[ { "name": "CVE-2018-20250", "full_name": "WyAtu/CVE-2018-20250", "html_url": "https://github.com/WyAtu/CVE-2018-20250", "description": "exp for https://research.checkpoint.com/extracting-code-execution-from-winrar", "stargazers_count": 489, "forks_count": 177, "created_at": "2019-02-22T04:52:08Z" }, { "name": "CVE-2025-24071_PoC", "full_name": "0x6rss/CVE-2025-24071_PoC", "html_url": "https://github.com/0x6rss/CVE-2025-24071_PoC", "description": "CVE-2025-24071: NTLM Hash Leak via RAR/ZIP Extraction and .library-ms File", "stargazers_count": 218, "forks_count": 36, "created_at": "2025-03-16T20:10:19Z" }, { "name": "CVE-2025-21333-POC", "full_name": "MrAle98/CVE-2025-21333-POC", "html_url": "https://github.com/MrAle98/CVE-2025-21333-POC", "description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I/O ring IOP_MC_BUFFER_ENTRY", "stargazers_count": 180, "forks_count": 31, "created_at": "2025-02-27T12:36:55Z" }, { "name": "CVE-2025-21298", "full_name": "ynwarcs/CVE-2025-21298", "html_url": "https://github.com/ynwarcs/CVE-2025-21298", "description": "Proof of concept & details for CVE-2025-21298", "stargazers_count": 171, "forks_count": 45, "created_at": "2025-01-20T18:16:51Z" }, { "name": "CVE-2025-30208-EXP", "full_name": "ThumpBo/CVE-2025-30208-EXP", "html_url": "https://github.com/ThumpBo/CVE-2025-30208-EXP", "description": "CVE-2025-30208-EXP", "stargazers_count": 160, "forks_count": 31, "created_at": "2025-03-26T15:42:31Z" }, { "name": "7-Zip-CVE-2025-0411-POC", "full_name": "dhmosfunk/7-Zip-CVE-2025-0411-POC", "html_url": "https://github.com/dhmosfunk/7-Zip-CVE-2025-0411-POC", "description": "This repository contains POC scenarios as part of CVE-2025-0411 MotW bypass.", "stargazers_count": 127, "forks_count": 32, "created_at": "2025-01-22T14:40:34Z" }, { "name": "CVE-2025-26125", "full_name": "ZeroMemoryEx/CVE-2025-26125", "html_url": "https://github.com/ZeroMemoryEx/CVE-2025-26125", "description": "(0day) Local Privilege Escalation in IObit Malware Fighter", "stargazers_count": 126, "forks_count": 18, "created_at": "2025-01-08T05:50:07Z" }, { "name": "POC-CVE-2025-24813", "full_name": "absholi7ly/POC-CVE-2025-24813", "html_url": "https://github.com/absholi7ly/POC-CVE-2025-24813", "description": "his repository contains an automated Proof of Concept (PoC) script for exploiting **CVE-2025-24813**, a Remote Code Execution (RCE) vulnerability in Apache Tomcat. The vulnerability allows an attacker to upload a malicious serialized payload to the server, leading to arbitrary code execution via deserialization when specific conditions are met.", "stargazers_count": 95, "forks_count": 28, "created_at": "2025-03-14T07:36:58Z" }, { "name": "CVE-2025-24813-PoC", "full_name": "iSee857/CVE-2025-24813-PoC", "html_url": "https://github.com/iSee857/CVE-2025-24813-PoC", "description": "Apache Tomcat 远程代码执行漏洞批量检测脚本(CVE-2025-24813)", "stargazers_count": 75, "forks_count": 23, "created_at": "2025-03-13T10:00:03Z" }, { "name": "CVE-2025-21420-PoC", "full_name": "Network-Sec/CVE-2025-21420-PoC", "html_url": "https://github.com/Network-Sec/CVE-2025-21420-PoC", "description": "We found a way to DLL sideload with cleanmgr.exe", "stargazers_count": 72, "forks_count": 18, "created_at": "2025-02-17T08:59:22Z" }, { "name": "CVE-2025-29927", "full_name": "aydinnyunus/CVE-2025-29927", "html_url": "https://github.com/aydinnyunus/CVE-2025-29927", "description": "CVE-2025-29927 Proof of Concept", "stargazers_count": 68, "forks_count": 24, "created_at": "2025-03-23T12:13:35Z" }, { "name": "CVE_2019_2025_EXP", "full_name": "jltxgcy/CVE_2019_2025_EXP", "html_url": "https://github.com/jltxgcy/CVE_2019_2025_EXP", "description": null, "stargazers_count": 61, "forks_count": 46, "created_at": "2019-09-30T02:40:21Z" }, { "name": "ingressNightmare-CVE-2025-1974-exps", "full_name": "Esonhugh/ingressNightmare-CVE-2025-1974-exps", "html_url": "https://github.com/Esonhugh/ingressNightmare-CVE-2025-1974-exps", "description": "IngressNightmare POC. world first remote exploitation and with multi-advanced exploitation methods. allow on disk exploitation. CVE-2025-24514 - auth-url injection, CVE-2025-1097 - auth-tls-match-cn injection, CVE-2025-1098 – mirror UID injection -- all available", "stargazers_count": 60, "forks_count": 9, "created_at": "2025-03-26T06:43:36Z" }, { "name": "CVE-2025-0282-Ivanti-exploit", "full_name": "absholi7ly/CVE-2025-0282-Ivanti-exploit", "html_url": "https://github.com/absholi7ly/CVE-2025-0282-Ivanti-exploit", "description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.", "stargazers_count": 44, "forks_count": 13, "created_at": "2025-01-11T02:06:51Z" }, { "name": "CVE-2025-1974", "full_name": "yoshino-s/CVE-2025-1974", "html_url": "https://github.com/yoshino-s/CVE-2025-1974", "description": null, "stargazers_count": 43, "forks_count": 10, "created_at": "2025-03-25T13:23:01Z" }, { "name": "CVE-2025-24118", "full_name": "jprx/CVE-2025-24118", "html_url": "https://github.com/jprx/CVE-2025-24118", "description": "An XNU kernel race condition bug", "stargazers_count": 41, "forks_count": 5, "created_at": "2025-01-30T00:10:44Z" }, { "name": "CVE-2025-0282", "full_name": "sfewer-r7/CVE-2025-0282", "html_url": "https://github.com/sfewer-r7/CVE-2025-0282", "description": "PoC for CVE-2025-0282: A remote unauthenticated stack based buffer overflow affecting Ivanti Connect Secure, Ivanti Policy Secure, and Ivanti Neurons for ZTA gateways", "stargazers_count": 36, "forks_count": 12, "created_at": "2025-01-16T14:45:53Z" }, { "name": "CVE-2025-24016", "full_name": "0xjessie21/CVE-2025-24016", "html_url": "https://github.com/0xjessie21/CVE-2025-24016", "description": "CVE-2025-24016: Wazuh Unsafe Deserialization Remote Code Execution (RCE)", "stargazers_count": 35, "forks_count": 6, "created_at": "2025-02-16T11:01:12Z" }, { "name": "CVE-2025-23369", "full_name": "hakivvi/CVE-2025-23369", "html_url": "https://github.com/hakivvi/CVE-2025-23369", "description": "GitHub Entreprise Server SAML authentication bypass (CVE-2025-23369) exploit", "stargazers_count": 35, "forks_count": 3, "created_at": "2025-02-08T18:13:04Z" }, { "name": "CVE-2025-24016", "full_name": "MuhammadWaseem29/CVE-2025-24016", "html_url": "https://github.com/MuhammadWaseem29/CVE-2025-24016", "description": "CVE-2025-24016: RCE in Wazuh server! Remote Code Execution ", "stargazers_count": 32, "forks_count": 5, "created_at": "2025-02-20T23:31:03Z" }, { "name": "CVE-2025-24104", "full_name": "ifpdz/CVE-2025-24104", "html_url": "https://github.com/ifpdz/CVE-2025-24104", "description": null, "stargazers_count": 32, "forks_count": 4, "created_at": "2025-01-24T10:41:12Z" }, { "name": "CVE-2025-30208", "full_name": "xuemian168/CVE-2025-30208", "html_url": "https://github.com/xuemian168/CVE-2025-30208", "description": "全网首发 The first Vite scanner on the entire network Automatic target asset collection via FOFA Multi-threaded concurrent scanning Automatic CSV report generation", "stargazers_count": 31, "forks_count": 1, "created_at": "2025-03-26T10:26:12Z" }, { "name": "CVE-2025-0401", "full_name": "CyberSecurityUP/CVE-2025-0401", "html_url": "https://github.com/CyberSecurityUP/CVE-2025-0401", "description": "Privilege Escalation using Passwd", "stargazers_count": 28, "forks_count": 5, "created_at": "2025-04-01T14:23:43Z" }, { "name": "CVE-2025-27636-Apache-Camel-PoC", "full_name": "akamai/CVE-2025-27636-Apache-Camel-PoC", "html_url": "https://github.com/akamai/CVE-2025-27636-Apache-Camel-PoC", "description": null, "stargazers_count": 28, "forks_count": 8, "created_at": "2025-03-09T09:42:11Z" }, { "name": "CVE-2025-0108-PoC", "full_name": "iSee857/CVE-2025-0108-PoC", "html_url": "https://github.com/iSee857/CVE-2025-0108-PoC", "description": "Palo Alto Networks PAN-OS 身份验证绕过漏洞批量检测脚本(CVE-2025-0108)", "stargazers_count": 26, "forks_count": 19, "created_at": "2025-02-13T06:39:25Z" }, { "name": "CVE-2018-20250", "full_name": "QAX-A-Team/CVE-2018-20250", "html_url": "https://github.com/QAX-A-Team/CVE-2018-20250", "description": "010 Editor template for ACE archive format & CVE-2018-2025[0-3]", "stargazers_count": 25, "forks_count": 14, "created_at": "2019-02-22T06:47:01Z" }, { "name": "CVE-2025-0282", "full_name": "watchtowrlabs/CVE-2025-0282", "html_url": "https://github.com/watchtowrlabs/CVE-2025-0282", "description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)", "stargazers_count": 23, "forks_count": 9, "created_at": "2025-01-15T18:27:12Z" }, { "name": "CVE-2025-1094-Exploit", "full_name": "soltanali0/CVE-2025-1094-Exploit", "html_url": "https://github.com/soltanali0/CVE-2025-1094-Exploit", "description": "WebSocket and SQL Injection Exploit Script", "stargazers_count": 23, "forks_count": 5, "created_at": "2025-02-27T11:08:10Z" }, { "name": "CVE-2018-20250-WinRAR-ACE", "full_name": "easis/CVE-2018-20250-WinRAR-ACE", "html_url": "https://github.com/easis/CVE-2018-20250-WinRAR-ACE", "description": "Proof of concept code in C# to exploit the WinRAR ACE file extraction path (CVE-2018-20250).", "stargazers_count": 21, "forks_count": 18, "created_at": "2019-02-23T01:20:34Z" }, { "name": "CVE-2025-20029", "full_name": "mbadanoiu/CVE-2025-20029", "html_url": "https://github.com/mbadanoiu/CVE-2025-20029", "description": "CVE-2025-20029: Command Injection in TMSH CLI in F5 BIG-IP", "stargazers_count": 20, "forks_count": 5, "created_at": "2025-02-23T18:36:11Z" } ]