Skip to content

certuscyber/cve-pocs

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

87 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

CVE Proof-of-Concept Database

This repository is a collection of proof-of-concept ("POC") exploits for various Common Vulnerabilities and Exposures ("CVEs"). Each POC is organized by its corresponding CVE ID and includes both Python scripts and detailed manual exploitation steps.

Certus Cybersecurity is committed to developing step-by-step reproduction guides and POC exploits to support the broader information security community. Our goal is to enhance the understanding of various vulnerabilities and their exploitation techniques, empowering security professionals and researchers to improve defenses and promote a more secure digital environment.

Repository Structure

The repository is organized into folders, each named after a specific CVE ID. Inside each folder, you will find:

  • poc.py: A Python script demonstrating the exploitation of the vulnerability.
  • README.md: A detailed guide containing step-by-step instructions for manually exploiting the vulnerability.
  • requirements.txt: A file listing the Python dependencies required to run the exploit.py script.
  • info.yaml: A file that contains metadata about the POC.
  • images/: A folder containing images referenced in the README.md file to help illustrate the exploitation process

Example Structure

└── CVE-XXXX-XXXXX/
    ├── README.md
    ├── images
    │   └── X.png
    ├── info.yaml
    ├── poc.py
    └── requirements.txt

Search

This repository contains search.py, a Python script that allows users to quickly search for keywords within this repository. The script scans through the repository and returns a list of POCs that contain the specified keyword in a structured format.

image

Getting Started

Prerequisites

Ensure you Python 3 is installed. Additionally, install the following dependencies:

  • pyyaml
  • argparse
  • pandas
  • tabulate
  • gitpython

Installation

  1. Clone the cve-pocs repository.
git clone https://github.com/certuscyber/cve-pocs.git && cd cve-pocs
  1. Install the required dependencies.
pip3 install -r requirements.txt

Usage

Once installed, search.py is ready to be used for searching for CVE POCs.

Examples:

  • Search for POCs related to CVEs from 2024:
python3 search.py -q 2024
  • Query for Insecure Direct Object Reference ("IDOR") POCs:
python3 search.py -q idor
  • Look for SQL Injection POCs:
python3 search.py -q "sql injection"

Disclaimer

This repository is for educational purposes only. The POCs provided here are intended to help security researchers understand the nature of vulnerabilities and how they can be exploited. Use this knowledge responsibly. The repository owner is not responsible for any misuse of the information contained within this repository.

Additionally, while some of these CVEs were not initially discovered by Certus Cybersecurity, our contribution lies in the development of detailed step-by-step reproduction guides and POC exploits for these vulnerabilities. We acknowledge and respect the original researchers or organizations responsible for the discoveries, and our goal is to enhance the understanding of various vulnerabilities.

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Contributors 5

Languages