0day/README-en.md

38 lines
2.8 KiB
Markdown
Raw Normal View History

2022-03-01 12:51:11 +08:00
# 0day
[![GitHub forks](https://img.shields.io/github/forks/helloexp/0day)](https://github.com/helloexp/0day/network) [![GitHub stars](https://img.shields.io/github/stars/helloexp/0day)](https://github.com/helloexp/0day/stargazers) [![GitHub issues](https://img.shields.io/github/issues/helloexp/0day)](https://github.com/helloexp/0day/issues)
2022-04-07 13:59:30 +08:00
> For reasons known to us, the original repository was deleted, but local repo were kept, forks and stars cleared
> But rest assured, it's still the original recipe, the original taste.
2022-04-11 10:49:05 +08:00
> > In case of this issue,please [Follow Me](https://github.com/helloexp)
### [中文](./README.md) | English
2022-03-10 12:57:47 +08:00
EXP, POC of various CMS, platforms, systems, software vulnerabilities, the project will continually update
2022-03-01 12:51:11 +08:00
## Excellent project list
1. Fastjson RCE [https://github.com/dbgee/fastjson-rce](https://github.com/dbgee/fastjson-rce)
2. Log4j RCE [https://github.com/dbgee/log4j2_rce](https://github.com/dbgee/log4j2_rce)
3. redis RCE [https://github.com/Ridter/redis-rce](https://github.com/Ridter/redis-rce)
4. Thinkphp RCE [https://github.com/helloexp/0day](https://github.com/helloexp/0day/tree/master/Thinkphp)
5. Windows RCE [https://github.com/smgorelik/Windows-RCE-exploits](https://github.com/smgorelik/Windows-RCE-exploits)
6. shiro deserialization [https://github.com/helloexp/0day/tree/master/shiro](https://github.com/helloexp/0day/tree/master/shiro)
7. VPS2SUSE [https://github.com/U2FsdGVkX1/vps2suse](https://github.com/U2FsdGVkX1/vps2suse)
8. Cassandra code injection [https://github.com/QHpix/CVE-2021-44521](https://github.com/QHpix/CVE-2021-44521)
9. Reapoc -- Poc && Vulnerable-Target Storage Box [https://github.com/cckuailong/reapoc](https://github.com/cckuailong/reapoc)
2022-03-01 12:51:11 +08:00
2022-03-10 12:57:47 +08:00
> **_Excellent project inclusion_**
> If you need to show your excellent work in this projectplease add project address here [README-en.md](https://github.com/helloexp/0day/edit/master/README-en.md) and open pull request
2022-03-01 12:51:11 +08:00
## Why start this project
1. A few months ago, I participated in an AWD offensive and defensive game and found that collecting POC in advance is very good way, and I can learn a lot in the process of collecting these `payloads`.
2. Subsequent HW, CTF, or daily infiltration activities can quickly locate and exploit.
2022-03-10 12:57:47 +08:00
## Feedback on issues
Any issues about this project you can feed back to meor open pull request directly.
2022-03-01 12:51:11 +08:00
## POC、EXP contribution
2022-03-10 12:57:47 +08:00
1. Fork [This project](https://github.com/helloexp/0day) to your own github account
2022-03-01 12:51:11 +08:00
2. Clone repo to your local PC
2022-03-10 12:57:47 +08:00
3. Modify code at your local pcAdd poc、exp Or fix bugs
4. Push code to your own repo
2022-03-01 12:51:11 +08:00
5. PR (open pull requests) to this project
2022-03-01 12:51:11 +08:00
1. Contributions
readme update、readme translate、bug fix、function improvement、new features,etc.
2022-03-10 12:57:47 +08:00
2. star、fork to support this project is also grateful