Skip to content
/ cve Public

Gather and update all available and newest CVEs with their PoC.

License

Notifications You must be signed in to change notification settings

trickest/cve

Folders and files

NameName
Last commit message
Last commit date

Latest commit

407ff1a · Apr 17, 2025
Apr 11, 2025
Mar 15, 2025
Apr 5, 2025
Apr 10, 2025
Apr 7, 2025
Mar 11, 2025
Apr 5, 2025
Apr 5, 2025
Apr 17, 2025
Apr 15, 2025
Apr 16, 2025
Apr 16, 2025
Apr 16, 2025
Apr 15, 2025
Apr 15, 2025
Apr 16, 2025
Apr 14, 2025
Apr 15, 2025
Apr 17, 2025
Apr 17, 2025
Apr 17, 2025
Apr 16, 2025
Apr 17, 2025
Apr 17, 2025
Apr 17, 2025
Apr 17, 2025
Apr 17, 2025
Aug 2, 2022
Jan 31, 2022
Sep 25, 2023
Jun 20, 2022
Nov 29, 2022
Jun 23, 2022
Apr 16, 2025
Jul 12, 2022
Apr 17, 2025
Nov 17, 2022

Repository files navigation

CVE PoC Tweet

Almost every publicly available CVE PoC.

Current hottest CVEs

Title URL
CVE-2022-0001 /trickest/cve/blob/main/2022/CVE-2022-0001.md
CVE-2022-25297 /trickest/cve/blob/main/2022/CVE-2022-25297.md
CVE-2022-1388 /trickest/cve/blob/main/2022/CVE-2022-1388.md
CVE-2022-25451 /trickest/cve/blob/main/2022/CVE-2022-25451.md

To see the complete history go here

How it works

Trickest Workflow Architecture

Trickest Workflow - PoC

TB; DZ (Too big; didn't zoom):

  • Collect CVE details from cvelist (Shout out to CVE Project!)
  • Split CVEs up by year.
  • Find PoCs for each CVE using 2 techniques:
    1. References

      • Gather each CVE's References.
      • Check if any of them points to a PoC using ffuf and a list of keywords

      Regex: (?i)[^a-z0-9]+(poc|proof of concept|proof[-_]of[-_]concept)[^a-z0-9]+

      (Thanks @joohoi!)

      Note: ffuf is awesome for more purposes than just content discovery.

      Get CVE referenced in HackerOne Reports - AllVideoPocsFromHackerOne (Thanks @zeroc00I!)

    2. Github

      Search GitHub for repositories with find-gh-poc that mention the CVE ID.

  • Merge the fresh results into the repository without overwriting the data that was committed manually.
  • Filter false positives using blacklist.txt.
  • Merge all of the found PoCs.
  • Generate GitHub badges for each affected software version using shields.io.
  • Write everything into easy-to-read markdown files.

As described, almost everything in this repository is generated automatically. We carefully designed the workflow (and continue to develop it) to ensure the results are as accurate as possible.

Use cases

  • Browse around, find a nice PoC, and test away!
  • Watch the repository to receive notifications about new PoCs as soon as they go public.
  • Search for a specific product(s) (and possibly version) to find all public exploits related to it.
  • Monitor the atom feed for a specific product(s).
  • Create a searchable HTML table using the template and script in summary_html

Contribution

All contribtutions/ideas/suggestions are welcome! Create a new ticket via GitHub issues or tweet at us @trick3st.

Build your own workflows

We believe in the value of tinkering; cookie-cutter solutions rarely cut it. Sign up for a Trickest demo to customize this workflow to your use case, get access to many more workflows, or build your own workflows from scratch!