Metasploit modules for the PAM Environment and Udisks PE exploits.
-
Updated
Jun 27, 2025 - Ruby
The Common Vulnerabilities and Exposures (CVE) system provides a reference-method for publicly known information-security vulnerabilities and exposures. The United States’ National Cybersecurity FFRDC, operated by The Mitre Corporation, maintains the system, with funding from the US National Cyber Security Division of the US Department of Homeland Security
Metasploit modules for the PAM Environment and Udisks PE exploits.
A cybersecurity related blog
Garrison Agent that provides CVE details security checks
huginn agent to check CVE for debian OS packages
SHIFU is a command-line tool for fetching Common Vulnerabilities and Exposures (CVE) information.
These Metasploit, Nmap, Python and Ruby scripts detects and exploits CVE-2021-41773 with RCE and local file disclosure.
Set of my own useful Tools, Scripts, Vulnerabilities, Exploits and Reports
These Nmap, Python and Ruby scripts detects and exploits CVE-2021-42013 with RCE and local file disclosure.
VulDB Ruby code to fetch data via API
A Ruby library providing common classes for CVE data and loading it from JSON.
BIGIP CVE-2020-5902 Exploit POC and automation scanning vulnerability
Easy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure
CERT/CC's fork of Metasploit Framework in which we are tagging commits that include vulnerability IDs. The first commit for an ID we recognize gets the tag for that ID. Aside from adding git tags, we do not otherwise modify the code. Updates hourly.