Explore the latest GitHub repositories gathered from our feed. The list below organizes entries by day so you can easily review new projects as they appear.
Time | Repository | Description | Visit Repo |
---|---|---|---|
10:54 PM | CVE-2025-32433_PoC | This script is a custom security tool designed to test for a c | Visit Repo |
10:54 PM | TPLink-VN020-DoS | TPLink VN020-F3v Denial of Service (CVE-2024-12342) | Visit Repo |
10:54 PM | AirBorne-PoC | poc for CVE-2025-24252 & CVE-2025-24132 | Visit Repo |
10:54 PM | Erlang-OTP-SSH-CVE-2025-32433 | Exploit Erlang/OTP SSH CVE-2025-32433 in a lab setup. | Visit Repo |
10:54 PM | CVE-2025-32433_Erlang-OTP | This script is a custom security tool designed to test for a c | Visit Repo |
04:06 PM | CVE-Scanner | CVE-2021-42287/CVE-2021-42278/OTHER Scanner & Exploiter. | Visit Repo |
04:06 PM | CVE-2025-29927 | Visit Repo | |
04:06 PM | Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware | In the hushed galleries of the Silent JPG Exploit, a symphony | Visit Repo |
04:06 PM | Slient-URL-Exploit | URL Contamination Exploit Muted Java Drive-By downloads can tr | Visit Repo |
04:06 PM | HTA-Exploit | Microsoft Windows HTA (HTML Application) - Pinnacle of Remote | Visit Repo |
04:06 PM | WinRAR-Exploit-Builder | The WinRAR Exploit Builder is a C# project designed to create | Visit Repo |
04:06 PM | Discord-Image-Logger-Stealer | Ephemeral discourse is embodied by the likes of Messenger Sess | Visit Repo |
04:06 PM | spip-cve-2023-27372-rce | SPIP CVE-2023-27372 Unauthenticated RCE Exploit (Web Shell Upl | Visit Repo |
04:06 PM | PDF-FUD-Exploit | A meticulous scrutiny of the Exploit PDFs innards exposes a ne | Visit Repo |
04:06 PM | letsdefend-cve2024-3400-case-study | Detection, analysis, and response strategies for CVE-2024-3400 | Visit Repo |
10:06 AM | CVE-2025-26014 | A Remote Code Execution (RCE) vulnerability in Loggrove v.1.0 | Visit Repo |
10:06 AM | CVE-2025-29927 | This is a CVE-2025-29927 Scanner. | Visit Repo |
10:06 AM | Gombruc | This vulnerability is related to CVE-2025-0401, which affects | Visit Repo |
10:06 AM | CVE-2025-31324 | Unauthenticated upload in SAP NetWeaver Visual Composer Metada | Visit Repo |
04:51 AM | CVE-2022-25012-POC | Improved PoC of CVE-2022-25012 | Visit Repo |
04:51 AM | CVE-2025-24091 | Visit Repo | |
04:51 AM | CVE-2025-46701 | Tomcat CVE | Visit Repo |
04:51 AM | CVE-2025-31324_PoC_SAP | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
10:43 PM | CVE-2025-31324_PoC | Proof-of-Concept for CVE-2025-31324: Unauthenticated upload in | Visit Repo |
10:43 PM | PoC-and-CVE-Reports | This repository is dedicated to Proof of Concept (PoC) exploi | Visit Repo |
10:43 PM | CVE-2025-32433 | CVE-2025-32433 is a vuln of ssh | Visit Repo |
10:43 PM | parquet-canary-exploit-rce-poc-CVE-2025-30065 | Visit Repo | |
10:43 PM | CVE-2024-40110 | Exploit para Poultry Farm Management System v1.0 | Visit Repo |
03:30 PM | SAP-CVE-2025-31324 | SAP NetWeaver Unauthenticated Remote Code Execution | Visit Repo |
03:30 PM | CVE-2025-29927 | CVE-2025-29927 | Visit Repo |
03:30 PM | CVE-2022-29806 | CVE-2022-29806 POC | Visit Repo |
09:30 AM | CVE-2025-3971 | Visit Repo | |
09:30 AM | cve-cli | A Python CLI that turns natural-language queries into CVE look | Visit Repo |
09:30 AM | CVE-2024-8418 | Visit Repo | |
09:30 AM | CVE-2025-31324-NUCLEI | Nuclei template for cve-2025-31324 (SAP) | Visit Repo |
09:30 AM | CVE-2025-29927 | Next js middlewareauth Bypass | Visit Repo |
09:30 AM | CVE-2025-31324 | SAP PoC para CVE-2025-31324 | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
09:20 PM | Onapsis_CVE-2025-31324_Scanner_Tools | Visit Repo | |
09:20 PM | PoC-CVE-2025-3914-Aeropage-WordPress-File-Upload | CVE-2025-3914-PoC | The Aeropage Sync for Airtable WordPress p | Visit Repo |
09:20 PM | Grafana-LFI-exploit | Updated exploit script for the CVE-2021-43798 | Visit Repo |
09:20 PM | CVE-2025-31324 | Visit Repo | |
09:20 PM | CVE-2022-3552 | Here is an explanation of how to exploit CVE-2022-3552 | Visit Repo |
09:20 PM | wordpress-CVE-2024-27956 | Attacks a vulnerable WordPress site with the wp-automatic pl | Visit Repo |
09:20 PM | CVE-2022-42092 | CVE-2023-46818 Python3 Exploit for Backdrop CMS <= 1.22.0 Auth | Visit Repo |
02:51 PM | ExploitCVE2025 | ExploitCVE2025 - SAP Path Traversal Auto-Exploit Tool | Visit Repo |
02:51 PM | CVE-2025-31324 | CVE-2025-31324, SAP Exploit | Visit Repo |
02:51 PM | CVE-2025-32432 | CVE-2025-32432 checker and exploit | Visit Repo |
02:51 PM | CVE-2024-27808.github.io | Vulnerabilidade em TypedArray/DataView | Visit Repo |
02:51 PM | CVE-2024-31449 | Visit Repo | |
02:51 PM | Pre-render-data-spoofing-on-React-Router-framework-mode-CVE-2025-43865 | Visit Repo |
Stay current with new open-source projects and updates from GitHub. Our feed not only informs you about the latest developments but also groups entries by day to simplify your review process.
Click “Visit Repo” to directly jump into the repository and explore more.