Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
-
Updated
May 16, 2024
Open-Source Vulnerability Intelligence Center - Unified source of vulnerability, exploit and threat Intelligence feeds
📡 PoC auto collect from GitHub.
Proof of Concept of RouterOS v6.42 Critical Vulnerability (CVE-2018-14847)
Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token
Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution
In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.
A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates
UAC bypass, Elevate, Persistence methods
URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.
The WinRAR Exploit Builder is a C# project designed to create an exploit targeting a vulnerability in WinRAR.
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Gather and update all available and newest CVEs with their PoC.
This PDF Exploit IS SUPPORT ANDROID, WINDOWN, LINUX OS Hack any operating system send PDF exploit
HACK ANY Windows, Linux , Android, iOS, Unix, device EASILY WITH THIS PRIVATE SILENT JPG EXPLOIT.
WordPress Auto Admin Account Creation and Reverse Shell cve-2024-27956 automates the process of creating a new administrator account in a WordPress site and executing a reverse shell on the target server. It utilizes the wp-automatic plugin's CSV injection vulnerability to execute SQL queries
a virus project that uses discord as a reverse shell, has a lot of functions and is easy to use
Advanced and powerful Android device controlling tool with a wide range of features and capabilities
Add a description, image, and links to the exploit topic page so that developers can more easily learn about it.
To associate your repository with the exploit topic, visit your repo's landing page and select "manage topics."