": 927144920,
|
||||
"name": "CVE-2024-2961_buddyforms_2.7.7",
|
||||
"full_name": "suce0155\/CVE-2024-2961_buddyforms_2.7.7",
|
||||
"name": "CVE-2024-2961",
|
||||
"full_name": "suce0155\/CVE-2024-2961",
|
||||
"owner": {
|
||||
"login": "suce0155",
|
||||
"id": 149517309,
|
||||
|
|
@ -350,11 +350,11 @@
|
|||
"html_url": "https:\/\/github.com\/suce0155",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/suce0155\/CVE-2024-2961_buddyforms_2.7.7",
|
||||
"html_url": "https:\/\/github.com\/suce0155\/CVE-2024-2961",
|
||||
"description": "CVE-2024-2961 Cnext RCE Exploit with Buddyforms 2.7.7",
|
||||
"fork": false,
|
||||
"created_at": "2025-02-04T13:34:33Z",
|
||||
"updated_at": "2025-03-03T04:39:46Z",
|
||||
"updated_at": "2026-05-05T15:48:37Z",
|
||||
"pushed_at": "2025-02-04T18:51:48Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
|
|
|
|||
|
|
@ -245,8 +245,8 @@
|
|||
"description": "Go offensive-security research library — 15+ injection methods, AMSI\/ETW\/ntdll-unhook evasion, sleep mask (Ekko × XOR\/RC4\/AES), call-stack spoof, BYOVD (RTCore64) + kernel callback removal, LSASS dump + pure-Go MSV1_0 parser w\/ PPL bypass, recon (sandbox\/VM\/debugger\/dllhijack), PE ops (sRDI\/BOF\/CLR), Meterpreter C2, UAC bypass, CVE-2024-30088 LPE.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-01T08:15:08Z",
|
||||
"updated_at": "2026-05-05T11:55:54Z",
|
||||
"pushed_at": "2026-05-05T11:55:51Z",
|
||||
"updated_at": "2026-05-05T14:21:43Z",
|
||||
"pushed_at": "2026-05-05T14:19:36Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": true,
|
||||
|
|
|
|||
|
|
@ -554,10 +554,10 @@
|
|||
"description": "本脚本是针对 GeoServer 的远程代码执行漏洞(CVE-2024-36401)开发的 PoC(Proof of Concept)探测工具。该漏洞允许攻击者通过构造特定请求,在目标服务器上执行任意命令。",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-30T07:45:55Z",
|
||||
"updated_at": "2025-05-07T02:07:41Z",
|
||||
"updated_at": "2026-05-05T16:18:19Z",
|
||||
"pushed_at": "2025-04-30T08:46:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -568,7 +568,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -179,10 +179,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2026-05-02T11:44:43Z",
|
||||
"updated_at": "2026-05-05T15:54:00Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
|
@ -193,7 +193,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 314,
|
||||
"watchers": 315,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
|||
|
|
@ -15,7 +15,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2026-04-07T12:02:52Z",
|
||||
"updated_at": "2026-05-03T22:37:18Z",
|
||||
"pushed_at": "2026-05-05T11:56:47Z",
|
||||
"pushed_at": "2026-05-05T17:58:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a PoC code to exploit the IngressNightmare vulnerabilities (CVE-2025-1097, CVE-2025-1098, CVE-2025-24514, and CVE-2025-1974).",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-26T18:52:20Z",
|
||||
"updated_at": "2026-04-11T17:48:49Z",
|
||||
"updated_at": "2026-05-05T15:52:01Z",
|
||||
"pushed_at": "2025-03-26T19:49:28Z",
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"has_discussions": false,
|
||||
"forks_count": 55,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"watchers": 249,
|
||||
"watchers": 250,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit the CVE-2025-14847 vulnerability in MongoDB to disclose sensitive heap memory using a Python script that analyzes responses for new leaked data.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-30T15:52:00Z",
|
||||
"updated_at": "2026-05-05T07:36:58Z",
|
||||
"pushed_at": "2026-05-05T07:36:54Z",
|
||||
"updated_at": "2026-05-05T12:52:35Z",
|
||||
"pushed_at": "2026-05-05T12:52:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -280,10 +280,10 @@
|
|||
"description": "Authenticated privilege escalation in Camaleon CMS v2.9.0 via improper parameter handling in the updated_ajax endpoint.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-04T04:17:19Z",
|
||||
"updated_at": "2026-05-03T12:52:45Z",
|
||||
"updated_at": "2026-05-05T16:04:12Z",
|
||||
"pushed_at": "2026-02-04T04:35:38Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -294,7 +294,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -412,8 +412,8 @@
|
|||
"description": "🛠️ Exploit CVE-2025-2304 in Camaleon CMS easily with this Python script for privilege escalation, tested on version 2.9.0.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-14T20:01:20Z",
|
||||
"updated_at": "2026-05-05T08:21:23Z",
|
||||
"pushed_at": "2026-05-05T08:21:19Z",
|
||||
"updated_at": "2026-05-05T13:24:25Z",
|
||||
"pushed_at": "2026-05-05T13:22:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2025-24071: NTLM Hash Leak via RAR\/ZIP Extraction and .library-ms File",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-16T20:10:19Z",
|
||||
"updated_at": "2026-04-20T02:03:21Z",
|
||||
"updated_at": "2026-05-05T15:50:41Z",
|
||||
"pushed_at": "2025-03-20T21:22:23Z",
|
||||
"stargazers_count": 401,
|
||||
"watchers_count": 401,
|
||||
"stargazers_count": 402,
|
||||
"watchers_count": 402,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 401,
|
||||
"watchers": 402,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-09T07:18:55Z",
|
||||
"updated_at": "2026-05-05T03:11:59Z",
|
||||
"updated_at": "2026-05-05T18:19:23Z",
|
||||
"pushed_at": "2026-05-05T01:20:19Z",
|
||||
"stargazers_count": 319,
|
||||
"watchers_count": 319,
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 319,
|
||||
"watchers": 320,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate CVE-2025-24257 with a public PoC for IOGPUFamily kernel heap OOB read\/write and panic analysis",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-04T03:42:55Z",
|
||||
"updated_at": "2026-05-05T00:40:13Z",
|
||||
"pushed_at": "2026-05-05T00:40:09Z",
|
||||
"updated_at": "2026-05-05T14:07:37Z",
|
||||
"pushed_at": "2026-05-05T14:07:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -775,8 +775,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-04T07:29:12Z",
|
||||
"updated_at": "2026-05-04T03:59:22Z",
|
||||
"pushed_at": "2026-05-04T03:59:18Z",
|
||||
"updated_at": "2026-05-05T17:34:39Z",
|
||||
"pushed_at": "2026-05-05T17:57:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "CVE-2025-31200 is a zero-day, zero-click RCE in iOS CoreAudio’s AudioConverterService, triggered by a malicious audio file via iMessage\/SMS. Exploitation bypassed Blastdoor, enabled kernel escalation (CVE-2025-31201), and allowed token theft until patched in iOS 18.4.1 (Apr 16, 2025).",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-17T23:03:56Z",
|
||||
"updated_at": "2026-05-02T07:27:30Z",
|
||||
"pushed_at": "2026-04-07T16:10:57Z",
|
||||
"updated_at": "2026-05-05T15:37:54Z",
|
||||
"pushed_at": "2026-05-05T15:35:54Z",
|
||||
"stargazers_count": 197,
|
||||
"watchers_count": 197,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T15:20:11Z",
|
||||
"updated_at": "2026-05-05T10:12:06Z",
|
||||
"pushed_at": "2026-05-05T10:12:02Z",
|
||||
"updated_at": "2026-05-05T17:43:57Z",
|
||||
"pushed_at": "2026-05-05T17:43:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -645,8 +645,8 @@
|
|||
"description": "Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-04T18:20:09Z",
|
||||
"updated_at": "2026-05-05T09:54:37Z",
|
||||
"pushed_at": "2026-05-05T09:54:34Z",
|
||||
"updated_at": "2026-05-05T17:25:30Z",
|
||||
"pushed_at": "2026-05-05T17:25:08Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1628,8 +1628,8 @@
|
|||
"description": "🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T00:42:07Z",
|
||||
"updated_at": "2026-05-05T10:14:40Z",
|
||||
"pushed_at": "2026-05-05T10:14:37Z",
|
||||
"updated_at": "2026-05-05T17:45:55Z",
|
||||
"pushed_at": "2026-05-05T17:45:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1680,8 +1680,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T02:01:08Z",
|
||||
"updated_at": "2026-05-05T10:14:40Z",
|
||||
"pushed_at": "2026-05-05T10:14:36Z",
|
||||
"updated_at": "2026-05-05T17:45:54Z",
|
||||
"pushed_at": "2026-05-05T17:45:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "PoC Exploit for the NTLM reflection SMB flaw.",
|
||||
"fork": false,
|
||||
"created_at": "2025-06-13T12:15:14Z",
|
||||
"updated_at": "2026-04-29T08:30:58Z",
|
||||
"updated_at": "2026-05-05T15:52:50Z",
|
||||
"pushed_at": "2026-02-18T09:15:40Z",
|
||||
"stargazers_count": 699,
|
||||
"watchers_count": 699,
|
||||
"stargazers_count": 700,
|
||||
"watchers_count": 700,
|
||||
"has_discussions": false,
|
||||
"forks_count": 133,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 133,
|
||||
"watchers": 699,
|
||||
"watchers": 700,
|
||||
"score": 0,
|
||||
"subscribers_count": 6
|
||||
},
|
||||
|
|
|
|||
|
|
@ -294,8 +294,8 @@
|
|||
"description": "🔍 Scan and research CVE-2025-36911 vulnerabilities with WPair, a specialized tool for Android built in Kotlin, ensuring your applications remain secure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T01:59:47Z",
|
||||
"updated_at": "2026-05-05T07:57:55Z",
|
||||
"pushed_at": "2026-05-05T07:57:51Z",
|
||||
"updated_at": "2026-05-05T13:11:16Z",
|
||||
"pushed_at": "2026-05-05T13:10:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -251,8 +251,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-19T17:17:19Z",
|
||||
"updated_at": "2026-05-05T10:14:27Z",
|
||||
"pushed_at": "2026-05-05T10:14:23Z",
|
||||
"updated_at": "2026-05-05T17:45:39Z",
|
||||
"pushed_at": "2026-05-05T17:45:35Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-13T07:51:09Z",
|
||||
"updated_at": "2026-05-05T10:56:04Z",
|
||||
"pushed_at": "2026-05-05T10:56:01Z",
|
||||
"updated_at": "2026-05-05T18:09:46Z",
|
||||
"pushed_at": "2026-05-05T18:09:42Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T09:27:39Z",
|
||||
"updated_at": "2026-05-05T10:57:48Z",
|
||||
"pushed_at": "2026-05-05T10:57:44Z",
|
||||
"updated_at": "2026-05-05T18:10:32Z",
|
||||
"pushed_at": "2026-05-05T18:10:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "BYOVD research use cases featuring vulnerable driver discovery and reverse engineering methodology. (CVE-2025-52915, CVE-2025-1055,).",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-05T14:52:11Z",
|
||||
"updated_at": "2026-05-05T11:51:00Z",
|
||||
"pushed_at": "2026-04-12T07:04:32Z",
|
||||
"stargazers_count": 717,
|
||||
"watchers_count": 717,
|
||||
"updated_at": "2026-05-05T15:52:07Z",
|
||||
"pushed_at": "2026-05-05T15:33:57Z",
|
||||
"stargazers_count": 718,
|
||||
"watchers_count": 718,
|
||||
"has_discussions": false,
|
||||
"forks_count": 108,
|
||||
"allow_forking": true,
|
||||
|
|
@ -37,7 +37,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 108,
|
||||
"watchers": 717,
|
||||
"watchers": 718,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛡️ Analyze CVE-2025-5419 to exploit an uninitialized read vulnerability in V8 for arbitrary read\/write access within the sandbox environment.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T04:41:49Z",
|
||||
"updated_at": "2026-05-05T08:13:07Z",
|
||||
"pushed_at": "2026-05-05T08:13:04Z",
|
||||
"updated_at": "2026-05-05T13:21:56Z",
|
||||
"pushed_at": "2026-05-05T13:20:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -67,8 +67,8 @@
|
|||
"description": "🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-17T22:04:33Z",
|
||||
"updated_at": "2026-05-05T10:01:06Z",
|
||||
"pushed_at": "2026-05-05T10:01:02Z",
|
||||
"updated_at": "2026-05-05T17:33:01Z",
|
||||
"pushed_at": "2026-05-05T17:32:56Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -53,8 +53,8 @@
|
|||
"description": "CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-14T05:16:16Z",
|
||||
"updated_at": "2026-05-05T10:00:06Z",
|
||||
"pushed_at": "2026-05-05T10:00:02Z",
|
||||
"updated_at": "2026-05-05T17:31:50Z",
|
||||
"pushed_at": "2026-05-05T17:31:47Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-18T02:04:33Z",
|
||||
"updated_at": "2026-05-05T12:09:54Z",
|
||||
"pushed_at": "2026-05-05T12:09:50Z",
|
||||
"updated_at": "2026-05-05T18:45:10Z",
|
||||
"pushed_at": "2026-05-05T18:45:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T10:19:10Z",
|
||||
"updated_at": "2026-05-05T12:09:16Z",
|
||||
"pushed_at": "2026-05-05T12:09:12Z",
|
||||
"updated_at": "2026-05-05T18:44:48Z",
|
||||
"pushed_at": "2026-05-05T18:44:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -151,8 +151,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-27T18:17:43Z",
|
||||
"updated_at": "2026-05-05T12:09:28Z",
|
||||
"pushed_at": "2026-05-05T12:09:24Z",
|
||||
"updated_at": "2026-05-05T18:44:54Z",
|
||||
"pushed_at": "2026-05-05T18:44:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -251,8 +251,8 @@
|
|||
"description": "🚨 Exploit and scan for CVE-2025-55182, a critical React\/Next.js vulnerability enabling remote code execution through prototype pollution techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T16:48:51Z",
|
||||
"updated_at": "2026-05-05T12:09:14Z",
|
||||
"pushed_at": "2026-05-05T12:09:10Z",
|
||||
"updated_at": "2026-05-05T18:44:49Z",
|
||||
"pushed_at": "2026-05-05T18:44:44Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -303,8 +303,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T12:32:19Z",
|
||||
"updated_at": "2026-05-05T12:10:28Z",
|
||||
"pushed_at": "2026-05-05T12:10:24Z",
|
||||
"updated_at": "2026-05-05T18:45:25Z",
|
||||
"pushed_at": "2026-05-05T18:45:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -406,8 +406,8 @@
|
|||
"description": "🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-06-06T16:34:46Z",
|
||||
"updated_at": "2026-05-05T12:09:46Z",
|
||||
"pushed_at": "2026-05-05T12:09:42Z",
|
||||
"updated_at": "2026-05-05T18:45:07Z",
|
||||
"pushed_at": "2026-05-05T18:45:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -458,8 +458,8 @@
|
|||
"description": "⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-15T18:33:34Z",
|
||||
"updated_at": "2026-05-05T12:11:33Z",
|
||||
"pushed_at": "2026-05-05T12:11:30Z",
|
||||
"updated_at": "2026-05-05T18:46:02Z",
|
||||
"pushed_at": "2026-05-05T18:45:58Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1252,7 +1252,7 @@
|
|||
"stargazers_count": 2437,
|
||||
"watchers_count": 2437,
|
||||
"has_discussions": false,
|
||||
"forks_count": 268,
|
||||
"forks_count": 269,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -1260,7 +1260,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 268,
|
||||
"forks": 269,
|
||||
"watchers": 2437,
|
||||
"score": 0,
|
||||
"subscribers_count": 13
|
||||
|
|
@ -12317,8 +12317,8 @@
|
|||
"description": "🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T14:48:19Z",
|
||||
"updated_at": "2026-05-05T12:09:00Z",
|
||||
"pushed_at": "2026-05-05T12:08:56Z",
|
||||
"updated_at": "2026-05-05T18:44:37Z",
|
||||
"pushed_at": "2026-05-05T18:44:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12402,8 +12402,8 @@
|
|||
"description": "🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:44:51Z",
|
||||
"updated_at": "2026-05-05T12:09:17Z",
|
||||
"pushed_at": "2026-05-05T12:09:14Z",
|
||||
"updated_at": "2026-05-05T18:44:47Z",
|
||||
"pushed_at": "2026-05-05T18:44:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12451,8 +12451,8 @@
|
|||
"description": "🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:48:07Z",
|
||||
"updated_at": "2026-05-05T12:09:12Z",
|
||||
"pushed_at": "2026-05-05T12:09:08Z",
|
||||
"updated_at": "2026-05-05T18:44:49Z",
|
||||
"pushed_at": "2026-05-05T18:44:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12536,8 +12536,8 @@
|
|||
"description": "🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-25T19:28:28Z",
|
||||
"updated_at": "2026-05-05T12:10:33Z",
|
||||
"pushed_at": "2026-05-05T12:10:29Z",
|
||||
"updated_at": "2026-05-05T18:45:33Z",
|
||||
"pushed_at": "2026-05-05T18:45:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12738,8 +12738,8 @@
|
|||
"description": "⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-26T22:26:55Z",
|
||||
"updated_at": "2026-05-05T12:11:07Z",
|
||||
"pushed_at": "2026-05-05T12:11:03Z",
|
||||
"updated_at": "2026-05-05T18:45:51Z",
|
||||
"pushed_at": "2026-05-05T18:45:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -13008,8 +13008,8 @@
|
|||
"description": "🛡️ Scan and assess vulnerabilities in Next.js\/Waku with the CVE-2025-55182-Scanner, combining static and dynamic analysis for robust security.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T01:28:57Z",
|
||||
"updated_at": "2026-05-05T12:25:02Z",
|
||||
"pushed_at": "2026-05-05T12:24:57Z",
|
||||
"updated_at": "2026-05-05T18:50:52Z",
|
||||
"pushed_at": "2026-05-05T18:50:48Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -289,8 +289,8 @@
|
|||
"description": "🛠️ Test and validate the CVE-2025-55184 vulnerability in React Server Components to enhance your application's security against denial-of-service attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T05:04:03Z",
|
||||
"updated_at": "2026-05-05T12:25:24Z",
|
||||
"pushed_at": "2026-05-05T12:25:20Z",
|
||||
"updated_at": "2026-05-05T18:51:12Z",
|
||||
"pushed_at": "2026-05-05T18:51:07Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -200,8 +200,8 @@
|
|||
"description": "🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T02:16:04Z",
|
||||
"updated_at": "2026-05-05T07:57:57Z",
|
||||
"pushed_at": "2026-05-05T07:57:53Z",
|
||||
"updated_at": "2026-05-05T13:12:05Z",
|
||||
"pushed_at": "2026-05-05T13:10:57Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-04T15:38:32Z",
|
||||
"updated_at": "2026-05-05T10:54:48Z",
|
||||
"pushed_at": "2026-05-05T10:54:44Z",
|
||||
"updated_at": "2026-05-05T18:09:06Z",
|
||||
"pushed_at": "2026-05-05T18:09:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -179,12 +179,12 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-02T10:34:07Z",
|
||||
"updated_at": "2026-05-05T04:45:40Z",
|
||||
"updated_at": "2026-05-05T18:28:13Z",
|
||||
"pushed_at": "2026-05-05T04:45:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -192,8 +192,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-10T21:07:43Z",
|
||||
"updated_at": "2026-05-05T11:57:01Z",
|
||||
"pushed_at": "2026-05-05T11:56:57Z",
|
||||
"updated_at": "2026-05-05T18:39:28Z",
|
||||
"pushed_at": "2026-05-05T18:39:25Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "Xiongmai XM530 IP Camera Hardcoded RTSP Credentials Exposure",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-17T15:40:32Z",
|
||||
"updated_at": "2025-12-20T11:03:07Z",
|
||||
"updated_at": "2026-05-05T18:14:27Z",
|
||||
"pushed_at": "2025-12-20T11:03:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,8 +27,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -64,8 +64,8 @@
|
|||
"description": "Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-23T09:09:21Z",
|
||||
"updated_at": "2026-05-05T00:29:26Z",
|
||||
"pushed_at": "2026-05-05T00:29:23Z",
|
||||
"updated_at": "2026-05-05T13:52:25Z",
|
||||
"pushed_at": "2026-05-05T13:50:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T07:40:09Z",
|
||||
"updated_at": "2026-05-05T12:12:11Z",
|
||||
"pushed_at": "2026-05-05T12:12:07Z",
|
||||
"updated_at": "2026-05-05T18:46:31Z",
|
||||
"pushed_at": "2026-05-05T18:46:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "🔍 Identify and understand the local privilege escalation vulnerability (CVE-2025-68921) in Nahimic audio software, impacting many gaming laptops.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-24T21:00:41Z",
|
||||
"updated_at": "2026-05-05T07:52:31Z",
|
||||
"pushed_at": "2026-05-05T07:52:27Z",
|
||||
"updated_at": "2026-05-05T13:07:43Z",
|
||||
"pushed_at": "2026-05-05T13:07:39Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "Layer-2 supply-chain hardening for MCP servers — Ed25519-signed tool manifests, runtime spawn-attestation, default-deny argument sanitizer. Defends against marketplace-poisoning + CVE-2025-69256 + CVE-2025-61591.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-27T20:12:08Z",
|
||||
"updated_at": "2026-05-04T03:13:11Z",
|
||||
"pushed_at": "2026-05-04T03:13:06Z",
|
||||
"updated_at": "2026-05-05T16:04:02Z",
|
||||
"pushed_at": "2026-05-05T16:02:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": true,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the \/api\/runscript endpoint.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-10T09:18:30Z",
|
||||
"updated_at": "2026-05-05T00:11:16Z",
|
||||
"pushed_at": "2026-05-05T00:11:13Z",
|
||||
"updated_at": "2026-05-05T13:37:46Z",
|
||||
"pushed_at": "2026-05-05T13:37:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-05-05T00:00:56Z",
|
||||
"pushed_at": "2026-05-05T00:00:52Z",
|
||||
"updated_at": "2026-05-05T13:33:02Z",
|
||||
"pushed_at": "2026-05-05T13:30:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -838,8 +838,8 @@
|
|||
"description": "🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-20T13:52:21Z",
|
||||
"updated_at": "2026-05-05T12:00:24Z",
|
||||
"pushed_at": "2026-05-05T12:00:18Z",
|
||||
"updated_at": "2026-05-05T18:41:28Z",
|
||||
"pushed_at": "2026-05-05T18:41:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-05-05T00:00:56Z",
|
||||
"pushed_at": "2026-05-05T00:00:52Z",
|
||||
"updated_at": "2026-05-05T13:33:02Z",
|
||||
"pushed_at": "2026-05-05T13:30:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1168528859,
|
||||
"name": "CVE-2026-1581-Analysis-Lab",
|
||||
"full_name": "rootdirective-sec\/CVE-2026-1581-Analysis-Lab",
|
||||
"owner": {
|
||||
"login": "rootdirective-sec",
|
||||
"id": 253299769,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/253299769?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootdirective-sec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rootdirective-sec\/CVE-2026-1581-Analysis-Lab",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-02-27T13:52:57Z",
|
||||
"updated_at": "2026-03-12T11:35:53Z",
|
||||
"pushed_at": "2026-02-27T13:59:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad via markdown links exploiting unsecured URL protocols.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-22T12:19:06Z",
|
||||
"updated_at": "2026-05-04T23:59:12Z",
|
||||
"pushed_at": "2026-05-04T23:59:09Z",
|
||||
"updated_at": "2026-05-05T13:30:37Z",
|
||||
"pushed_at": "2026-05-05T13:29:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad versions below 11.2510 using the CVE-2026-20841 proof of concept.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-26T05:21:28Z",
|
||||
"updated_at": "2026-05-04T18:26:09Z",
|
||||
"pushed_at": "2026-05-04T18:26:06Z",
|
||||
"updated_at": "2026-05-05T13:30:38Z",
|
||||
"pushed_at": "2026-05-05T13:28:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -34,7 +34,7 @@
|
|||
"tool"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
|||
|
|
@ -1,70 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1168062651,
|
||||
"name": "CVE-2026-21852-PoC",
|
||||
"full_name": "atiilla\/CVE-2026-21852-PoC",
|
||||
"owner": {
|
||||
"login": "atiilla",
|
||||
"id": 9992685,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9992685?v=4",
|
||||
"html_url": "https:\/\/github.com\/atiilla",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/atiilla\/CVE-2026-21852-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-02-27T01:13:21Z",
|
||||
"updated_at": "2026-04-11T02:02:51Z",
|
||||
"pushed_at": "2026-02-27T05:12:39Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1168767224,
|
||||
"name": "CVE-Archive",
|
||||
"full_name": "M0broot\/CVE-Archive",
|
||||
"owner": {
|
||||
"login": "M0broot",
|
||||
"id": 121744525,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121744525?v=4",
|
||||
"html_url": "https:\/\/github.com\/M0broot",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/M0broot\/CVE-Archive",
|
||||
"description": "Claude Code Vulnerability [CVE-2026-21852]",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-27T19:18:11Z",
|
||||
"updated_at": "2026-02-27T19:18:12Z",
|
||||
"pushed_at": "2026-02-27T19:18:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1215681296,
|
||||
"name": "ai-ide-config-guard",
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1169211294,
|
||||
"name": "watchTowr-vs-JunosEvolved-CVE-2026-21902",
|
||||
"full_name": "watchtowrlabs\/watchTowr-vs-JunosEvolved-CVE-2026-21902",
|
||||
"owner": {
|
||||
"login": "watchtowrlabs",
|
||||
"id": 99977116,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99977116?v=4",
|
||||
"html_url": "https:\/\/github.com\/watchtowrlabs",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/watchtowrlabs\/watchTowr-vs-JunosEvolved-CVE-2026-21902",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-02-28T10:43:32Z",
|
||||
"updated_at": "2026-03-19T13:02:48Z",
|
||||
"pushed_at": "2026-03-03T11:04:40Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": false,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Critical RCE vulnerability (CVSS 9.3) in Weaver E-cology platform versions prior to build 20260312. Unauthenticated remote code execution via exposed debug endpoint at \/papi\/esearch\/data\/devops\/dubboApi\/debug\/method. Comprehensive analysis, proof-of-concept, and detection guidance included.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-16T13:55:42Z",
|
||||
"updated_at": "2026-04-16T14:12:54Z",
|
||||
"updated_at": "2026-05-05T14:24:30Z",
|
||||
"pushed_at": "2026-04-16T13:56:56Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
|||
|
|
@ -1,42 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1169798784,
|
||||
"name": "CVE-2026-23842-Denial-of-Service-via-Database-Connection-Pool-Exhaustion-version-1.2.10",
|
||||
"full_name": "AdityaBhatt3010\/CVE-2026-23842-Denial-of-Service-via-Database-Connection-Pool-Exhaustion-version-1.2.10",
|
||||
"owner": {
|
||||
"login": "AdityaBhatt3010",
|
||||
"id": 96762636,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96762636?v=4",
|
||||
"html_url": "https:\/\/github.com\/AdityaBhatt3010",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AdityaBhatt3010\/CVE-2026-23842-Denial-of-Service-via-Database-Connection-Pool-Exhaustion-version-1.2.10",
|
||||
"description": "CVE-2026-23842 — High severity Denial-of-Service vulnerability caused by SQLAlchemy connection pool exhaustion in concurrent get_response() calls in ChatterBot ≤ 1.2.10.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-01T08:23:17Z",
|
||||
"updated_at": "2026-05-04T07:51:56Z",
|
||||
"pushed_at": "2026-03-01T08:33:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"chatterbot",
|
||||
"cve",
|
||||
"cybersecurity",
|
||||
"dos",
|
||||
"exploit",
|
||||
"race-conditions"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "Elite reconnaissance script for auditing Apache's HTTP\/2 stack against memory corruption (CVE-2026-23918). Features ALPN protocol forcing and monochrome dashboard intelligence. Built for Blue Teams and Security Researchers.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T09:52:27Z",
|
||||
"updated_at": "2026-05-05T11:03:28Z",
|
||||
"updated_at": "2026-05-05T14:07:40Z",
|
||||
"pushed_at": "2026-05-05T11:03:24Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,7 +27,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
@ -47,8 +47,41 @@
|
|||
"description": "This repository contains a Proof of Concept (PoC) demonstrating the Double Free vulnerability (CVE-2026-23918) in Apache HTTP Server 2.4.66 `mod_http2`.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T11:31:35Z",
|
||||
"updated_at": "2026-05-05T11:33:34Z",
|
||||
"pushed_at": "2026-05-05T11:33:30Z",
|
||||
"updated_at": "2026-05-05T15:16:24Z",
|
||||
"pushed_at": "2026-05-05T15:04:59Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1229902051,
|
||||
"name": "Apache-CVE-2026-23918-fix",
|
||||
"full_name": "rshosting\/Apache-CVE-2026-23918-fix",
|
||||
"owner": {
|
||||
"login": "rshosting",
|
||||
"id": 109739592,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109739592?v=4",
|
||||
"html_url": "https:\/\/github.com\/rshosting",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rshosting\/Apache-CVE-2026-23918-fix",
|
||||
"description": "Upgrade to Apache 2.4.67 to fix CVE-2026-23918 vulneribility",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T13:44:40Z",
|
||||
"updated_at": "2026-05-05T15:09:34Z",
|
||||
"pushed_at": "2026-05-05T15:08:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -64,5 +97,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230131993,
|
||||
"name": "CVE-2026-23918-Passive-Audit",
|
||||
"full_name": "aa022\/CVE-2026-23918-Passive-Audit",
|
||||
"owner": {
|
||||
"login": "aa022",
|
||||
"id": 117016786,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117016786?v=4",
|
||||
"html_url": "https:\/\/github.com\/aa022",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/aa022\/CVE-2026-23918-Passive-Audit",
|
||||
"description": "Passive HTTP metadata auditor for CVE-2026-23918 exposure triage",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T17:55:08Z",
|
||||
"updated_at": "2026-05-05T18:39:57Z",
|
||||
"pushed_at": "2026-05-05T18:39:53Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": true,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Analyze and detect CVE-2026-2406 vulnerabilities in Telnet to enhance security and prevent unauthorized access with this professional research engine.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-16T07:20:12Z",
|
||||
"updated_at": "2026-05-05T08:12:10Z",
|
||||
"pushed_at": "2026-05-05T08:12:07Z",
|
||||
"updated_at": "2026-05-05T13:23:17Z",
|
||||
"pushed_at": "2026-05-05T13:20:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "🚨 Exploit CVE-2026-24061, a critical remote authentication bypass in GNU inetutils-telnetd, for instant root shell access without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-03T19:46:10Z",
|
||||
"updated_at": "2026-05-05T08:06:00Z",
|
||||
"pushed_at": "2026-05-05T08:05:57Z",
|
||||
"updated_at": "2026-05-05T13:17:49Z",
|
||||
"pushed_at": "2026-05-05T13:15:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -116,39 +116,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1171299106,
|
||||
"name": "telnetd",
|
||||
"full_name": "setuju\/telnetd",
|
||||
"owner": {
|
||||
"login": "setuju",
|
||||
"id": 75092451,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75092451?v=4",
|
||||
"html_url": "https:\/\/github.com\/setuju",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/setuju\/telnetd",
|
||||
"description": "Idk what to do here, ill edit soon, but its for the telnetd CVE-2026-24061",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-03T04:31:50Z",
|
||||
"updated_at": "2026-04-02T11:47:27Z",
|
||||
"pushed_at": "2026-03-03T04:33:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1171391359,
|
||||
"name": "CVE-2026-24061",
|
||||
|
|
|
|||
35
2026/CVE-2026-24072.json
Normal file
35
2026/CVE-2026-24072.json
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 1230175570,
|
||||
"name": "CVE-2026-24072-Analysis",
|
||||
"full_name": "EricRHancock-coder\/CVE-2026-24072-Analysis",
|
||||
"owner": {
|
||||
"login": "EricRHancock-coder",
|
||||
"id": 274313372,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/274313372?v=4",
|
||||
"html_url": "https:\/\/github.com\/EricRHancock-coder",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/EricRHancock-coder\/CVE-2026-24072-Analysis",
|
||||
"description": "Analysis of CVE-2026-24072",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T18:48:29Z",
|
||||
"updated_at": "2026-05-05T18:48:30Z",
|
||||
"pushed_at": "2026-05-05T18:48:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "Exploit Windows local privilege escalation on clients and servers using tested code for CVE-2026-24291 across multiple Windows versions",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-26T04:38:27Z",
|
||||
"updated_at": "2026-05-04T18:49:16Z",
|
||||
"pushed_at": "2026-05-04T18:49:12Z",
|
||||
"updated_at": "2026-05-05T14:01:44Z",
|
||||
"pushed_at": "2026-05-05T13:58:15Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1170127318,
|
||||
"name": "CVE-2026-2441-PoC",
|
||||
"full_name": "D3b0j33t\/CVE-2026-2441-PoC",
|
||||
"owner": {
|
||||
"login": "D3b0j33t",
|
||||
"id": 161986304,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161986304?v=4",
|
||||
"html_url": "https:\/\/github.com\/D3b0j33t",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/D3b0j33t\/CVE-2026-2441-PoC",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-01T18:34:18Z",
|
||||
"updated_at": "2026-03-01T18:36:45Z",
|
||||
"pushed_at": "2026-03-01T18:36:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1171705096,
|
||||
"name": "CVE-2026-2441-PoC",
|
||||
|
|
@ -47,8 +14,8 @@
|
|||
"description": "Demonstrate a proof-of-concept exploit for CVE-2026-2441, a high-risk Chrome use-after-free vulnerability in the Blink CSS engine.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-03T14:19:18Z",
|
||||
"updated_at": "2026-05-05T00:04:00Z",
|
||||
"pushed_at": "2026-05-05T00:03:56Z",
|
||||
"updated_at": "2026-05-05T13:32:58Z",
|
||||
"pushed_at": "2026-05-05T13:32:40Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,55 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1168579521,
|
||||
"name": "CVE-2026-2472-Vertex-AI-SDK-Google-Cloud",
|
||||
"full_name": "JoshuaProvoste\/CVE-2026-2472-Vertex-AI-SDK-Google-Cloud",
|
||||
"owner": {
|
||||
"login": "JoshuaProvoste",
|
||||
"id": 8358462,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8358462?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoshuaProvoste",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoshuaProvoste\/CVE-2026-2472-Vertex-AI-SDK-Google-Cloud",
|
||||
"description": "Technical PoC for CVE-2026-2472 (GCP-2026-011): Unauthenticated and Stored Cross-Site Scripting (XSS) in google-cloud-aiplatform _genai\/_evals_visualization (Vertex AI Python SDK) affecting Jupyter\/Colab.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-27T14:57:39Z",
|
||||
"updated_at": "2026-02-28T09:17:29Z",
|
||||
"pushed_at": "2026-02-27T17:32:33Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"colab",
|
||||
"colab-notebook",
|
||||
"cve-2026-2472",
|
||||
"gcp-2026-011",
|
||||
"google",
|
||||
"google-cloud",
|
||||
"google-cloud-platform",
|
||||
"jupyter",
|
||||
"jupyter-notebook",
|
||||
"python-aiplatform",
|
||||
"vertex-ai",
|
||||
"vertex-ai-sdk",
|
||||
"xss",
|
||||
"xss-exploitation",
|
||||
"xss-injection",
|
||||
"xss-payloads",
|
||||
"xss-vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1177953316,
|
||||
"name": "CVE-2026-2472-Vertex-AI-SDK-Google-Cloud",
|
||||
|
|
@ -65,10 +14,10 @@
|
|||
"description": "Expose and detail an unauthenticated stored XSS vulnerability in the Google Cloud Vertex AI Python SDK affecting versions 1.98.0 to 1.130.9.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-10T14:40:04Z",
|
||||
"updated_at": "2026-05-05T00:14:44Z",
|
||||
"pushed_at": "2026-05-05T00:14:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"updated_at": "2026-05-05T13:40:55Z",
|
||||
"pushed_at": "2026-05-05T13:39:33Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -95,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit Frigate NVR ≤0.16.3 to execute commands remotely by abusing a configuration flaw without needing shell access or output capture.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-07T20:23:08Z",
|
||||
"updated_at": "2026-05-04T18:34:20Z",
|
||||
"pushed_at": "2026-05-04T18:34:16Z",
|
||||
"updated_at": "2026-05-05T13:38:04Z",
|
||||
"pushed_at": "2026-05-05T13:37:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,21 +1,21 @@
|
|||
[
|
||||
{
|
||||
"id": 1170340021,
|
||||
"name": "CVE-2026-25940",
|
||||
"full_name": "dajneem23\/CVE-2026-25940",
|
||||
"id": 1213181609,
|
||||
"name": "cve-2026-26114",
|
||||
"full_name": "huynambka\/cve-2026-26114",
|
||||
"owner": {
|
||||
"login": "dajneem23",
|
||||
"id": 56623206,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56623206?v=4",
|
||||
"html_url": "https:\/\/github.com\/dajneem23",
|
||||
"login": "huynambka",
|
||||
"id": 109231260,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109231260?v=4",
|
||||
"html_url": "https:\/\/github.com\/huynambka",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dajneem23\/CVE-2026-25940",
|
||||
"html_url": "https:\/\/github.com\/huynambka\/cve-2026-26114",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-02T02:32:14Z",
|
||||
"updated_at": "2026-03-02T02:32:20Z",
|
||||
"pushed_at": "2026-03-02T02:32:17Z",
|
||||
"created_at": "2026-04-17T05:56:51Z",
|
||||
"updated_at": "2026-05-05T13:03:32Z",
|
||||
"pushed_at": "2026-05-05T13:03:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
35
2026/CVE-2026-26268.json
Normal file
35
2026/CVE-2026-26268.json
Normal file
|
|
@ -0,0 +1,35 @@
|
|||
[
|
||||
{
|
||||
"id": 1229974205,
|
||||
"name": "agentic-ioc-scanner",
|
||||
"full_name": "dhawaldesai\/agentic-ioc-scanner",
|
||||
"owner": {
|
||||
"login": "dhawaldesai",
|
||||
"id": 72374486,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72374486?v=4",
|
||||
"html_url": "https:\/\/github.com\/dhawaldesai",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dhawaldesai\/agentic-ioc-scanner",
|
||||
"description": "IOC scanner for agentic AI coding tools — detects Mini Shai-Hulud, Gemini CLI RCE, Cursor CVE-2026-26268, and DPRK PromptMink.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T14:57:30Z",
|
||||
"updated_at": "2026-05-05T18:37:41Z",
|
||||
"pushed_at": "2026-05-05T17:32:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1166040116,
|
||||
"name": "Centreon-Exploits-2026",
|
||||
"full_name": "hakaioffsec\/Centreon-Exploits-2026",
|
||||
"owner": {
|
||||
"login": "hakaioffsec",
|
||||
"id": 99059183,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99059183?v=4",
|
||||
"html_url": "https:\/\/github.com\/hakaioffsec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hakaioffsec\/Centreon-Exploits-2026",
|
||||
"description": "Centreon exploits CVE-2026-2749, CVE-2026-2751 and CVE-2026-2750",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-24T20:17:49Z",
|
||||
"updated_at": "2026-03-08T16:16:20Z",
|
||||
"pushed_at": "2026-03-02T17:54:39Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,42 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1169806761,
|
||||
"name": "CVE-2026-27579-CORS-Misconfiguration-Leading-to-Authenticated-Data-Exposure",
|
||||
"full_name": "AdityaBhatt3010\/CVE-2026-27579-CORS-Misconfiguration-Leading-to-Authenticated-Data-Exposure",
|
||||
"owner": {
|
||||
"login": "AdityaBhatt3010",
|
||||
"id": 96762636,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96762636?v=4",
|
||||
"html_url": "https:\/\/github.com\/AdityaBhatt3010",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/AdityaBhatt3010\/CVE-2026-27579-CORS-Misconfiguration-Leading-to-Authenticated-Data-Exposure",
|
||||
"description": "CVE-2026-27579 - CORS Misconfiguration – Arbitrary Origin with Credentials → Authenticated Cross-Origin Account Data Exposure",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-01T08:41:29Z",
|
||||
"updated_at": "2026-05-04T07:51:55Z",
|
||||
"pushed_at": "2026-03-01T08:48:41Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"collab",
|
||||
"cors",
|
||||
"cross-origin-resource-sharing",
|
||||
"cve",
|
||||
"cybersecurity",
|
||||
"exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -32,39 +32,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1168949890,
|
||||
"name": "CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation-main",
|
||||
"full_name": "kalibb\/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation-main",
|
||||
"owner": {
|
||||
"login": "kalibb",
|
||||
"id": 92959307,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92959307?v=4",
|
||||
"html_url": "https:\/\/github.com\/kalibb",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kalibb\/CVE-2026-28372-GNU-inetutils-telnetd-Privilege-Escalation-main",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-02-28T01:28:54Z",
|
||||
"updated_at": "2026-02-28T01:32:37Z",
|
||||
"pushed_at": "2026-02-28T01:32:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1175014507,
|
||||
"name": "CVE-2026-28372-telnetd-Privilege-Escalation",
|
||||
|
|
|
|||
|
|
@ -499,5 +499,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1229982662,
|
||||
"name": "Principal-HackTheBox",
|
||||
"full_name": "ledksv\/Principal-HackTheBox",
|
||||
"owner": {
|
||||
"login": "ledksv",
|
||||
"id": 247032962,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/247032962?v=4",
|
||||
"html_url": "https:\/\/github.com\/ledksv",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ledksv\/Principal-HackTheBox",
|
||||
"description": "Writeup for Principal — HackTheBox Medium Linux box. CVE-2026-29000 pac4j JWT bypass, credentials from API settings, SSH CA privesc to root.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T15:06:20Z",
|
||||
"updated_at": "2026-05-05T15:11:28Z",
|
||||
"pushed_at": "2026-05-05T15:06:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -62,8 +62,8 @@
|
|||
"description": "Explore a PoC for CVE-2026-2991, an auth bypass in KiviCare 4.1.2 and earlier via the patient social-login REST endpoint",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-03T20:26:43Z",
|
||||
"updated_at": "2026-05-05T00:39:32Z",
|
||||
"pushed_at": "2026-05-05T00:39:29Z",
|
||||
"updated_at": "2026-05-05T14:03:15Z",
|
||||
"pushed_at": "2026-05-05T14:02:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "Copy Fail (CVE-2026-31431): 9-year-old Linux kernel LPE found by Theori's Xint Code",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T12:15:28Z",
|
||||
"updated_at": "2026-05-05T12:53:20Z",
|
||||
"updated_at": "2026-05-05T18:49:46Z",
|
||||
"pushed_at": "2026-04-29T21:21:46Z",
|
||||
"stargazers_count": 3241,
|
||||
"watchers_count": 3241,
|
||||
"stargazers_count": 3290,
|
||||
"watchers_count": 3290,
|
||||
"has_discussions": false,
|
||||
"forks_count": 695,
|
||||
"forks_count": 706,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -38,8 +38,8 @@
|
|||
"xint-code"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 695,
|
||||
"watchers": 3241,
|
||||
"forks": 706,
|
||||
"watchers": 3290,
|
||||
"score": 0,
|
||||
"subscribers_count": 29
|
||||
},
|
||||
|
|
@ -96,7 +96,7 @@
|
|||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -104,7 +104,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"forks": 11,
|
||||
"watchers": 68,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
@ -124,12 +124,12 @@
|
|||
"description": "A Go implementation of copyfail (CVE-2026-31431)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T22:51:24Z",
|
||||
"updated_at": "2026-05-05T08:34:55Z",
|
||||
"updated_at": "2026-05-05T16:45:51Z",
|
||||
"pushed_at": "2026-05-01T03:24:14Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"stargazers_count": 318,
|
||||
"watchers_count": 318,
|
||||
"has_discussions": false,
|
||||
"forks_count": 62,
|
||||
"forks_count": 63,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -137,8 +137,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 62,
|
||||
"watchers": 313,
|
||||
"forks": 63,
|
||||
"watchers": 318,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
@ -157,12 +157,12 @@
|
|||
"description": "Cross-platform C port of the Copy Fail Linux LPE (CVE-2026-31431). Disclosed 2026-04-29 by Theori \/ Xint.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T23:29:14Z",
|
||||
"updated_at": "2026-05-05T12:26:32Z",
|
||||
"updated_at": "2026-05-05T16:33:23Z",
|
||||
"pushed_at": "2026-04-30T17:04:09Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"has_discussions": true,
|
||||
"forks_count": 81,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -183,8 +183,8 @@
|
|||
"security-research"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 81,
|
||||
"watchers": 291,
|
||||
"forks": 83,
|
||||
"watchers": 294,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
@ -203,12 +203,12 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T00:11:10Z",
|
||||
"updated_at": "2026-05-05T03:16:11Z",
|
||||
"updated_at": "2026-05-05T16:31:50Z",
|
||||
"pushed_at": "2026-04-30T00:15:44Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -216,8 +216,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"forks": 7,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -450,12 +450,12 @@
|
|||
"description": "CVE-2026-31431 纯文件利用",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T02:55:03Z",
|
||||
"updated_at": "2026-05-05T09:58:53Z",
|
||||
"updated_at": "2026-05-05T16:00:23Z",
|
||||
"pushed_at": "2026-04-30T16:24:17Z",
|
||||
"stargazers_count": 78,
|
||||
"watchers_count": 78,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -463,8 +463,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 78,
|
||||
"forks": 26,
|
||||
"watchers": 80,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -681,10 +681,10 @@
|
|||
"description": "Rust implementation Exploit\/PoC of CVE-2026-31431-Linux-Copy-Fail, allow executing customized shellcode (such as Meterpreter).",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T04:16:32Z",
|
||||
"updated_at": "2026-05-05T11:59:41Z",
|
||||
"updated_at": "2026-05-05T14:49:51Z",
|
||||
"pushed_at": "2026-04-30T15:39:36Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
|
@ -709,7 +709,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -728,10 +728,10 @@
|
|||
"description": "CVE-2026-31431: Copy Fail | A minimal exploit for Linux authencesn + AF_ALG + splice() page cache write.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T04:25:00Z",
|
||||
"updated_at": "2026-04-30T04:29:17Z",
|
||||
"updated_at": "2026-05-05T15:32:26Z",
|
||||
"pushed_at": "2026-04-30T04:30:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -742,7 +742,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -1322,10 +1322,10 @@
|
|||
"description": "AI for Work. x86_64 tested",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T07:41:25Z",
|
||||
"updated_at": "2026-05-01T11:43:29Z",
|
||||
"updated_at": "2026-05-05T18:23:32Z",
|
||||
"pushed_at": "2026-05-01T11:43:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1336,7 +1336,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -1487,10 +1487,10 @@
|
|||
"description": "Detection, mitigation, and IOC toolkit for Copy Fail CVE-2026-31431 Linux kernel page-cache privilege escalation",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T09:02:51Z",
|
||||
"updated_at": "2026-05-05T07:48:43Z",
|
||||
"updated_at": "2026-05-05T16:10:13Z",
|
||||
"pushed_at": "2026-04-30T09:21:00Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1511,7 +1511,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 25,
|
||||
"watchers": 30,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -1932,10 +1932,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T10:49:03Z",
|
||||
"updated_at": "2026-05-03T06:28:19Z",
|
||||
"updated_at": "2026-05-05T15:09:14Z",
|
||||
"pushed_at": "2026-04-30T13:19:29Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1946,7 +1946,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -2061,13 +2061,13 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Percivalll\/Copy-Fail-CVE-2026-31431-Kubernetes-PoC",
|
||||
"description": null,
|
||||
"description": "PoC: fully unprivileged container escape to node-level code execution on Kubernetes via CVE-2026-31431 page-cache corruption + shared image layers. Validated on Alibaba Cloud ACK and Amazon EKS.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T11:33:22Z",
|
||||
"updated_at": "2026-05-05T12:44:32Z",
|
||||
"pushed_at": "2026-05-05T12:44:28Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"updated_at": "2026-05-05T16:37:36Z",
|
||||
"pushed_at": "2026-05-05T13:40:57Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
|
@ -2075,10 +2075,21 @@
|
|||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"container-escape",
|
||||
"cve-2026-31431",
|
||||
"eks",
|
||||
"exploit",
|
||||
"kubernetes",
|
||||
"linux-kernel",
|
||||
"privilege-escalation",
|
||||
"proof-of-concept",
|
||||
"security-research",
|
||||
"vulnerability"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -2202,8 +2213,8 @@
|
|||
"description": "CVE-2026-31431 golang hotfix",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T12:27:15Z",
|
||||
"updated_at": "2026-05-05T03:16:41Z",
|
||||
"pushed_at": "2026-05-05T03:17:23Z",
|
||||
"updated_at": "2026-05-05T17:28:18Z",
|
||||
"pushed_at": "2026-05-05T17:28:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -2775,10 +2786,10 @@
|
|||
"description": "BPF-LSM mitigation for CVE-2026-31431 (Copy Fail) — denies AF_ALG socket creation cluster-wide",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T15:02:00Z",
|
||||
"updated_at": "2026-05-05T06:28:49Z",
|
||||
"updated_at": "2026-05-05T13:20:36Z",
|
||||
"pushed_at": "2026-04-30T15:16:29Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -2789,7 +2800,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -3437,10 +3448,10 @@
|
|||
"description": "Detection Only.. working on an exploit PoC",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T20:54:56Z",
|
||||
"updated_at": "2026-05-05T05:41:10Z",
|
||||
"updated_at": "2026-05-05T14:49:29Z",
|
||||
"pushed_at": "2026-05-01T11:26:51Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -3451,7 +3462,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -3470,10 +3481,10 @@
|
|||
"description": "Wazuh 4.14.4 detection rules for CVE-2026-31431 (Copy Fail) - Linux Local Privilege Escalation via authencesn page cache write",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T20:56:49Z",
|
||||
"updated_at": "2026-05-04T16:41:33Z",
|
||||
"updated_at": "2026-05-05T17:29:32Z",
|
||||
"pushed_at": "2026-05-04T14:42:14Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -3496,7 +3507,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -4151,10 +4162,10 @@
|
|||
"description": "Python implementation of copyfail (CVE-2026-31431)",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-01T05:37:29Z",
|
||||
"updated_at": "2026-05-01T05:46:12Z",
|
||||
"updated_at": "2026-05-05T15:20:58Z",
|
||||
"pushed_at": "2026-05-01T05:44:12Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -4165,7 +4176,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -4583,10 +4594,10 @@
|
|||
"description": "A structured explanation of CVE-2026-31431 (Copy Fail), connecting the three kernel changes that introduced the vulnerability and enabled its exploitation.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-01T11:06:03Z",
|
||||
"updated_at": "2026-05-05T10:11:16Z",
|
||||
"updated_at": "2026-05-05T17:33:59Z",
|
||||
"pushed_at": "2026-05-05T10:07:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -4600,7 +4611,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -4789,8 +4800,8 @@
|
|||
"description": "CVE-2026-31431 - Copy Fail | Linux LPE via authencesn page cache write. Unprivileged user to root on most distros since 2017. PoC in C and Python.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-01T12:47:26Z",
|
||||
"updated_at": "2026-05-02T17:28:25Z",
|
||||
"pushed_at": "2026-05-01T15:00:24Z",
|
||||
"updated_at": "2026-05-05T15:41:01Z",
|
||||
"pushed_at": "2026-05-05T15:40:57Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -4940,10 +4951,10 @@
|
|||
"description": "Python exploit demonstrating an in‑memory AF_ALG‑based kernel vulnerability on certain Linux kernels. ",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-01T14:14:17Z",
|
||||
"updated_at": "2026-05-03T12:33:47Z",
|
||||
"updated_at": "2026-05-05T17:29:34Z",
|
||||
"pushed_at": "2026-05-01T14:16:41Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -4954,7 +4965,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -5745,10 +5756,10 @@
|
|||
"description": "Read-only checker for CVE-2026-31431 (algif_aead local root). Reports kernel\/module state and suggests mitigations.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T04:17:15Z",
|
||||
"updated_at": "2026-05-03T12:27:39Z",
|
||||
"pushed_at": "2026-05-03T12:27:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"updated_at": "2026-05-05T16:04:45Z",
|
||||
"pushed_at": "2026-05-05T16:03:31Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -5759,7 +5770,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -5811,10 +5822,10 @@
|
|||
"description": "CopyFail is a proof-of-concept exploit for CVE-2026-31431, targeting a memory corruption vulnerability in the Linux Kernel Crypto API (`AF_ALG`). The exploit leverages the `splice` system call to perform unauthorized page-cache patching of the `\/usr\/bin\/su` binary, enabling a password-less escalation to root.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T05:44:02Z",
|
||||
"updated_at": "2026-05-05T03:01:27Z",
|
||||
"updated_at": "2026-05-05T15:56:29Z",
|
||||
"pushed_at": "2026-05-02T06:04:26Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -5825,7 +5836,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -6118,8 +6129,8 @@
|
|||
"description": "Tracking CVE-2026-31431",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T10:22:01Z",
|
||||
"updated_at": "2026-05-05T12:41:40Z",
|
||||
"pushed_at": "2026-05-05T12:41:36Z",
|
||||
"updated_at": "2026-05-05T18:36:28Z",
|
||||
"pushed_at": "2026-05-05T18:36:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -6151,10 +6162,10 @@
|
|||
"description": "CVE-2026-31431 RCE Exploit. A critical Linux kernel LPE in the algif_aead crypto subsystem. Any unprivileged user can write 4 bytes into the page cache of any readable file and get root.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T10:37:47Z",
|
||||
"updated_at": "2026-05-02T11:00:16Z",
|
||||
"updated_at": "2026-05-05T17:01:31Z",
|
||||
"pushed_at": "2026-05-02T11:00:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -6174,7 +6185,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -6428,8 +6439,8 @@
|
|||
"description": "Detect and mitigate CVE-2026-31431 (Copy Fail) on Linux systems.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T17:20:10Z",
|
||||
"updated_at": "2026-05-04T13:24:52Z",
|
||||
"pushed_at": "2026-05-04T13:24:49Z",
|
||||
"updated_at": "2026-05-05T13:52:55Z",
|
||||
"pushed_at": "2026-05-05T13:50:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -6534,8 +6545,8 @@
|
|||
"description": "Golf Challenge for https:\/\/copy.golf\/ ",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-02T22:10:37Z",
|
||||
"updated_at": "2026-05-02T22:15:31Z",
|
||||
"pushed_at": "2026-05-02T22:15:19Z",
|
||||
"updated_at": "2026-05-05T14:18:37Z",
|
||||
"pushed_at": "2026-05-05T14:16:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -7438,10 +7449,10 @@
|
|||
"description": "Safe detection tooling for CVE-2026-31431 \"Copy Fail\" — a local privilege escalation in the Linux kernel's algif_aead module affecting all major distributions since 2017.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-04T05:58:50Z",
|
||||
"updated_at": "2026-05-05T08:33:58Z",
|
||||
"updated_at": "2026-05-05T17:51:45Z",
|
||||
"pushed_at": "2026-05-05T05:09:14Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -7452,7 +7463,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -7683,8 +7694,8 @@
|
|||
"description": "Mitigacion del CVE-2026-31431 BASH",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-04T13:09:07Z",
|
||||
"updated_at": "2026-05-04T17:17:37Z",
|
||||
"pushed_at": "2026-05-04T17:17:33Z",
|
||||
"updated_at": "2026-05-05T18:41:17Z",
|
||||
"pushed_at": "2026-05-05T18:41:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -8114,8 +8125,8 @@
|
|||
"description": "587-byte x86_64 LPE for CVE-2026-31431",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T11:26:41Z",
|
||||
"updated_at": "2026-05-05T12:05:30Z",
|
||||
"pushed_at": "2026-05-05T12:05:26Z",
|
||||
"updated_at": "2026-05-05T14:34:23Z",
|
||||
"pushed_at": "2026-05-05T14:27:38Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -8131,5 +8142,250 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1229910115,
|
||||
"name": "cve-2026-31431",
|
||||
"full_name": "zhanghangorg\/cve-2026-31431",
|
||||
"owner": {
|
||||
"login": "zhanghangorg",
|
||||
"id": 16233932,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16233932?v=4",
|
||||
"html_url": "https:\/\/github.com\/zhanghangorg",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/zhanghangorg\/cve-2026-31431",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T13:52:50Z",
|
||||
"updated_at": "2026-05-05T13:54:59Z",
|
||||
"pushed_at": "2026-05-05T13:54:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1229911854,
|
||||
"name": "afalg-check",
|
||||
"full_name": "itsystem\/afalg-check",
|
||||
"owner": {
|
||||
"login": "itsystem",
|
||||
"id": 1128987,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1128987?v=4",
|
||||
"html_url": "https:\/\/github.com\/itsystem",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/itsystem\/afalg-check",
|
||||
"description": "Утилита для Linux, которая проверяет доступность `AF_ALG`\/`algif_aead` и помогает оценить риск по `CVE-2026-31431`.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T13:54:41Z",
|
||||
"updated_at": "2026-05-05T14:32:55Z",
|
||||
"pushed_at": "2026-05-05T14:29:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230051555,
|
||||
"name": "CVE-2026-31431-detection-defense",
|
||||
"full_name": "Detect-DefenseLab\/CVE-2026-31431-detection-defense",
|
||||
"owner": {
|
||||
"login": "Detect-DefenseLab",
|
||||
"id": 252365232,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/252365232?v=4",
|
||||
"html_url": "https:\/\/github.com\/Detect-DefenseLab",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Detect-DefenseLab\/CVE-2026-31431-detection-defense",
|
||||
"description": "CVE-2026-31431: Detection & Defense Against io_uring Bypass of Existing Detection",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T16:20:45Z",
|
||||
"updated_at": "2026-05-05T16:23:28Z",
|
||||
"pushed_at": "2026-05-05T16:23:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230060787,
|
||||
"name": "CVE-2026-31431-copy-fail",
|
||||
"full_name": "ozergoker\/CVE-2026-31431-copy-fail",
|
||||
"owner": {
|
||||
"login": "ozergoker",
|
||||
"id": 86879266,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
||||
"html_url": "https:\/\/github.com\/ozergoker",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ozergoker\/CVE-2026-31431-copy-fail",
|
||||
"description": "32-byte Python script roots every Linux distribution",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T16:31:16Z",
|
||||
"updated_at": "2026-05-05T16:42:06Z",
|
||||
"pushed_at": "2026-05-05T16:42:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230118294,
|
||||
"name": "CopyFail-Scanner-CVE-2026-31431",
|
||||
"full_name": "Raptoratack\/CopyFail-Scanner-CVE-2026-31431",
|
||||
"owner": {
|
||||
"login": "Raptoratack",
|
||||
"id": 110591178,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110591178?v=4",
|
||||
"html_url": "https:\/\/github.com\/Raptoratack",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Raptoratack\/CopyFail-Scanner-CVE-2026-31431",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T17:38:43Z",
|
||||
"updated_at": "2026-05-05T17:40:49Z",
|
||||
"pushed_at": "2026-05-05T17:40:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230156036,
|
||||
"name": "CVE-2026-31431",
|
||||
"full_name": "devtint\/CVE-2026-31431",
|
||||
"owner": {
|
||||
"login": "devtint",
|
||||
"id": 188316439,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/188316439?v=4",
|
||||
"html_url": "https:\/\/github.com\/devtint",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/devtint\/CVE-2026-31431",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T18:24:20Z",
|
||||
"updated_at": "2026-05-05T18:25:38Z",
|
||||
"pushed_at": "2026-05-05T18:25:34Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1230157973,
|
||||
"name": "ubuntu-cve-2026-31431-mitigation",
|
||||
"full_name": "mrmtwoj\/ubuntu-cve-2026-31431-mitigation",
|
||||
"owner": {
|
||||
"login": "mrmtwoj",
|
||||
"id": 22832463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mrmtwoj\/ubuntu-cve-2026-31431-mitigation",
|
||||
"description": "دستورالعملهای کاهش ریسک و بهروزرسانی برای CVE-2026-31431 در سیستمهای اوبونتو، شامل مراحل ارتقاء کرنل و kmod.",
|
||||
"fork": false,
|
||||
"created_at": "2026-05-05T18:26:46Z",
|
||||
"updated_at": "2026-05-05T18:50:49Z",
|
||||
"pushed_at": "2026-05-05T18:50:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2026-31431",
|
||||
"infra",
|
||||
"kernel",
|
||||
"kmod",
|
||||
"linux",
|
||||
"mirror",
|
||||
"mirror-iran",
|
||||
"offline-mirror",
|
||||
"security",
|
||||
"sysadmin",
|
||||
"ubuntu",
|
||||
"update"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-05-04T22:03:22Z",
|
||||
"updated_at": "2026-05-04T22:21:40Z",
|
||||
"pushed_at": "2026-05-04T22:21:33Z",
|
||||
"updated_at": "2026-05-05T16:20:42Z",
|
||||
"pushed_at": "2026-05-05T16:20:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -59,8 +59,8 @@
|
|||
"description": "Demonstrate and analyze the CVE-2026-31802 path traversal vulnerability in npm tar, enabling arbitrary file overwrite via symlink extraction.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-28T20:49:46Z",
|
||||
"updated_at": "2026-05-04T18:50:34Z",
|
||||
"pushed_at": "2026-05-04T18:50:30Z",
|
||||
"updated_at": "2026-05-05T13:59:29Z",
|
||||
"pushed_at": "2026-05-05T13:59:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Proof-of-Concept exploit for CVE-2026-32223",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-15T13:33:14Z",
|
||||
"updated_at": "2026-05-03T00:10:04Z",
|
||||
"updated_at": "2026-05-05T18:53:17Z",
|
||||
"pushed_at": "2026-04-17T05:41:18Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
|
|
|
|||
|
|
@ -1,68 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1170210047,
|
||||
"name": "CVE-2026-3395-MaxSite-CMS-Unauthenticated-RCE",
|
||||
"full_name": "mbanyamer\/CVE-2026-3395-MaxSite-CMS-Unauthenticated-RCE",
|
||||
"owner": {
|
||||
"login": "mbanyamer",
|
||||
"id": 213306745,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/213306745?v=4",
|
||||
"html_url": "https:\/\/github.com\/mbanyamer",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/mbanyamer\/CVE-2026-3395-MaxSite-CMS-Unauthenticated-RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-01T21:19:49Z",
|
||||
"updated_at": "2026-04-02T12:45:10Z",
|
||||
"pushed_at": "2026-03-01T21:25:39Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1170765958,
|
||||
"name": "CVE-2026-3395-Lab",
|
||||
"full_name": "rootdirective-sec\/CVE-2026-3395-Lab",
|
||||
"owner": {
|
||||
"login": "rootdirective-sec",
|
||||
"id": 253299769,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/253299769?v=4",
|
||||
"html_url": "https:\/\/github.com\/rootdirective-sec",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rootdirective-sec\/CVE-2026-3395-Lab",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-02T13:51:24Z",
|
||||
"updated_at": "2026-03-02T13:57:41Z",
|
||||
"pushed_at": "2026-03-02T13:57:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -80,12 +80,12 @@
|
|||
"description": "A sophisticated, cross-platform exploit generator for **CVE-2026-34621** – a critical prototype pollution vulnerability in Adobe Acrobat and Reader that leads to sandbox escape and arbitrary code execution on Windows and macOS.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-15T15:30:06Z",
|
||||
"updated_at": "2026-04-29T06:53:26Z",
|
||||
"updated_at": "2026-05-05T14:20:57Z",
|
||||
"pushed_at": "2026-04-15T15:47:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -93,8 +93,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 10,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Critical path traversal to RCE vulnerability in Jellyfin Media Server (CVSS 9.9). Includes proof-of-concept exploit, technical analysis, and detection tools.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-15T20:56:49Z",
|
||||
"updated_at": "2026-04-15T20:57:53Z",
|
||||
"updated_at": "2026-05-05T16:55:26Z",
|
||||
"pushed_at": "2026-04-15T20:57:49Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue