Home

Awesome

<h1 align="center">PocOrExp in Github</h1> <p align="center"> <img src="https://visitor-badge.glitch.me/badge?page_id=https://github.com/ycdxsb/PocOrExp_in_Github/README.md"/> <img src="https://img.shields.io/github/stars/ycdxsb/PocOrExp_in_Github"/> <img src="https://img.shields.io/github/forks/ycdxsb/PocOrExp_in_Github"/> <img src="https://img.shields.io/github/issues/ycdxsb/PocOrExp_in_Github"/> <img src="https://img.shields.io/github/license/ycdxsb/PocOrExp_in_Github"/> </p> <p align="center"> <img src="https://img.shields.io/github/commit-activity/m/ycdxsb/PocOrExp_in_Github"/> <img src="https://img.shields.io/github/last-commit/ycdxsb/PocOrExp_in_Github"/> <img src="https://img.shields.io/github/repo-size/ycdxsb/PocOrExp_in_Github"/> </p>

Aggregating existing Poc or Exp on Github, CVE information comes from the official CVE website.

Note: Aggregation is only done through general CVE numbers, so for vulnerabilities with Windows-specific numbers like MS17-010 and famous vulnerabilities with nicknames, it's better to search for them yourself.

Usage

python3 exp.py -h
usage: exp.py [-h]
[-y {1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020,2021,all}]
[-i {y,n}] [-w {y,n}]

CVE Details and Collect PocOrExp in Github

optional arguments:
-h, --help show this help message and exit
-y {1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020,2021,all}, --year {1999,2000,2001,2002,2003,2004,2005,2006,2007,2008,2009,2010,2011,2012,2013,2014,2015,2016,2017,2018,2019,2020,2021,all}
get Poc or CVE of certain year or all years
-i {y,n}, --init {y,n}
init or not
-w {y,n}, --watch {y,n}
keep an eye on them or not

Parameter description:

Steps to use:

pip3 install -r requirements.txt
token:your_token
python3 exp.py -y 2021 -i y
python3 exp.py -y all -i y

PocOrExps

Log

Stargazers

Stargazers over time

Reference