| PocOrExp_in_Github | https://github.com/ycdxsb/PocOrExp_in_Github | | 根据 CVE 编号从 GitHub 查找 EXP,不支持MS 编号查询 |
| Vulhub | https://github.com/vulhub/vulhub | | 漏洞复现 |
| | | |
| Bash-ShellShock | exploit/multi/http/apache_mod_cgi_bash_env_exec | bash <= 4.3.11 | 需配合 apache/nginx + sh-cgi 共同完成。复现方法 |
| Drupal | exploit/unix/webapp/drupal_coder_exec、exploit/multi/http/drupal_drupageddon | Drupal 7.x | |
| ProFTPd | exploit/unix/ftp/proftpd_modcopy_exec、https://github.com/t0kx/exploit-CVE-2015-3306 | ProFTPd == 1.3.5 | 该漏洞仅属于文件上传漏洞,需配合 apache+php 才能实现 shell 反连的效果。 |
| phpMyAdmin | exploit/multi/http/phpmyadmin_preg_replace | 3.5.x < 3.5.8.1 | 需提供登录凭据 |
| UnrealIRCd | exploit/unix/irc/unreal_ircd_3281_backdoor | Unrealircd == 3.2.8.1 | |
| | | |
| | | |