Coder Social home page Coder Social logo

trickest / cve Goto Github PK

View Code? Open in Web Editor NEW
6.1K 321.0 766.0 295.88 MB

Gather and update all available and newest CVEs with their PoC.

Home Page: https://trickest.com

License: MIT License

HTML 75.36% Python 24.64%
poc cve cve-poc latest-cve vulnerability vulnerabilities software-vulnerabilities software-security exploit security

cve's Introduction

CVE PoC Tweet

Almost every publicly available CVE PoC.

Current hottest CVEs

Title URL
CVE-2022-0001 /trickest/cve/blob/main/2022/CVE-2022-0001.md
CVE-2022-25297 /trickest/cve/blob/main/2022/CVE-2022-25297.md
CVE-2022-1388 /trickest/cve/blob/main/2022/CVE-2022-1388.md
CVE-2022-25451 /trickest/cve/blob/main/2022/CVE-2022-25451.md

To see the complete history go here

How it works

Trickest Workflow Architecture

Trickest Workflow - PoC

TB; DZ (Too big; didn't zoom):

  • Collect CVE details from cvelist (Shout out to CVE Project!)
  • Split CVEs up by year.
  • Find PoCs for each CVE using 2 techniques:
    1. References

      • Gather each CVE's References.
      • Check if any of them points to a PoC using ffuf and a list of keywords

      Regex: (?i)[^a-z0-9]+(poc|proof of concept|proof[-_]of[-_]concept)[^a-z0-9]+

      (Thanks @joohoi!)

      Note: ffuf is awesome for more purposes than just content discovery.

      Get CVE referenced in HackerOne Reports - AllVideoPocsFromHackerOne (Thanks @zeroc00I!)

    2. Github

      Search GitHub for repositories with find-gh-poc that mention the CVE ID.

  • Merge the fresh results into the repository without overwriting the data that was committed manually.
  • Filter false positives using blacklist.txt.
  • Merge all of the found PoCs.
  • Generate GitHub badges for each affected software version using shields.io.
  • Write everything into easy-to-read markdown files.

As described, almost everything in this repository is generated automatically. We carefully designed the workflow (and continue to develop it) to ensure the results are as accurate as possible.

Use cases

  • Browse around, find a nice PoC, and test away!
  • Watch the repository to receive notifications about new PoCs as soon as they go public.
  • Search for a specific product(s) (and possibly version) to find all public exploits related to it.
  • Monitor the atom feed for a specific product(s).
  • Create a searchable HTML table using the template and script in summary_html

Contribution

All contribtutions/ideas/suggestions are welcome! Create a new ticket via GitHub issues or tweet at us @trick3st.

Build your own workflows

We believe in the value of tinkering; cookie-cutter solutions rarely cut it. Sign up for a Trickest demo to customize this workflow to your use case, get access to many more workflows, or build your own workflows from scratch!

cve's People

Contributors

andrewmohawk avatar c3l3si4n avatar dhondta avatar mhmdiaa avatar nenadzaric avatar sei-vsarvepalli avatar trickest-workflows avatar

Stargazers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

Watchers

 avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar  avatar

cve's Issues

change the regex

Hi trickest,

Some may use the uppercase of Proof and Concept

(?i)[^a-z0-9]+([Pp]o[Cc]|[Pp]roof of [Cc]oncept|[Pp]roof[-_]of[-_][Cc]oncept)[^a-z0-9]+

such as the "Exploit Proof of Concept" in this page

Thanks,
dingisoul

use anew for references from previous executions

Since fuff is not completely accurate because of different HTTP responses for each execution, anew should give us only new results which we should update and previous ones should stay.

This could be done by getting the previous references.txt directly from the repository

Stored XSS Attack

Describe the bug
Stored XSS caused by remote malicious content.

To Reproduce
According to the rules of regular matching, remotely construct malicious vulnerability description content, insert XSS payload into it, such as: <script>alert(1)</script> or payload that steals cookies.

Screenshots
image
image

Affected Version
Lastest.

ungrep unrelated data

We should create blacklists for github repositories that are known not to be reliable sources.

Reporting a vulnerability

Hello!

I hope you are doing well!

We are a security research team. Our tool automatically detected a vulnerability in this repository. We want to disclose it responsibly. GitHub has a feature called Private vulnerability reporting, which enables security research to privately disclose a vulnerability. Unfortunately, it is not enabled for this repository.

Can you enable it, so that we can report it?

Thanks in advance!

PS: you can read about how to enable private vulnerability reporting here: https://docs.github.com/en/code-security/security-advisories/repository-security-advisories/configuring-private-vulnerability-reporting-for-a-repository

Add topics to your repo

You should add some topics to get your repo better referenced. The following list provides some trendy topics I found via https://github.com/topics while browsing other related projects where you could settle your project in the top.

  • poc
  • cve
  • cve-poc
  • latest-cve
  • vulnerability
  • vulnerabilities
  • software-vulnerabilities
  • exploit
  • security
  • infosec
  • hacking
  • pentesting
  • penetration-testing
  • red-team
  • security-tools

2023 cves empty md files ?

hi, as i can see 2023 cves md files are empty , this even cause a problem while trying running python script related to summary_html

doubt

Hello, May I ask whether the CVE files listed in the warehouse are all with POC?

CVE-2019-3010

No PoC code in many repositories

Hi. I am using another project, which uses trickest / cve to display possible PoC Code for found CVEs.
While using this, I came across lots of links to repositories, which only contains the descriptions of the CVEs or just list the CVEs without any PoC code.

e.g. https://github.com/facebookincubator/nvdtools

Can they be added to the blacklist? I can either list the ones I found here or do a pull request for adding them to the blacklist if you are interested.

commit github pocs found

Along with the references.txt we should add github.txt which will contain all of the GitHub repositories, for further examination by workflow

Regex does not catch every PoC occurrence

Consider adapting your regex to something case-insensitive like the following :

(?i)[^a-z0-9]+(poc|proof of concept|proof-of-concept)[^a-z0-9]+

I've already seen some examples of PoC's not caught for CVE's that are well in your repo, therefore resulting in "No GitHub POC found".

adding exploitation data

I reckon it could be useful for people to know what is being exploited, I tried to make this easily accessible here:
https://github.com/gmatuz/inthewilddb
maybe there is also some PoCs you can take from it. All data is Apache 2.0
If you find some PoC you miss, reach out glad to share the collection code too

workflow code?

I could not find the code behind this workflow. Can you point me to it? Thanks!

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.