Movatterモバイル変換


[0]ホーム

URL:


Skip to content

Navigation Menu

Sign in
Appearance settings

Search code, repositories, users, issues, pull requests...

Provide feedback

We read every piece of feedback, and take your input very seriously.

Saved searches

Use saved searches to filter your results more quickly

Sign up
Appearance settings
#

Common Vulnerabilities and Exposures (CVE)

The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security

Here are 1,716 public repositories matching this topic...

SafeLine

SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.

  • UpdatedNov 5, 2025
  • Go

A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more

  • UpdatedJan 25, 2026
  • Shell

📡 PoC auto collect from GitHub.⚠️ Be careful Malware.

  • UpdatedFeb 20, 2026

渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms

  • UpdatedFeb 20, 2026
  • HTML

面向网络安全从业者的知识文库🍃 (停止更新)

  • UpdatedNov 8, 2023

快速搭建各种漏洞环境(Various vulnerability environment)

  • UpdatedOct 27, 2020
  • Shell

Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, and IPInfo, as well as to check for vulnerabilities in Android devices. Now, it also retrieves vulnerability logs from NIST.

  • UpdatedJan 20, 2026
  • Python

✍️ A curated list of CVE PoCs.

  • UpdatedJan 4, 2022

🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)

  • UpdatedFeb 15, 2023
  • C

cve-search - a tool to perform local searches for known vulnerabilities

  • UpdatedFeb 11, 2026
  • Python

Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.

  • UpdatedApr 17, 2024
  • C
SUDO_KILLER

A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.

  • UpdatedOct 3, 2025
  • Shell

利用大量高威胁poc/exp快速获取目标权限,用于渗透和红队快速打点

  • UpdatedJun 9, 2023
  • Python

A collection of JavaScript engine CVEs with PoCs

  • UpdatedSep 3, 2019

🐈Medusa是一个红队武器库平台,目前包括XSS平台、协同平台、CVE监控、免杀生成、DNSLOG、钓鱼邮件、文件获取等功能,持续开发中

  • UpdatedMar 3, 2024
  • Python
Followers
146 followers
Website
github.com/topics/cve
Wikipedia
Wikipedia

[8]ページ先頭

©2009-2026 Movatter.jp