# 0day [![GitHub forks](https://img.shields.io/github/forks/helloexp/0day)](https://github.com/helloexp/0day/network) [![GitHub stars](https://img.shields.io/github/stars/helloexp/0day)](https://github.com/helloexp/0day/stargazers) [![GitHub issues](https://img.shields.io/github/issues/helloexp/0day)](https://github.com/helloexp/0day/issues) > For reasons known to us, the original repository was deleted, but local repo were kept, forks and stars cleared > But rest assured, it's still the original recipe, the original taste. > > In case of this issue,please [Follow Me](https://github.com/helloexp) > > Education use only ### [中文](./README.md) | English EXP, POC of various CMS, platforms, systems, software vulnerabilities, the project will continually update ## Excellent project list 1. Fastjson RCE [https://github.com/dbgee/fastjson-rce](https://github.com/dbgee/fastjson-rce) 2. Log4j RCE [https://github.com/dbgee/log4j2_rce](https://github.com/dbgee/log4j2_rce) 3. redis RCE [https://github.com/Ridter/redis-rce](https://github.com/Ridter/redis-rce) 4. Thinkphp RCE [https://github.com/helloexp/0day](https://github.com/helloexp/0day/tree/master/Thinkphp) 5. Windows RCE [https://github.com/smgorelik/Windows-RCE-exploits](https://github.com/smgorelik/Windows-RCE-exploits) 6. shiro deserialization [https://github.com/helloexp/0day/tree/master/shiro](https://github.com/helloexp/0day/tree/master/shiro) 7. VPS2SUSE [https://github.com/U2FsdGVkX1/vps2suse](https://github.com/U2FsdGVkX1/vps2suse) 8. Cassandra code injection [https://github.com/QHpix/CVE-2021-44521](https://github.com/QHpix/CVE-2021-44521) 9. Reapoc -- Poc && Vulnerable-Target Storage Box [https://github.com/cckuailong/reapoc](https://github.com/cckuailong/reapoc) > **_Excellent project inclusion_** > If you need to show your excellent work in this project,please add project address here [README-en.md](https://github.com/helloexp/0day/edit/master/README-en.md) and open pull request ## Why start this project? 1. A few months ago, I participated in an AWD offensive and defensive game and found that collecting POC in advance is very good way, and I can learn a lot in the process of collecting these `payloads`. 2. Subsequent HW, CTF, or daily infiltration activities can quickly locate and exploit. ## Feedback on issues Any issues about this project you can feed back to me,or open pull request directly. ## POC、EXP contribution 1. Fork [This project](https://github.com/helloexp/0day) to your own github account 2. Clone repo to your local PC 3. Modify code at your local pc(Add poc、exp Or fix bugs) 4. Push code to your own repo 5. PR (open pull requests) to this project 1. Contributions, readme update、readme translate、bug fix、function improvement、new features,etc. 2. star、fork to support this project is also grateful