Common Vulnerabilities and Exposures (CVE)
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Here are 1,716 public repositories matching this topic...
Language:All
Sort:Most stars
SafeLine is a self-hosted WAF(Web Application Firewall) / reverse proxy to protect your web apps from attacks and exploits.
- Updated
Nov 5, 2025 - Go
A curated list of awesome search engines useful during Penetration testing, Vulnerability assessments, Red/Blue Team operations, Bug Bounty and more
- Updated
Jan 25, 2026 - Shell
Gather and update all available and newest CVEs with their PoC.
- Updated
Feb 20, 2026 - HTML
📡 PoC auto collect from GitHub.
- Updated
Feb 20, 2026
渗透测试有关的POC、EXP、脚本、提权、小工具等---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
- Updated
Feb 20, 2026 - HTML
Open Source Vulnerability Management Platform
- Updated
Feb 13, 2026 - Python
Automated Penetration Testing Framework - Open-Source Vulnerability Scanner - Vulnerability Management
- Updated
Feb 16, 2026 - Python
快速搭建各种漏洞环境(Various vulnerability environment)
- Updated
Oct 27, 2020 - Shell
Malwoverview is a rapid response tool used to gather intelligence information from VirusTotal, Hybrid Analysis, URLHaus, Polyswarm, Malshare, Alien Vault, Malpedia, Malware Bazaar, ThreatFox, Triage, and IPInfo, as well as to check for vulnerabilities in Android devices. Now, it also retrieves vulnerability logs from NIST.
- Updated
Jan 20, 2026 - Python
Vulmap 是一款 web 漏洞扫描和验证工具, 可对 webapps 进行漏洞扫描, 并且具备漏洞验证功能
- Updated
Apr 26, 2023 - Python
🌴Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
- Updated
Feb 15, 2023 - C
cve-search - a tool to perform local searches for known vulnerabilities
- Updated
Feb 11, 2026 - Python
Vulnerability Intelligence Platform
- Updated
Feb 19, 2026 - Python
Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.
- Updated
Apr 17, 2024 - C
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges on the system, essentially allowing a regular user to execute commands as the root user.
- Updated
Oct 3, 2025 - Shell
利用大量高威胁poc/exp快速获取目标权限,用于渗透和红队快速打点
- Updated
Jun 9, 2023 - Python
- Followers
- 146 followers
- Website
- github.com/topics/cve
- Wikipedia
- Wikipedia