2022-03-01 12:51:11 +08:00
# 0day
[](https://github.com/helloexp/0day/network) [](https://github.com/helloexp/0day/stargazers) [](https://github.com/helloexp/0day/issues)
2022-04-07 13:59:30 +08:00
> For reasons known to us, the original repository was deleted, but local repo were kept, forks and stars cleared
> But rest assured, it's still the original recipe, the original taste.
2022-04-11 10:49:05 +08:00
> > In case of this issue,please [Follow Me](https://github.com/helloexp)
2022-03-02 10:05:24 +08:00
### [中文](./README.md) | English
2022-03-10 12:57:47 +08:00
EXP, POC of various CMS, platforms, systems, software vulnerabilities, the project will continually update
2022-03-01 12:51:11 +08:00
## Excellent project list
1. Fastjson RCE [https://github.com/dbgee/fastjson-rce ](https://github.com/dbgee/fastjson-rce )
2. Log4j RCE [https://github.com/dbgee/log4j2_rce ](https://github.com/dbgee/log4j2_rce )
3. redis RCE [https://github.com/Ridter/redis-rce ](https://github.com/Ridter/redis-rce )
4. Thinkphp RCE [https://github.com/helloexp/0day ](https://github.com/helloexp/0day/tree/master/Thinkphp )
5. Windows RCE [https://github.com/smgorelik/Windows-RCE-exploits ](https://github.com/smgorelik/Windows-RCE-exploits )
6. shiro deserialization [https://github.com/helloexp/0day/tree/master/shiro ](https://github.com/helloexp/0day/tree/master/shiro )
7. VPS2SUSE [https://github.com/U2FsdGVkX1/vps2suse ](https://github.com/U2FsdGVkX1/vps2suse )
2022-03-02 10:05:24 +08:00
8. Cassandra code injection [https://github.com/QHpix/CVE-2021-44521 ](https://github.com/QHpix/CVE-2021-44521 )
2022-03-10 17:08:31 +08:00
9. Reapoc -- Poc && Vulnerable-Target Storage Box [https://github.com/cckuailong/reapoc ](https://github.com/cckuailong/reapoc )
2022-03-02 10:05:24 +08:00
2022-03-01 12:51:11 +08:00
2022-03-10 12:57:47 +08:00
> **_Excellent project inclusion_**
> If you need to show your excellent work in this project, please add project address here [README-en.md](https://github.com/helloexp/0day/edit/master/README-en.md) and open pull request
2022-03-01 12:51:11 +08:00
## Why start this project?
1. A few months ago, I participated in an AWD offensive and defensive game and found that collecting POC in advance is very good way, and I can learn a lot in the process of collecting these `payloads` .
2. Subsequent HW, CTF, or daily infiltration activities can quickly locate and exploit.
2022-03-10 12:57:47 +08:00
## Feedback on issues
Any issues about this project you can feed back to me, or open pull request directly.
2022-03-01 12:51:11 +08:00
## POC、EXP contribution
2022-03-10 12:57:47 +08:00
1. Fork [This project ](https://github.com/helloexp/0day ) to your own github account
2022-03-01 12:51:11 +08:00
2. Clone repo to your local PC
2022-03-10 12:57:47 +08:00
3. Modify code at your local pc( Add poc、exp Or fix bugs)
4. Push code to your own repo
2022-03-01 12:51:11 +08:00
5. PR (open pull requests) to this project
2022-03-02 11:12:05 +08:00
2022-03-01 12:51:11 +08:00
1. Contributions,
readme update、readme translate、bug fix、function improvement、new features,etc.
2022-03-10 12:57:47 +08:00
2. star、fork to support this project is also grateful