From b6d7832c5215c7346cb350393fff41035d703b9d Mon Sep 17 00:00:00 2001 From: 0xMarcio Date: Sat, 25 May 2024 21:56:39 +0200 Subject: [PATCH] Update Sat May 25 21:56:39 CEST 2024 --- .DS_Store | Bin 6148 -> 0 bytes README.md | 62 +++++++----------------------------------------------- 2 files changed, 8 insertions(+), 54 deletions(-) delete mode 100644 .DS_Store diff --git a/.DS_Store b/.DS_Store deleted file mode 100644 index c3569931fdf3be67d5bf83927a830ae465b0e8fb..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 6148 zcmeHKJ5Iw;5S)b+kw}q}@?C)&JVoIIIRL*D6pkVhQqZ~LTpW$rj}VbVgG7U7t=)NV zy<^K$y!8UG)p2_RECI~vj(GPlHNWpZv5U$Wk$;g3P=GdAO(J*fcIY7{3=mV3P=Gd@TGvC4~_2F3&+GbIv8RE zAkLT$<2q&uV)F#C7mkU{&@8FMq*{#_mUQM@)%C(LG3l@xKCIqsHKAC%ozHJk4(o}E zQa}ovDsY+GrT70^`VaH}DM>piAO-%F0ybN3)+>He_14M9d9Q8sd%D+r(A~HW3PZGG kVzgs!yd7UhQPwqI^L{TJ6NAot(24pPa9w0l;I9?<1cEFUl>h($ diff --git a/README.md b/README.md index 443d94e643..00768cb50e 100644 --- a/README.md +++ b/README.md @@ -1,69 +1,23 @@ -

CVE PoC Tweet

+# CVE +

Almost every publicly available CVE PoC.

## Current hottest CVEs | Title | URL | | ----------- | ----------- | -| CVE-2022-0001 | [/trickest/cve/blob/main/2022/CVE-2022-0001.md](https://github.com/trickest/cve/blob/main/2022/CVE-2022-0001.md) | -| CVE-2022-25297 | [/trickest/cve/blob/main/2022/CVE-2022-25297.md](https://github.com/trickest/cve/blob/main/2022/CVE-2022-25297.md) | -| CVE-2022-1388 | [/trickest/cve/blob/main/2022/CVE-2022-1388.md](https://github.com/trickest/cve/blob/main/2022/CVE-2022-1388.md) | -| CVE-2022-25451 | [/trickest/cve/blob/main/2022/CVE-2022-25451.md](https://github.com/trickest/cve/blob/main/2022/CVE-2022-25451.md) | +| CVE-2022-0001 | [/0xMarcio/cve/blob/main/2022/CVE-2022-0001.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-0001.md) | +| CVE-2022-25297 | [/0xMarcio/cve/blob/main/2022/CVE-2022-25297.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-25297.md) | +| CVE-2022-1388 | [/0xMarcio/cve/blob/main/2022/CVE-2022-1388.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-1388.md) | +| CVE-2022-25451 | [/0xMarcio/cve/blob/main/2022/CVE-2022-25451.md](https://github.com/0xMarcio/cve/blob/main/2022/CVE-2022-25451.md) | To see the complete history go [here](hot_cves.csv) -[](https://trickest.io/auth/register) - -## How it works -### [Trickest](https://trickest.com) Workflow Architecture - -![Trickest Workflow - PoC](workflow.png "Trickest Workflow - PoC") - -### TB; DZ (Too big; didn't zoom): -- Collect CVE details from [cvelist](https://github.com/CVEProject/cvelist) (Shout out to [CVE Project](https://github.com/CVEProject)!) -- Split CVEs up by year. -- Find PoCs for each CVE using 2 techniques: - 1. References - - Gather each CVE's `References`. - - Check if any of them points to a PoC using [ffuf](https://github.com/ffuf/ffuf) and a list of keywords - - Regex: - ```(?i)[^a-z0-9]+(poc|proof of concept|proof[-_]of[-_]concept)[^a-z0-9]+``` - - (Thanks [@joohoi](https://github.com/joohoi)!) - - **Note**: [ffuf](https://github.com/ffuf/ffuf) is awesome for more purposes than just content discovery. - - Get CVE referenced in HackerOne Reports - [AllVideoPocsFromHackerOne](https://github.com/zeroc00I/AllVideoPocsFromHackerOne) (Thanks [@zeroc00I](https://github.com/zeroc00I)!) - - - 2. Github - - Search GitHub for repositories with [find-gh-poc](https://github.com/trickest/find-gh-poc) that mention the CVE ID. -- Merge the fresh results into the repository without overwriting the data that was committed manually. -- Filter false positives using `blacklist.txt`. -- Merge all of the found PoCs. -- Generate GitHub badges for each affected software version using [shields.io](https://shields.io). -- Write everything into easy-to-read markdown files. - - - -> **As described, almost everything in this repository is generated automatically. We carefully designed the workflow (and continue to develop it) to ensure the results are as accurate as possible.** - - - ## Use cases - Browse around, find a nice PoC, and test away! - `Watch` the repository to receive notifications about new PoCs as soon as they go public. - Search for a specific product(s) (and possibly version) to find all public exploits related to it. -- Monitor the [atom feed](https://github.com/trickest/cve/commits/main.atom) for a specific product(s). +- Monitor the [atom feed](https://github.com/0xMarcio/cve/commits/main.atom) for a specific product(s). - Create a searchable HTML table using the template and script in [summary_html](summary_html) - - Example: https://www.andrewmohawk.com/cve_summary (Thanks [@AndrewMohawk](https://github.com/AndrewMohawk)!) ## Contribution -All contribtutions/ideas/suggestions are welcome! Create a new ticket via [GitHub issues](https://github.com/trickest/cve/issues) or tweet at us [@trick3st](https://twitter.com/trick3st). - -## Build your own workflows - -We believe in the value of tinkering; cookie-cutter solutions rarely cut it. Sign up for a [Trickest](https://trickest.com) demo to customize this workflow to your use case, get access to many more workflows, or build your own workflows from scratch! - -[](https://trickest.io/auth/register) +All contribtutions/ideas/suggestions are welcome! Create a new ticket via [GitHub issues](https://github.com/0xMarcio/cve/issues) . \ No newline at end of file