GitHub Feed
Explore the latest GitHub repositories gathered from our feed. Entries are grouped by day to help you track developments quickly.
Wed Apr 16, 2025
Repository | Description | CVE | Metrics | Action |
---|---|---|---|---|
CVE-2025-0108-PoC | Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测 | PAN-OS: Authentication Bypass in the Management Web Interface |
v4.0
MEDIUM
Score: 5.9
CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:U/V:C/RE:M/U:Green
|
Visit Repo |
apache-vulnerability-testing | Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-20 | n/a | n/a | Visit Repo |
ingressNightmare-CVE-2025-1974-exps | IngressNightmare POC. world first remote exploitation and with | ingress-nginx admission controller RCE escalation |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
CVE-2025-24071_PoC | CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .lib | Microsoft Windows File Explorer Spoofing Vulnerability |
v3.1
MEDIUM
Score: 6.5
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2024-35250 | PoC for the Untrusted Pointer Dereference in the ks.sys driver | Windows Kernel-Mode Driver Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2024-21338 | Local Privilege Escalation from Admin to Kernel vulnerability | Windows Kernel Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
CVE-2025-21333-POC | POC exploit for CVE-2025-21333 heap-based buffer overflow. It | Windows Hyper-V NT Kernel Integration VSP Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2018-20250 | exp for https://research.checkpoint.com/extracting-code-execut | n/a | n/a | Visit Repo |
laravel-exploits | Exploit for CVE-2021-3129 | n/a | n/a | Visit Repo |
Exploits | Exploits for various CVEs | n/a | n/a | Visit Repo |
themebleed | Proof-of-Concept for CVE-2023-38146 ("ThemeBleed") | n/a | n/a | Visit Repo |
CVE-2017-0785 | Blueborne CVE-2017-0785 Android information leak vulnerability | n/a | n/a | Visit Repo |
CVE-2019-5736-PoC | PoC for CVE-2019-5736 | n/a | n/a | Visit Repo |
PocList | Alibaba-Nacos-Unauthorized/ApacheDruid-RCE_CVE-2021-25646/MS-E | n/a | n/a | Visit Repo |
CVE-2020-1350-DoS | A denial-of-service proof-of-concept for CVE-2020-1350 | n/a | n/a | Visit Repo |
esp32_esp8266_attacks | Proof of Concept of ESP32/8266 Wi-Fi vulnerabilties (CVE-2019- | n/a | n/a | Visit Repo |
CVE-2021-31166 | Proof of concept for CVE-2021-31166, a remote HTTP.sys use-aft | HTTP Protocol Stack Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
CVE-2021-21972 | Proof of Concept Exploit for vCenter CVE-2021-21972 | n/a | n/a | Visit Repo |
CVE-2018-0802 | PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882) | n/a | n/a | Visit Repo |
git_rce | Exploit PoC for CVE-2024-32002 | n/a | n/a | Visit Repo |
CVE-2020-0796 | CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost | n/a | n/a | Visit Repo |
PoC-in-GitHub | PoC auto collect from GitHub. ️ Be careful Malware. | n/a | n/a | Visit Repo |
CVE-2018-7600 | Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002 | n/a | n/a | Visit Repo |
Log4J-RCE-Proof-Of-Concept | Log4j-RCE (CVE-2021-44228) Proof of Concept with additional in | n/a | n/a | Visit Repo |
dirtycow-vdso | PoC for Dirty COW (CVE-2016-5195) | n/a | n/a | Visit Repo |
CVE-2023-4911 | CVE-2023-4911 proof of concept | Glibc: buffer overflow in ld.so leading to privilege escalation |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
bluetoothdPoC | CVE-2018-4087 PoC | n/a | n/a | Visit Repo |
CVE-2020-1472 | PoC for Zerologon - all research credits go to Tom Tervoort of | Netlogon Elevation of Privilege Vulnerability |
v3.1
MEDIUM
Score: 5.5
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N/E:P/RL:O/RC:C
|
Visit Repo |
CVE-2018-15473-Exploit | Exploit written in Python for CVE-2018-15473 with threading an | n/a | n/a | Visit Repo |
phuip-fpizdam | Exploit for CVE-2019-11043 | n/a | n/a | Visit Repo |
CVE | A collection of proof-of-concept exploit scripts written by th | n/a | n/a | Visit Repo |
CVEs | Proof-of-Concept exploits for CVEs found by the team at Rhino | n/a | n/a | Visit Repo |
CVE-2024-1086 | Universal local privilege escalation Proof-of-Concept exploit | Use-after-free in Linux kernel's netfilter: nf_tables component |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
log4j-shell-poc | A Proof-Of-Concept for the CVE-2021-44228 vulnerability. | n/a | n/a | Visit Repo |
WDBFontOverwrite | Proof-of-concept app to overwrite fonts on iOS using CVE-2022- | n/a | n/a | Visit Repo |
CVE-2025-21298 | Proof of concept & details for CVE-2025-21298 | Windows OLE Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
BlueKeep | Proof of concept for CVE-2019-0708 | n/a | n/a | Visit Repo |
CVE-2020-0796-RCE-POC | CVE-2020-0796 Remote Code Execution POC | n/a | n/a | Visit Repo |
PoC | PoC of CVE/Exploit | n/a | n/a | Visit Repo |
CVE-2023-38831-winrar-exploit | CVE-2023-38831 winrar exploit generator | n/a | n/a | Visit Repo |
CVE-2021-1732-Exploit | CVE-2021-1732 Exploit | Windows Win32k Elevation of Privilege Vulnerability |
v3.1
HIGH
Score: 7.8
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:F/RL:O/RC:C
|
Visit Repo |
dirtycow | Dirty Cow exploit - CVE-2016-5195 | n/a | n/a | Visit Repo |
CVE-2015-7547 | Proof of concept for CVE-2015-7547 | n/a | n/a | Visit Repo |
CVE-Exploits | PoC exploits for software vulnerabilities | n/a | n/a | Visit Repo |
CVE-2021-4034 | PoC for PwnKit: Local Privilege Escalation Vulnerability in po | n/a | n/a | Visit Repo |
CVE-2017-8570 | Proof of Concept exploit for CVE-2017-8570 | n/a | n/a | Visit Repo |
CVE-2017-11882 | Proof-of-Concept exploits for CVE-2017-11882 | n/a | n/a | Visit Repo |
CVE-2024-38063 | poc for CVE-2024-38063 (RCE in tcpip.sys) | Windows TCP/IP Remote Code Execution Vulnerability |
v3.1
CRITICAL
Score: 9.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C
|
Visit Repo |
cve-2024-6387-poc | a signal handler race condition in OpenSSH's server (sshd) | Openssh: regresshion - race condition in ssh allows rce/dos |
v3.1
HIGH
Score: 8.1
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
|
Visit Repo |
cve-2019-5736-poc | Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape | n/a | n/a | Visit Repo |
GitHub Threat Intelligence at a Glance
Stay on top of cybersecurity developments and open-source research through daily GitHub updates.
Jump into a repository to explore code, documentation, or CVE-related insights.