unSafe.sh - 不安全
我的收藏
今日热榜
公众号文章
导航
Github CVE
Github Tools
编码/解码
文件传输
Twitter Bot
Telegram Bot
Search
Rss
黑夜模式
增加标签
Tags (allow clear + 0 threshold)
Choose a tag...
Please select a valid tag.
Religan/CVE-2023-20198
A cybersecurity case study analysing CVE-2023-20198 in Cisco IOS XE, covering vulnerability exploitation, mitigation strategies, secure software development frameworks, and patch management policies, with practical insights from a controlled lab environment
Create: 2025-12-15 10:04:12 +0000 UTC Push: 2025-12-15 10:04:12 +0000 UTC |
Call123X/-cve-2025-55182
cve-2025-55182
Create: 2025-12-15 08:56:05 +0000 UTC Push: 2025-12-15 08:56:05 +0000 UTC |
subhdotsol/CVE-2025-55182
This project provides a **fully functional** demonstration of CVE-2025-55182 (React2Shell) - a critical Remote Code Execution vulnerability in React Server Components and Next.js.
Create: 2025-12-15 07:35:35 +0000 UTC Push: 2025-12-15 07:35:48 +0000 UTC |
ACharaf06/CVE-2017-5638-Attack-and-Defense
Create: 2025-12-15 04:12:51 +0000 UTC Push: 2025-12-16 09:13:50 +0000 UTC |
zhixiangyao/CVE-2025-66478-Exploit-Poc
Create: 2025-12-15 02:20:21 +0000 UTC Push: 2025-12-15 02:20:24 +0000 UTC |
mivmi/CVE-2025-55182
Create: 2025-12-15 00:26:26 +0000 UTC Push: 2025-12-15 00:26:26 +0000 UTC |
fsoc-ghost-0x/CVE-2025-9074_DAEMON_KILLER
Control is an illusion. The ultimate DAEMON_KILLER, This Exploit weaponizes CVE-2025-9074 to shatter Docker isolation. Automated Privilege Escalation & full Host Takeover. Dirty, fast, and methodical logic for the 1%. Break the cage. > We Are Fsociety_
Create: 2025-12-14 21:01:03 +0000 UTC Push: 2025-12-14 21:01:03 +0000 UTC |
Cheval-Paresseux/cve_2025_32434
Create: 2025-12-14 20:30:35 +0000 UTC Push: 2025-12-14 20:30:36 +0000 UTC |
SoftAndoWetto/CVE-2025-24367-PoC-Cacti
Authenticated RCE PoC for Cacti (CVE‑2025‑24367). Uses graph template injection to write and execute a payload via the “Unix – Logged in Users” template. Intended for labs and controlled testing only.
Create: 2025-12-14 20:29:14 +0000 UTC Push: 2025-12-14 20:29:15 +0000 UTC |
dantsco/CVE-2025-64720-PoC
Create: 2025-12-14 18:41:21 +0000 UTC Push: 2025-12-14 18:41:21 +0000 UTC |
KingHacker353/CVE-2025-55184
Create: 2025-12-14 18:35:01 +0000 UTC Push: 2025-12-14 18:35:25 +0000 UTC |
DavionGowie/-vercel-application-is-vulnerable-to-CVE-2025-66478.
bug bounty
Create: 2025-12-14 18:32:44 +0000 UTC Push: 2025-12-14 18:32:44 +0000 UTC |
DavionGowie/-vercel-prod.yml-application-is-vulnerable-to-CVE-2025-66478.
bug bounty
Create: 2025-12-14 18:25:36 +0000 UTC Push: 2025-12-14 18:25:37 +0000 UTC |
tpirate/cve-2023-44487-POC
poc for the rst dos attack discovered in 2023
Create: 2025-12-14 16:43:04 +0000 UTC Push: 2025-12-14 16:43:05 +0000 UTC |
phamdinhquy2512/CVE-2025-6019-Exploitation-Reproduction
Create: 2025-12-14 16:28:40 +0000 UTC Push: 2025-12-14 16:28:41 +0000 UTC |
phamdinhquy2512/CVE-2025-6019-Exploitation
Create: 2025-12-14 16:28:40 +0000 UTC Push: 2025-12-14 17:31:44 +0000 UTC |
NabilBoudra/cve-2017-5123
Create: 2025-12-14 16:00:31 +0000 UTC Push: 2025-12-14 16:00:32 +0000 UTC |
Terrasue/CVE-2025-14174-Exploit
Proof-of-Concept exploit for CVE-2025-14174 (EUVD-2025-203113) - Memory corruption in ANGLE
Create: 2025-12-14 14:46:03 +0000 UTC Push: 2025-12-14 15:28:44 +0000 UTC |
CyberPrince-hub/CVE-2025-55182-Advanced-Scanner
CVE-2025-55182-Advanced-Scanner is an automated security tool designed to detect and validate the CVE-2025-55182 vulnerability efficiently. it helps security researchers and bug bounty hunters quickly identify affected targets with accurate results and minimal false positives.
Create: 2025-12-14 12:59:06 +0000 UTC Push: 2025-12-14 12:59:06 +0000 UTC |
VVVI5HNU/CVE-2025-55182
Proof-of-Concept for CVE-2025-55182, a critical unauthenticated RCE in React Server Components.
Create: 2025-12-14 12:23:11 +0000 UTC Push: 2025-12-14 12:23:40 +0000 UTC |
Previous
48
49
50
51
52
53
54
55
Next