A curated collection of proof-of-concept exploits for Common Vulnerabilities and Exposures (CVEs).
Awesome CVE PoC is a curated GitHub repository that aggregates proof-of-concept exploit code for publicly disclosed security vulnerabilities (CVEs). It provides security professionals with ready-to-use examples to understand, test, and reproduce vulnerabilities across various software and systems. The project addresses the need for a centralized, quality-filtered source of exploit code for research and educational purposes.
Security researchers, penetration testers, red teamers, bug bounty hunters, and developers focused on application security and vulnerability analysis. It's also valuable for educators and students in cybersecurity courses.
It saves significant time by collecting and organizing exploit code from scattered sources into a single, well-maintained list. The curation ensures quality and relevance, making it a trusted reference compared to unverified PoCs found elsewhere. Its community-driven nature keeps it updated with the latest vulnerabilities.
✍️ A curated list of CVE PoCs.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.
The README lists thousands of CVEs from 2011 onward, covering web, system, and application vulnerabilities across platforms like Windows, Linux, and embedded devices.
As part of the 'awesome' list series, it maintains high standards by avoiding clutter and enforcing contribution guidelines to filter low-quality submissions.
Provides practical PoC examples for vulnerability analysis, exploit development, and defensive security training, as highlighted in its philosophy of open knowledge sharing.
Accepts contributions following clear guidelines, ensuring the list stays current with newly disclosed vulnerabilities through crowd-sourced efforts.
The repository only links to third-party PoCs without validating their safety, functionality, or potential malicious intent, requiring users to trust unknown sources.
Each entry is a basic link with no context on dependencies, success rates, or risk levels, making it hard to assess usability without external research.
It's a GitHub README list without an API or database, hindering programmatic queries and integration into security tools or automated workflows.