Common Vulnerabilities and Exposures (CVE) topic
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Kernelhub
:palm_tree:Linux、macOS、Windows Kernel privilege escalation vulnerability collection, with compilation environment, demo GIF map, vulnerability details, executable file (提权漏洞合集)
SUDO_KILLER
A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specific misconfiguration or flaw in sudo to gain elevated privileges...
Log4J-RCE-Proof-Of-Concept
Log4j-RCE (CVE-2021-44228) Proof of Concept with additional information
defi-threat
a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations on decentralized finance
WebMap
WebMap-Nmap Web Dashboard and Reporting
HellRaiser
Vulnerability scanner using Nmap for scanning and correlating found CPEs with CVEs.
Goby
Attack surface mapping
java-deserialization-exploits
A collection of curated Java Deserialization Exploits
massh-enum
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
log4jscanwin
Log4j Vulnerability Scanner for Windows