peiwithhao's learning journey in network/system security
-
Updated
Nov 4, 2025 - C
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
peiwithhao's learning journey in network/system security
CERT/CC's fork of the official Exploit Database repository in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.
Track and explore function-level CVE patch changes across multiple programming languages.
A repository containing all of the exploits I discovered and/or wrote (or sometimes neither).
Awesome CSIRT is an curated list of links and resources in security and CSIRT daily activities.
OpenSSL Vulnerability Scanner for Windows
Text4Shell Vulnerability Scanner for Windows
Spring4Shell Vulnerability Scanner for Windows
Log4j Vulnerability Scanner for Windows
Guidance for the Spectre, Meltdown, Speculative Store Bypass, Rogue System Register Read, Lazy FP State Restore, Bounds Check Bypass Store, TLBleed, and L1TF/Foreshadow vulnerabilities as well as general hardware and firmware security guidance. #nsacyber
This repository contains PoC exploits we developed for internal research or red team exercises.
is a PoC exploit targeting a specific vulnerability in the Linux kernel (CVE-2024-0582)
is a PoC exploit for the macOS vulnerability CVE-2023-40404. This PoC leverages IOKit APIs to interact with the IOUserEthernetResource network service, manipulating the system's network interfaces
The vm images in this repo are lost, we recommend our new project: https://github.com/hust-open-atom-club/S2VulnHub
PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit)
rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)
Kernel exploits consisting mostly of privilege escalation attacks against core components of Linux distribtions
CVE-2022-36946 linux kernel panic in netfilter_queue
This repository contains a C program to test for CVE-2024-2961, a buffer overflow vulnerability in the iconv() function of glibc.