Explore the latest GitHub repositories gathered from our feed. The list below organizes entries by day so you can easily review new projects as they appear.
Time | Repository | Description | Visit Repo |
---|---|---|---|
07:28 AM | CVE-2025-3243 | A proof-of-concept exploit for CVE-2025-32433, a critical vuln | Visit Repo |
07:28 AM | CVE-2025-2301 | USOM Tarafından resmi yayın beklenmektedir. | Visit Repo |
07:28 AM | CVE-2021-43857-POC | Optimized exploit for CVE-2021-43857 affecting Gerapy < 0.9.8 | Visit Repo |
07:28 AM | CVE-2025-31161_exploit | CVE-2025-31161 python exploit | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
03:23 PM | lab_CVE-2025-32433 | CVE lab to accompany CVE course for CVE-2025-32433 | Visit Repo |
03:23 PM | CVE-2024-7120-Exploit-by-Dark-07x | Visit Repo | |
03:23 PM | CVE-2025-30208-Series | Analysis of the Reproduction of CVE-2025-30208 Series Vulnerab | Visit Repo |
03:23 PM | Nuclei_CVE-2025-31161_CVE-2025-2825 | Official Nuclei template for CVE-2025-31161 (formerly CVE-2025 | Visit Repo |
08:40 AM | CVE-2025-3776 | WordPress Verification SMS with TargetSMS Plugin <= 1.5 is vu | Visit Repo |
08:40 AM | WinRAR-Exploit-Builder | The WinRAR Exploit Builder is a C# project designed to create | Visit Repo |
08:40 AM | CVE-2025-31161 | Проверка наличие пути /WebInterface/functio | Visit Repo |
08:40 AM | CVE-2024-27876 | libAppleArchive exploit maker, read the writeup here https://s | Visit Repo |
08:40 AM | CVE-2025-30406 | Exploit for CVE-2025-30406 | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
09:23 PM | Erlang-OTP-CVE-2025-32433 | This Python script exploits the CVE-2025-32433 vulnerability i | Visit Repo |
09:23 PM | letsdefend-cve-2024-49138-investigation | Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, | Visit Repo |
03:53 PM | HTA-Exploit | Microsoft Windows HTA (HTML Application) - Pinnacle of Remote | Visit Repo |
03:53 PM | CVE-2025-32965-xrpl-js-poc | CVE Kodu: CVE-2025-32965 Zafiyet Türü: Supply Chain Attack | Visit Repo |
03:53 PM | vulnerability-in-Remix-React-Router-CVE-2025-31137- | Visit Repo | |
03:53 PM | PDF-FUD-Exploit | A meticulous scrutiny of the Exploit PDFs innards exposes a ne | Visit Repo |
03:53 PM | Slient-URL-Exploit | URL Contamination Exploit Muted Java Drive-By downloads can tr | Visit Repo |
03:53 PM | Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware | In the hushed galleries of the Silent JPG Exploit, a symphony | Visit Repo |
03:53 PM | Discord-Image-Logger-Stealer | Ephemeral discourse is embodied by the likes of Messenger Sess | Visit Repo |
08:27 AM | CVE-2025-29927 | CVE-2025-29927: Next.js Middleware Bypass Vulnerability | Visit Repo |
08:27 AM | CVE-2025-24963 | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
09:23 PM | CVE-2025-32140 | WordPress WP Remote Thumbnail Plugin <= 1.3.2 is vulnerable t | Visit Repo |
09:23 PM | CVE-2025-29529 | SQLi ITC Multiplan v3.7.4.1002 (CVE-2025-29529) | Visit Repo |
09:23 PM | CVE-PoC-Hunter | Visit Repo | |
09:23 PM | CVE-2025-42599 | Visit Repo | |
03:23 PM | CVE-2024-38828 | Visit Repo | |
03:23 PM | Gigacenter_cwmp_poc | POC for exploitation of Gigacenter devices (cwmp) no-CVE | Visit Repo |
03:23 PM | CVE-2025-24054-PoC | Proof of Concept for the NTLM Hash Leak via .library-ms CVE-20 | Visit Repo |
09:23 AM | FOXCMS-CVE-2025-29306-POC | Visit Repo | |
09:23 AM | TRAI-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation | A CVSS 10.0-rated vulnerability in the parquet-avro Java modul | Visit Repo |
09:23 AM | CVE-2025-43919-POC | A new vulnerability has been discovered in GNU Mailman 2.1.39, | Visit Repo |
03:23 AM | swa20250422031chj2zy8d3cvekhdprezlu | swa20250422031chj2zy8d3cvekhdprezlu | Visit Repo |
03:23 AM | CVE-2025-31161 | CrushFTP CVE-2025-31161 Exploit Tool | Visit Repo |
Time | Repository | Description | Visit Repo |
---|---|---|---|
09:23 PM | openpoc | Aggregates multiple data sources related to CVE exploits/PoC. | Visit Repo |
09:23 PM | PDF-EXPLOIT | Convert your executables into PDF files with embedded exploits | Visit Repo |
09:23 PM | CVE-2025-24016-Wazuh-Remote-Code-Execution-RCE-PoC | A critical RCE vulnerability has been identified in the Wazuh | Visit Repo |
09:23 PM | CVE-2024-28987 | Proof of Concept Exploit for CVE-2024-28987: SolarWinds Web He | Visit Repo |
09:23 PM | CVE-2021-34371 | python exploit - Neo4j 3.4.18 - RMI based Remote Code Executio | Visit Repo |
09:23 PM | CVE-2025-24071_POC | Visit Repo | |
09:23 PM | TRA-001-Critical-RCE-Vulnerability-in-Apache-Parquet-CVE-2025-30065-Simulation- | A CVSS 10.0-rated vulnerability in the parquet-avro Java modul | Visit Repo |
03:24 PM | CVE-2024-40445_CVE-2024-40446 | This repository serves as the public reference for CVE-2024-40 | Visit Repo |
03:24 PM | Next.js-Middleware-Bypass-CVE-2025-29927- | Visit Repo | |
09:23 AM | CVE-2024-4577-PHP-RCE | PHP RCE PoC for CVE-2024-4577 written in bash, go, python and | Visit Repo |
09:23 AM | CVE-2025-0054 | Visit Repo | |
09:23 AM | CVE-2025-30208-template | CVE-2025-30208 vite file read nuclei template | Visit Repo |
09:23 AM | LibHeif---CVE-2025-XXXXX | Heap Overflow in LibHeif | Visit Repo |
09:23 AM | apple-positional-audio-codec-invalid-header | looking into CVE-2025-31200 - can't figure it out yet | Visit Repo |
Stay current with new open-source projects and updates from GitHub. Our feed not only informs you about the latest developments but also groups entries by day to simplify your review process.
Click “Visit Repo” to directly jump into the repository and explore more.