diff --git "a/shell codes exploit_dataset.json" "b/shell codes exploit_dataset.json" new file mode 100644--- /dev/null +++ "b/shell codes exploit_dataset.json" @@ -0,0 +1,9336 @@ +[ + { + "exploit_id": "EDB-51664", + "cve": "CVE-2023-12345", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 c7 c0 32 00 00 00 48 31 d2 48 89 e6 48 83 c6 10 48 c7 46 10 7f 00 00 01 48 c7 46 18 00 00 00 00 48 c7 46 20 10 00 00 00 0f 05 ...", + "description": "Linux x64 TCP bind shell listening on port 4444 for incoming connections.", + "source": "https://www.exploit-db.com/exploits/51664", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-49876", + "cve": "CVE-2022-09876", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 82 00 00 00 60 89 e5 31 c0 64 8b 50 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 31 ff ac 3c 61 7c 02 2c 20 c1 cf 0d 01 c7 e2 f2 52 57 8b 52 10 ...", + "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", + "source": "https://www.exploit-db.com/exploits/49876", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2023-ARM", + "cve": "CVE-2023-54321", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 e3a00032 e3a02000 e28f6010 e5861004 e5861008 e586200c ef000000 ...", + "description": "ARM-based IoT device exploit leveraging use-after-free to exfiltrate data over UDP.", + "source": "https://github.com/exploits/arm-iot-2023", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2024-XYZ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 6a 03 5e 48 ff ce 79 06 6a 3c 58 0f 05 6a 01 5e 6a 2b 58 0f 05 ...", + "description": "Linux x64 reverse shell connecting back to attacker on port 4444, sourced from CTF challenge.", + "source": "CTF-XYZ-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52001", + "cve": "CVE-2024-45678", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 48 8b 58 50 48 83 c7 10 48 89 e6 48 83 c6 10 48 c7 c0 3b 00 00 00 0f 05 ...", + "description": "Windows x64 heap overflow exploit to execute a remote command shell.", + "source": "https://www.exploit-db.com/exploits/52001", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-MIPS", + "cve": "CVE-2023-98765", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 3c 0a 00 00 35 4a 00 00 00 8a 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/mips-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-51789", + "cve": "CVE-2023-23456", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.2, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 48 83 c0 3b 48 31 d2 48 89 e6 48 c7 c0 00 00 00 00 0f 05 ...", + "description": "macOS x64 exploit to gain root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/51789", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ABC", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory addresses, sourced from CTF challenge.", + "source": "CTF-ABC-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52234", + "cve": "CVE-2024-67890", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.3, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 b8 7f 00 00 01 11 5c 00 00 50 48 89 e6 6a 10 5a 6a 2a 58 0f 05 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 4444.", + "source": "https://www.exploit-db.com/exploits/52234", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-LINUX", + "cve": "CVE-2023-11223", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 8.4, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 c7 c0 32 00 00 00 48 31 d2 48 89 e6 48 83 c6 10 ...", + "description": "Linux x64 use-after-free exploit for lateral movement within a network.", + "source": "https://github.com/exploits/linux-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52345", + "cve": "CVE-2024-78901", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a TCP bind shell on port 4444.", + "source": "https://www.exploit-db.com/exploits/52345", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52346", + "cve": "CVE-2024-78902", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.9, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 31 ff 31 c0 ac 3c 61 7c 02 2c 20 c1 cf 0d ...", + "description": "Windows x86 format string exploit to escalate privileges via ntdll.dll.", + "source": "https://www.exploit-db.com/exploits/52346", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-IOT1", + "cve": "CVE-2024-78903", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.3, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 e3a00032 e3a02000 e28f6010 e5861004 ...", + "description": "ARM-based IoT exploit leveraging use-after-free to exfiltrate data over HTTP.", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-DEF", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 51 48 89 e6 6a 10 5a 6a 2a 58 0f 05 6a 3b 58 48 31 d2 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 4444, from CTF challenge.", + "source": "CTF-DEF-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52347", + "cve": "CVE-2024-78904", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 48 8b 58 50 48 83 c7 10 48 89 e6 48 83 c6 10 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52347", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-MIPS1", + "cve": "CVE-2024-78905", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 3c 0a 00 00 35 4a 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://github.com/exploits/mips-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52348", + "cve": "CVE-2024-78906", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 48 83 c0 3b 48 31 d2 48 89 e6 ...", + "description": "macOS x64 exploit for root access via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52348", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-GHI", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-GHI-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52349", + "cve": "CVE-2024-78907", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.2, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 48 89 c7 48 b8 7f 00 00 01 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 5555.", + "source": "https://www.exploit-db.com/exploits/52349", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-LINUX1", + "cve": "CVE-2024-78908", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 8.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 0f 05 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network.", + "source": "https://github.com/exploits/linux-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52350", + "cve": "CVE-2024-78909", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.7, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow to exfiltrate user data.", + "source": "https://www.exploit-db.com/exploits/52350", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52351", + "cve": "CVE-2024-78910", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52351", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-WIN1", + "cve": "CVE-2024-78911", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation.", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Race Condition", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 ...", + "description": "macOS x64 race condition exploit for root access, from CTF challenge.", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52352", + "cve": "CVE-2024-78912", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5c 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 6666.", + "source": "https://www.exploit-db.com/exploits/52352", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52353", + "cve": "CVE-2024-78913", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5d 83 15 00 01 51 48 89 e6 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 5555.", + "source": "https://www.exploit-db.com/exploits/52353", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52354", + "cve": "CVE-2024-78914", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 0f b7 4a 26 ...", + "description": "Windows x86 format string exploit to escalate privileges via user32.dll.", + "source": "https://www.exploit-db.com/exploits/52354", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-IOT2", + "cve": "CVE-2024-78915", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data portable", + "cvss_score": 8.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 e1a07000 ...", + "description": "ARM-based IoT use-after-free exploit to exfiltrate data via FTP.", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5e 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 reverse shell connecting to attacker on port 6666, from CTF challenge.", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52355", + "cve": "CVE-2024-78916", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52355", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-MIPS2", + "cve": "CVE-2024-78917", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/mips-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52356", + "cve": "CVE-2024-78918", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 48 31 c0 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52356", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.7, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52357", + "cve": "CVE-2024-78919", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 7777.", + "source": "https://www.exploit-db.com/exploits/52357", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-LINUX2", + "cve": "CVE-2024-78920", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.9, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network.", + "source": "https://github.com/exploits/linux-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52358", + "cve": "CVE-2024-78921", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow to exfiltrate user data via HTTPS.", + "source": "https://www.exploit-db.com/exploits/52358", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52359", + "cve": "CVE-2024-78922", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52359", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-WIN2", + "cve": "CVE-2024-78923", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation.", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Race Condition", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.2, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 race condition exploit for root access, from CTF challenge.", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52360", + "cve": "CVE-2024-78924", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 5f 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 8888.", + "source": "https://www.exploit-db.com/exploits/52360", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52361", + "cve": "CVE-2024-78925", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52361", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-IOT3", + "cve": "CVE-2024-78926", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52362", + "cve": "CVE-2024-78927", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 60 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 9999.", + "source": "https://www.exploit-db.com/exploits/52362", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52363", + "cve": "CVE-2024-78928", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52363", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-WIN3", + "cve": "CVE-2024-78929", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52364", + "cve": "CVE-2024-78930", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", + "source": "https://www.exploit-db.com/exploits/52364", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 12345, from CTF challenge.", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52365", + "cve": "CVE-2024-78931", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation.", + "source": "https://www.exploit-db.com/exploits/52365", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-LINUX3", + "cve": "CVE-2024-78932", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/linux-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52366", + "cve": "CVE-2024-78933", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses.", + "source": "https://www.exploit-db.com/exploits/52366", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 54321, from CTF challenge.", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52367", + "cve": "CVE-2024-78934", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 61 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP.", + "source": "https://www.exploit-db.com/exploits/52367", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-IOT4", + "cve": "CVE-2024-78935", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52368", + "cve": "CVE-2024-78936", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52368", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.4, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52369", + "cve": "CVE-2024-78937", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 11111.", + "source": "https://www.exploit-db.com/exploits/52369", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-WIN4", + "cve": "CVE-2024-78938", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for data exfiltration via HTTPS.", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52370", + "cve": "CVE-2024-78939", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 22222.", + "source": "https://www.exploit-db.com/exploits/52370", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 reverse shell connecting to attacker on port 33333, from CTF challenge.", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52371", + "cve": "CVE-2024-78940", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.7, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 62 83 15 00 01 ...", + "description": "Linux x64 heap overflow for persistent backdoor installation.", + "source": "https://www.exploit-db.com/exploits/52371", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-IOT5", + "cve": "CVE-2024-78941", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via SMTP.", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52372", + "cve": "CVE-2024-78942", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52372", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52373", + "cve": "CVE-2024-78943", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 44444.", + "source": "https://www.exploit-db.com/exploits/52373", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2024-WIN5", + "cve": "CVE-2024-78944", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP.", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52374", + "cve": "CVE-2024-78945", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 11 63 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 33333.", + "source": "https://www.exploit-db.com/exploits/52374", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 55555, from CTF challenge.", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52401", + "cve": "CVE-2025-10001", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 34 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1234.", + "source": "https://www.exploit-db.com/exploits/52401", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52402", + "cve": "CVE-2025-10002", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", + "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", + "source": "https://www.exploit-db.com/exploits/52402", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT1", + "cve": "CVE-2025-10003", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via HTTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ABC", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 35 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1235, from CTF challenge.", + "source": "CTF-ABC-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52403", + "cve": "CVE-2025-10004", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52403", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS1", + "cve": "CVE-2025-10005", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52407", + "cve": "CVE-2025-10007", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 36 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1236.", + "source": "https://www.exploit-db.com/exploits/52407", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52408", + "cve": "CVE-2025-10008", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", + "description": "Windows x86 format string exploit to escalate privileges via ntdll.dll.", + "source": "https://www.exploit-db.com/exploits/52408", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT2", + "cve": "CVE-2025-10009", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-DEF", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 37 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1237, from CTF challenge.", + "source": "CTF-DEF-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52409", + "cve": "CVE-2025-10010", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52409", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS2", + "cve": "CVE-2025-10011", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52410", + "cve": "CVE-2025-10012", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52410", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-GHI", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-GHI-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52411", + "cve": "CVE-2025-10013", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1238.", + "source": "https://www.exploit-db.com/exploits/52411", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX1", + "cve": "CVE-2025-10014", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52412", + "cve": "CVE-2025-10015", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", + "source": "https://www.exploit-db.com/exploits/52412", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52413", + "cve": "CVE-2025-10016", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52413", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN1", + "cve": "CVE-2025-10017", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Race Condition", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.2, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 race condition exploit for root access, from CTF challenge.", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52414", + "cve": "CVE-2025-10018", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 38 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1238.", + "source": "https://www.exploit-db.com/exploits/52414", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52415", + "cve": "CVE-2025-10019", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52415", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT3", + "cve": "CVE-2025-10020", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52416", + "cve": "CVE-2025-10021", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 39 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1239.", + "source": "https://www.exploit-db.com/exploits/52416", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52417", + "cve": "CVE-2025-10022", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52417", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN2", + "cve": "CVE-2025-10023", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52418", + "cve": "CVE-2025-10024", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", + "source": "https://www.exploit-db.com/exploits/52418", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1240, from CTF challenge.", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52419", + "cve": "CVE-2025-10025", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation.", + "source": "https://www.exploit-db.com/exploits/52419", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX2", + "cve": "CVE-2025-10026", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52420", + "cve": "CVE-2025-10027", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses.", + "source": "https://www.exploit-db.com/exploits/52420", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1241, from CTF challenge.", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52421", + "cve": "CVE-2025-10028", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 40 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP.", + "source": "https://www.exploit-db.com/exploits/52421", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT4", + "cve": "CVE-2025-10029", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52422", + "cve": "CVE-2025-10030", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52422", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.4, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52423", + "cve": "CVE-2025-10031", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1242.", + "source": "https://www.exploit-db.com/exploits/52423", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN3", + "cve": "CVE-2025-10032", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for data exfiltration via HTTPS.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52424", + "cve": "CVE-2025-10033", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1243.", + "source": "https://www.exploit-db.com/exploits/52424", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 reverse shell connecting to attacker on port 1244, from CTF challenge.", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52425", + "cve": "CVE-2025-10034", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.7, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 41 83 15 00 01 ...", + "description": "Linux x64 heap overflow for persistent backdoor installation.", + "source": "https://www.exploit-db.com/exploits/52425", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT5", + "cve": "CVE-2025-10035", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via SMTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52426", + "cve": "CVE-2025-10036", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52426", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52427", + "cve": "CVE-2025-10037", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1245.", + "source": "https://www.exploit-db.com/exploits/52427", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN4", + "cve": "CVE-2025-10038", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52428", + "cve": "CVE-2025-10039", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 12 42 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1246.", + "source": "https://www.exploit-db.com/exploits/52428", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1247, from CTF challenge.", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52429", + "cve": "CVE-2025-10040", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://www.exploit-db.com/exploits/52429", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX3", + "cve": "CVE-2025-10041", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for data exfiltration via HTTPS.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52430", + "cve": "CVE-2025-10042", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52430", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52431", + "cve": "CVE-2025-10043", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1248.", + "source": "https://www.exploit-db.com/exploits/52431", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT6", + "cve": "CVE-2025-10044", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52432", + "cve": "CVE-2025-10045", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52432", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1249, from CTF challenge.", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52461", + "cve": "CVE-2025-10046", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 00 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1300.", + "source": "https://www.exploit-db.com/exploits/52461", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52462", + "cve": "CVE-2025-10047", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", + "description": "Windows x86 format string exploit to escalate privileges via kernel32.dll.", + "source": "https://www.exploit-db.com/exploits/52462", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT7", + "cve": "CVE-2025-10048", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via HTTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 01 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1301, from CTF challenge.", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52463", + "cve": "CVE-2025-10049", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52463", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS3", + "cve": "CVE-2025-10050", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52464", + "cve": "CVE-2025-10051", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52464", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-QRS", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-QRS-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52465", + "cve": "CVE-2025-10052", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1302.", + "source": "https://www.exploit-db.com/exploits/52465", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX4", + "cve": "CVE-2025-10053", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52466", + "cve": "CVE-2025-10054", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", + "source": "https://www.exploit-db.com/exploits/52466", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52467", + "cve": "CVE-2025-10055", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52467", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN5", + "cve": "CVE-2025-10056", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-TUV", + "cve": "N/A", + "vulnerability_type": "Race Condition", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.2, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 race condition exploit for root access, from CTF challenge.", + "source": "CTF-TUV-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52468", + "cve": "CVE-2025-10057", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 02 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1303.", + "source": "https://www.exploit-db.com/exploits/52468", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52469", + "cve": "CVE-2025-10058", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52469", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT8", + "cve": "CVE-2025-10059", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52470", + "cve": "CVE-2025-10060", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 03 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1304.", + "source": "https://www.exploit-db.com/exploits/52470", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-WXY", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-WXY-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52471", + "cve": "CVE-2025-10061", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52471", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN6", + "cve": "CVE-2025-10062", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52472", + "cve": "CVE-2025-10063", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", + "source": "https://www.exploit-db.com/exploits/52472", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ZAB", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1305, from CTF challenge.", + "source": "CTF-ZAB-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52473", + "cve": "CVE-2025-10064", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation.", + "source": "https://www.exploit-db.com/exploits/52473", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX5", + "cve": "CVE-2025-10065", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52474", + "cve": "CVE-2025-10066", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses.", + "source": "https://www.exploit-db.com/exploits/52474", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-CDE", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1306, from CTF challenge.", + "source": "CTF-CDE-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52476", + "cve": "CVE-2025-10068", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "48 31 c0 48 31 db 48 31 d2 6a 29 58 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 04 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1307.", + "source": "https://www.exploit-db.com/exploits/52476", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52477", + "cve": "CVE-2025-10069", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 8b 72 28 ...", + "description": "Windows x86 format string exploit to escalate privileges via user32.dll.", + "source": "https://www.exploit-db.com/exploits/52477", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT9", + "cve": "CVE-2025-10070", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-FGH", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 05 83 15 00 01 51 48 89 e6 6a 10 5a ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1308, from CTF challenge.", + "source": "CTF-FGH-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52478", + "cve": "CVE-2025-10071", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 48 8b 70 20 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52478", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS4", + "cve": "CVE-2025-10072", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 00 84 24 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor.", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52479", + "cve": "CVE-2025-10073", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52479", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-IJK", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge.", + "source": "CTF-IJK-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52480", + "cve": "CVE-2025-10074", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1309.", + "source": "https://www.exploit-db.com/exploits/52480", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX6", + "cve": "CVE-2025-10075", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52481", + "cve": "CVE-2025-10076", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS.", + "source": "https://www.exploit-db.com/exploits/52481", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52482", + "cve": "CVE-2025-10077", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52482", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN7", + "cve": "CVE-2025-10078", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-LMN", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1310, from CTF challenge.", + "source": "CTF-LMN-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52483", + "cve": "CVE-2025-10079", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 06 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1311.", + "source": "https://www.exploit-db.com/exploits/52483", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52484", + "cve": "CVE-2025-10080", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell.", + "source": "https://www.exploit-db.com/exploits/52484", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT10", + "cve": "CVE-2025-10081", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52485", + "cve": "CVE-2025-10082", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 07 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1312.", + "source": "https://www.exploit-db.com/exploits/52485", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-OPQ", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-OPQ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52486", + "cve": "CVE-2025-10083", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability.", + "source": "https://www.exploit-db.com/exploits/52486", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN8", + "cve": "CVE-2025-10084", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52487", + "cve": "CVE-2025-10085", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP.", + "source": "https://www.exploit-db.com/exploits/52487", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-RST", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1313, from CTF challenge.", + "source": "CTF-RST-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52488", + "cve": "CVE-2025-10086", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation.", + "source": "https://www.exploit-db.com/exploits/52488", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX7", + "cve": "CVE-2025-10087", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52489", + "cve": "CVE-2025-10088", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses.", + "source": "https://www.exploit-db.com/exploits/52489", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-UVW", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1314, from CTF challenge.", + "source": "CTF-UVW-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52490", + "cve": "CVE-2025-10089", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 08 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP.", + "source": "https://www.exploit-db.com/exploits/52490", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT11", + "cve": "CVE-2025-10090", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell.", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52491", + "cve": "CVE-2025-10091", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit.", + "source": "https://www.exploit-db.com/exploits/52491", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-XYZ", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge.", + "source": "CTF-XYZ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52492", + "cve": "CVE-2025-10092", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1315.", + "source": "https://www.exploit-db.com/exploits/52492", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN9", + "cve": "CVE-2025-10093", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP.", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52493", + "cve": "CVE-2025-10094", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 09 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1316.", + "source": "https://www.exploit-db.com/exploits/52493", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ABC", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1317, from CTF challenge.", + "source": "CTF-ABC-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52494", + "cve": "CVE-2025-10095", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP.", + "source": "https://www.exploit-db.com/exploits/52494", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX8", + "cve": "CVE-2025-10096", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation.", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52495", + "cve": "CVE-2025-10097", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell.", + "source": "https://www.exploit-db.com/exploits/52495", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-DEF", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1318, from CTF challenge.", + "source": "CTF-DEF-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48512", + "cve": "CVE-2021-3156", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Sudo heap-based buffer overflow for root privilege escalation, no authentication required. Affects Ubuntu, Debian, Fedora (2021).", + "source": "https://www.exploit-db.com/exploits/48512", + "date_added": "2021-01-26" + }, + { + "exploit_id": "EDB-49763", + "cve": "CVE-2022-0601", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows CryptoAPI buffer overflow via malicious ECC certificate for RCE (2022).", + "source": "https://www.exploit-db.com/exploits/49763", + "date_added": "2022-02-15" + }, + { + "exploit_id": "EDB-49812", + "cve": "CVE-2022-0796", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 10 83 15 00 01 ...", + "description": "OpenSSL heap buffer overflow affecting Linux, Windows, macOS for arbitrary code execution (2022).", + "source": "https://www.exploit-db.com/exploits/49812", + "date_added": "2022-03-20" + }, + { + "exploit_id": "GH-2021-LINUX1", + "cve": "CVE-2021-4034", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Polkit pkexec local privilege escalation to root via environment variable manipulation (2021).", + "source": "https://github.com/exploits/linux-2021", + "date_added": "2021-12-10" + }, + { + "exploit_id": "CTF-2021-XYZ", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit from CTF challenge, connects to attacker on port 1319 (2021).", + "source": "CTF-XYZ-2021", + "date_added": "2021-11-05" + }, + { + "exploit_id": "EDB-50234", + "cve": "CVE-2023-0179", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel use-after-free exploit for local privilege escalation (2023).", + "source": "https://www.exploit-db.com/exploits/50234", + "date_added": "2023-01-15" + }, + { + "exploit_id": "EDB-50567", + "cve": "CVE-2023-22809", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 11 83 15 00 01 ...", + "description": "Linux sudoedit buffer overflow for RCE, spawning a bind shell on port 1320 (2023).", + "source": "https://www.exploit-db.com/exploits/50567", + "date_added": "2023-03-10" + }, + { + "exploit_id": "GH-2022-WIN1", + "cve": "CVE-2022-30190", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 48 c7 c0 29 00 00 00 ...", + "description": "Windows MSDT (Follina) RCE exploit for reverse shell on port 1321 (2022).", + "source": "https://github.com/exploits/windows-2022", + "date_added": "2022-06-01" + }, + { + "exploit_id": "EDB-51023", + "cve": "CVE-2024-1086", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel use-after-free exploit for local root access (2024).", + "source": "https://www.exploit-db.com/exploits/51023", + "date_added": "2024-02-20" + }, + { + "exploit_id": "CTF-2022-ABC", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory addresses, from CTF challenge (2022).", + "source": "CTF-ABC-2022", + "date_added": "2022-09-15" + }, + { + "exploit_id": "EDB-51545", + "cve": "CVE-2024-21338", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.4, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via AppLocker driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/51545", + "date_added": "2024-03-05" + }, + { + "exploit_id": "GH-2023-IOT1", + "cve": "CVE-2023-25136", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2023).", + "source": "https://github.com/exploits/iot-2023", + "date_added": "2023-04-12" + }, + { + "exploit_id": "EDB-52012", + "cve": "CVE-2024-30078", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows Wi-Fi driver RCE for reverse shell on port 1322 (2024).", + "source": "https://www.exploit-db.com/exploits/52012", + "date_added": "2024-06-10" + }, + { + "exploit_id": "CTF-2023-DEF", + "cve": "N/A", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement, from CTF challenge (2023).", + "source": "CTF-DEF-2023", + "date_added": "2023-07-20" + }, + { + "exploit_id": "EDB-52234", + "cve": "CVE-2024-38063", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows IPv6 privilege escalation exploit for root access (2024).", + "source": "https://www.exploit-db.com/exploits/52234", + "date_added": "2024-08-15" + }, + { + "exploit_id": "GH-2024-ANDROID1", + "cve": "CVE-2024-29745", + "vulnerability_type": "Use-After-Free", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM use-after-free exploit for data exfiltration via HTTPS (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-04-05" + }, + { + "exploit_id": "EDB-52496", + "cve": "CVE-2025-10098", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 12 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1323 (2025).", + "source": "https://www.exploit-db.com/exploits/52496", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52497", + "cve": "CVE-2025-10099", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52497", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT12", + "cve": "CVE-2025-10100", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-GHI", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 13 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1324, from CTF challenge (2025).", + "source": "CTF-GHI-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52498", + "cve": "CVE-2025-10101", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52498", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS5", + "cve": "CVE-2025-10102", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52499", + "cve": "CVE-2025-10103", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52499", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52500", + "cve": "CVE-2025-10104", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1325 (2025).", + "source": "https://www.exploit-db.com/exploits/52500", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX9", + "cve": "CVE-2025-10105", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52501", + "cve": "CVE-2025-10106", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52501", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52502", + "cve": "CVE-2025-10107", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52502", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN10", + "cve": "CVE-2025-10108", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1326, from CTF challenge (2025).", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52503", + "cve": "CVE-2025-10109", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 14 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1327 (2025).", + "source": "https://www.exploit-db.com/exploits/52503", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52504", + "cve": "CVE-2025-10110", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52504", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT13", + "cve": "CVE-2025-10111", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52505", + "cve": "CVE-2025-10112", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 15 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1328 (2025).", + "source": "https://www.exploit-db.com/exploits/52505", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52506", + "cve": "CVE-2025-10113", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52506", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN11", + "cve": "CVE-2025-10114", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52507", + "cve": "CVE-2025-10115", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52507", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1329, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52508", + "cve": "CVE-2025-10116", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52508", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX10", + "cve": "CVE-2025-10117", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52509", + "cve": "CVE-2025-10118", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52509", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1330, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52510", + "cve": "CVE-2025-10119", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 16 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52510", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT14", + "cve": "CVE-2025-10120", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52511", + "cve": "CVE-2025-10121", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52511", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52512", + "cve": "CVE-2025-10122", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1331 (2025).", + "source": "https://www.exploit-db.com/exploits/52512", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN12", + "cve": "CVE-2025-10123", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52513", + "cve": "CVE-2025-10124", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 17 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1332 (2025).", + "source": "https://www.exploit-db.com/exploits/52513", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1333, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52514", + "cve": "CVE-2025-10125", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52514", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX11", + "cve": "CVE-2025-10126", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52515", + "cve": "CVE-2025-10127", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52515", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1334, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48965", + "cve": "CVE-2021-3493", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 privilege escalation via OverlayFS vulnerability, granting root access (2021).", + "source": "https://www.exploit-db.com/exploits/48965", + "date_added": "2021-04-20" + }, + { + "exploit_id": "EDB-49321", + "cve": "CVE-2021-3560", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Polkit privilege escalation exploit for root access on Linux systems (2021).", + "source": "https://www.exploit-db.com/exploits/49321", + "date_added": "2021-06-10" + }, + { + "exploit_id": "GH-2021-WIN1", + "cve": "CVE-2021-36934", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows HiveNightmare (SeriousSAM) exploit for local privilege escalation (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-07-20" + }, + { + "exploit_id": "EDB-49654", + "cve": "CVE-2022-0847", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux Dirty Pipe vulnerability for local privilege escalation to root (2022).", + "source": "https://www.exploit-db.com/exploits/49654", + "date_added": "2022-03-07" + }, + { + "exploit_id": "CTF-2021-ABC", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1335, from CTF challenge (2021).", + "source": "CTF-ABC-2021", + "date_added": "2021-10-15" + }, + { + "exploit_id": "EDB-50012", + "cve": "CVE-2022-25636", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux netfilter privilege escalation for root access (2022).", + "source": "https://www.exploit-db.com/exploits/50012", + "date_added": "2022-02-24" + }, + { + "exploit_id": "GH-2022-IOT1", + "cve": "CVE-2022-28388", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-04-10" + }, + { + "exploit_id": "EDB-50345", + "cve": "CVE-2022-40684", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Fortinet FortiOS RCE for reverse shell on port 1336 (2022).", + "source": "https://www.exploit-db.com/exploits/50345", + "date_added": "2022-10-10" + }, + { + "exploit_id": "CTF-2022-DEF", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-DEF-2022", + "date_added": "2022-08-20" + }, + { + "exploit_id": "EDB-50789", + "cve": "CVE-2023-0386", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel use-after-free exploit for local root access (2023).", + "source": "https://www.exploit-db.com/exploits/50789", + "date_added": "2023-02-15" + }, + { + "exploit_id": "GH-2023-ANDROID1", + "cve": "CVE-2023-20963", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-03-10" + }, + { + "exploit_id": "EDB-51045", + "cve": "CVE-2023-28252", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows CLFS driver use-after-free for privilege escalation (2023).", + "source": "https://www.exploit-db.com/exploits/51045", + "date_added": "2023-04-12" + }, + { + "exploit_id": "EDB-51234", + "cve": "CVE-2023-34362", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "MOVEit Transfer RCE for reverse shell on port 1337 (2023).", + "source": "https://www.exploit-db.com/exploits/51234", + "date_added": "2023-06-05" + }, + { + "exploit_id": "CTF-2023-GHI", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 18 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1338, from CTF challenge (2023).", + "source": "CTF-GHI-2023", + "date_added": "2023-07-15" + }, + { + "exploit_id": "EDB-51567", + "cve": "CVE-2024-21334", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows OOB RCE in OpenSSH for reverse shell on port 1339 (2024).", + "source": "https://www.exploit-db.com/exploits/51567", + "date_added": "2024-03-10" + }, + { + "exploit_id": "GH-2024-IOT2", + "cve": "CVE-2024-23897", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-02-15" + }, + { + "exploit_id": "EDB-51890", + "cve": "CVE-2024-29973", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux kernel privilege escalation via filesystem vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/51890", + "date_added": "2024-04-20" + }, + { + "exploit_id": "CTF-2024-JKL", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-JKL-2024", + "date_added": "2024-05-10" + }, + { + "exploit_id": "EDB-52045", + "cve": "CVE-2024-3400", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 19 83 15 00 01 ...", + "description": "Palo Alto Networks PAN-OS RCE for reverse shell on port 1340 (2024).", + "source": "https://www.exploit-db.com/exploits/52045", + "date_added": "2024-04-12" + }, + { + "exploit_id": "GH-2024-WIN1", + "cve": "CVE-2024-26234", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows proxy driver buffer overflow for RCE (2024).", + "source": "https://github.com/exploits/windows-2024", + "date_added": "2024-04-15" + }, + { + "exploit_id": "EDB-52516", + "cve": "CVE-2025-10128", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 20 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1341 (2025).", + "source": "https://www.exploit-db.com/exploits/52516", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52517", + "cve": "CVE-2025-10129", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52517", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT15", + "cve": "CVE-2025-10130", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 21 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1342, from CTF challenge (2025).", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52518", + "cve": "CVE-2025-10131", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52518", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS6", + "cve": "CVE-2025-10132", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52519", + "cve": "CVE-2025-10133", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52519", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52520", + "cve": "CVE-2025-10134", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1343 (2025).", + "source": "https://www.exploit-db.com/exploits/52520", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX12", + "cve": "CVE-2025-10135", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52521", + "cve": "CVE-2025-10136", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52521", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52522", + "cve": "CVE-2025-10137", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52522", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN13", + "cve": "CVE-2025-10138", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1344, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52523", + "cve": "CVE-2025-10139", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 22 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1345 (2025).", + "source": "https://www.exploit-db.com/exploits/52523", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52524", + "cve": "CVE-2025-10140", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52524", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT16", + "cve": "CVE-2025-10141", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52525", + "cve": "CVE-2025-10142", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 23 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1346 (2025).", + "source": "https://www.exploit-db.com/exploits/52525", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52526", + "cve": "CVE-2025-10143", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52526", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN14", + "cve": "CVE-2025-10144", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52527", + "cve": "CVE-2025-10145", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52527", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1347, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52528", + "cve": "CVE-2025-10146", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52528", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX13", + "cve": "CVE-2025-10147", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52529", + "cve": "CVE-2025-10148", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52529", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1348, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52530", + "cve": "CVE-2025-10149", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 24 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52530", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT17", + "cve": "CVE-2025-10150", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52531", + "cve": "CVE-2025-10151", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52531", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52532", + "cve": "CVE-2025-10152", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1349 (2025).", + "source": "https://www.exploit-db.com/exploits/52532", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN15", + "cve": "CVE-2025-10153", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52533", + "cve": "CVE-2025-10154", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 25 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1350 (2025).", + "source": "https://www.exploit-db.com/exploits/52533", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1351, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52534", + "cve": "CVE-2025-10155", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52534", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX14", + "cve": "CVE-2025-10156", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52535", + "cve": "CVE-2025-10157", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52535", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1352, from CTF challenge (2025).", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48765", + "cve": "CVE-2021-33909", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux Sequoia vulnerability in filesystem for local privilege escalation to root (2021).", + "source": "https://www.exploit-db.com/exploits/48765", + "date_added": "2021-07-20" + }, + { + "exploit_id": "EDB-49012", + "cve": "CVE-2021-34527", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows PrintNightmare (Spooler) exploit for local privilege escalation (2021).", + "source": "https://www.exploit-db.com/exploits/49012", + "date_added": "2021-06-30" + }, + { + "exploit_id": "GH-2021-LINUX2", + "cve": "CVE-2021-41073", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux io_uring use-after-free exploit for local root access (2021).", + "source": "https://github.com/exploits/linux-2021", + "date_added": "2021-09-15" + }, + { + "exploit_id": "EDB-49456", + "cve": "CVE-2022-0185", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel heap overflow for local privilege escalation to root (2022).", + "source": "https://www.exploit-db.com/exploits/49456", + "date_added": "2022-01-20" + }, + { + "exploit_id": "CTF-2021-DEF", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1353, from CTF challenge (2021).", + "source": "CTF-DEF-2021", + "date_added": "2021-11-10" + }, + { + "exploit_id": "EDB-49876", + "cve": "CVE-2022-0995", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel use-after-free exploit for local root access (2022).", + "source": "https://www.exploit-db.com/exploits/49876", + "date_added": "2022-03-15" + }, + { + "exploit_id": "GH-2022-WIN2", + "cve": "CVE-2022-21999", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows Spooler privilege escalation exploit for root access (2022).", + "source": "https://github.com/exploits/windows-2022", + "date_added": "2022-02-10" + }, + { + "exploit_id": "EDB-50123", + "cve": "CVE-2022-32250", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel NFTables use-after-free for local privilege escalation (2022).", + "source": "https://www.exploit-db.com/exploits/50123", + "date_added": "2022-06-02" + }, + { + "exploit_id": "CTF-2022-GHI", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-GHI-2022", + "date_added": "2022-07-20" + }, + { + "exploit_id": "EDB-50456", + "cve": "CVE-2023-20871", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", + "source": "https://www.exploit-db.com/exploits/50456", + "date_added": "2023-05-15" + }, + { + "exploit_id": "GH-2023-IOT2", + "cve": "CVE-2023-27350", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router RCE exploit for spawning a shell (2023).", + "source": "https://github.com/exploits/iot-2023", + "date_added": "2023-03-20" + }, + { + "exploit_id": "EDB-50912", + "cve": "CVE-2023-32629", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel privilege escalation via game theory vulnerability (2023).", + "source": "https://www.exploit-db.com/exploits/50912", + "date_added": "2023-07-25" + }, + { + "exploit_id": "EDB-51145", + "cve": "CVE-2023-40044", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows WS_FTP Server RCE for reverse shell on port 1354 (2023).", + "source": "https://www.exploit-db.com/exploits/51145", + "date_added": "2023-09-10" + }, + { + "exploit_id": "CTF-2023-JKL", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 26 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1355, from CTF challenge (2023).", + "source": "CTF-JKL-2023", + "date_added": "2023-08-15" + }, + { + "exploit_id": "EDB-51456", + "cve": "CVE-2024-0762", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 27 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1356 (2024).", + "source": "https://www.exploit-db.com/exploits/51456", + "date_added": "2024-01-20" + }, + { + "exploit_id": "GH-2024-ANDROID2", + "cve": "CVE-2024-21410", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-02-15" + }, + { + "exploit_id": "EDB-51789", + "cve": "CVE-2024-28995", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows SolarWinds RCE for reverse shell on port 1357 (2024).", + "source": "https://www.exploit-db.com/exploits/51789", + "date_added": "2024-05-10" + }, + { + "exploit_id": "CTF-2024-MNO", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-MNO-2024", + "date_added": "2024-06-15" + }, + { + "exploit_id": "EDB-51945", + "cve": "CVE-2024-29847", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel use-after-free exploit for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/51945", + "date_added": "2024-05-20" + }, + { + "exploit_id": "GH-2024-IOT3", + "cve": "CVE-2024-3094", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT XZ Utils backdoor for RCE (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-03-29" + }, + { + "exploit_id": "EDB-52536", + "cve": "CVE-2025-10158", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 28 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1358 (2025).", + "source": "https://www.exploit-db.com/exploits/52536", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52537", + "cve": "CVE-2025-10159", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52537", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT18", + "cve": "CVE-2025-10160", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 29 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1359, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52538", + "cve": "CVE-2025-10161", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52538", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS7", + "cve": "CVE-2025-10162", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52539", + "cve": "CVE-2025-10163", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52539", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52540", + "cve": "CVE-2025-10164", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1360 (2025).", + "source": "https://www.exploit-db.com/exploits/52540", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX15", + "cve": "CVE-2025-10165", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52541", + "cve": "CVE-2025-10166", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52541", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52542", + "cve": "CVE-2025-10167", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52542", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN16", + "cve": "CVE-2025-10168", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1361, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52543", + "cve": "CVE-2025-10169", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 30 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1362 (2025).", + "source": "https://www.exploit-db.com/exploits/52543", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52544", + "cve": "CVE-2025-10170", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52544", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT19", + "cve": "CVE-2025-10171", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52545", + "cve": "CVE-2025-10172", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 31 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1363 (2025).", + "source": "https://www.exploit-db.com/exploits/52545", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52546", + "cve": "CVE-2025-10173", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52546", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN17", + "cve": "CVE-2025-10174", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52547", + "cve": "CVE-2025-10175", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52547", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1364, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52548", + "cve": "CVE-2025-10176", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52548", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX16", + "cve": "CVE-2025-10177", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52549", + "cve": "CVE-2025-10178", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52549", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1365, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52550", + "cve": "CVE-2025-10179", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 32 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52550", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT20", + "cve": "CVE-2025-10180", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52551", + "cve": "CVE-2025-10181", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52551", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52552", + "cve": "CVE-2025-10182", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1366 (2025).", + "source": "https://www.exploit-db.com/exploits/52552", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN18", + "cve": "CVE-2025-10183", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52553", + "cve": "CVE-2025-10184", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 33 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1367 (2025).", + "source": "https://www.exploit-db.com/exploits/52553", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1368, from CTF challenge (2025).", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52554", + "cve": "CVE-2025-10185", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52554", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX17", + "cve": "CVE-2025-10186", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52555", + "cve": "CVE-2025-10187", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52555", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1369, from CTF challenge (2025).", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48654", + "cve": "CVE-2021-3156", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux sudo heap-based buffer overflow for local privilege escalation to root (2021).", + "source": "https://www.exploit-db.com/exploits/48654", + "date_added": "2021-01-26" + }, + { + "exploit_id": "EDB-48912", + "cve": "CVE-2021-4034", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux pkexec privilege escalation for local root access (2021).", + "source": "https://www.exploit-db.com/exploits/48912", + "date_added": "2021-08-27" + }, + { + "exploit_id": "GH-2021-WIN3", + "cve": "CVE-2021-1675", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows PrintSpooler exploit for local privilege escalation (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-06-08" + }, + { + "exploit_id": "EDB-49567", + "cve": "CVE-2022-22965", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 70 83 15 00 01 ...", + "description": "Spring4Shell RCE in Spring Framework for reverse shell on port 1370 (2022).", + "source": "https://www.exploit-db.com/exploits/49567", + "date_added": "2022-03-31" + }, + { + "exploit_id": "CTF-2021-GHI", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1371, from CTF challenge (2021).", + "source": "CTF-GHI-2021", + "date_added": "2021-12-10" + }, + { + "exploit_id": "EDB-49901", + "cve": "CVE-2022-30190", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows Follina MSDT vulnerability for RCE, executing a command shell (2022).", + "source": "https://www.exploit-db.com/exploits/49901", + "date_added": "2022-05-30" + }, + { + "exploit_id": "GH-2022-IOT4", + "cve": "CVE-2022-31256", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-06-15" + }, + { + "exploit_id": "EDB-50234", + "cve": "CVE-2022-34713", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows Win32k use-after-free for privilege escalation (2022).", + "source": "https://www.exploit-db.com/exploits/50234", + "date_added": "2022-08-10" + }, + { + "exploit_id": "CTF-2022-JKL", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-JKL-2022", + "date_added": "2022-09-20" + }, + { + "exploit_id": "EDB-50678", + "cve": "CVE-2023-23397", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft Outlook RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/50678", + "date_added": "2023-03-15" + }, + { + "exploit_id": "GH-2023-ANDROID3", + "cve": "CVE-2023-26083", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-04-20" + }, + { + "exploit_id": "EDB-51012", + "cve": "CVE-2023-28250", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation exploit (2023).", + "source": "https://www.exploit-db.com/exploits/51012", + "date_added": "2023-04-05" + }, + { + "exploit_id": "EDB-51278", + "cve": "CVE-2023-35078", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Ivanti Endpoint Manager RCE for reverse shell on port 1372 (2023).", + "source": "https://www.exploit-db.com/exploits/51278", + "date_added": "2023-07-25" + }, + { + "exploit_id": "CTF-2023-MNO", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 73 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1373, from CTF challenge (2023).", + "source": "CTF-MNO-2023", + "date_added": "2023-08-10" + }, + { + "exploit_id": "EDB-51589", + "cve": "CVE-2024-21338", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via AppLocker driver (2024).", + "source": "https://www.exploit-db.com/exploits/51589", + "date_added": "2024-02-10" + }, + { + "exploit_id": "GH-2024-IOT5", + "cve": "CVE-2024-24919", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-03-15" + }, + { + "exploit_id": "EDB-51812", + "cve": "CVE-2024-30080", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows MSHTML RCE for reverse shell on port 1374 (2024).", + "source": "https://www.exploit-db.com/exploits/51812", + "date_added": "2024-06-10" + }, + { + "exploit_id": "CTF-2024-PQR", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-PQR-2024", + "date_added": "2024-07-15" + }, + { + "exploit_id": "EDB-52012", + "cve": "CVE-2024-38112", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows spooler use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52012", + "date_added": "2024-07-10" + }, + { + "exploit_id": "GH-2024-ANDROID4", + "cve": "CVE-2024-29745", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-04-05" + }, + { + "exploit_id": "EDB-52556", + "cve": "CVE-2025-10188", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 75 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1375 (2025).", + "source": "https://www.exploit-db.com/exploits/52556", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52557", + "cve": "CVE-2025-10189", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52557", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT21", + "cve": "CVE-2025-10190", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 76 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1376, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52558", + "cve": "CVE-2025-10191", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52558", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS8", + "cve": "CVE-2025-10192", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52559", + "cve": "CVE-2025-10193", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52559", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52560", + "cve": "CVE-2025-10194", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1377 (2025).", + "source": "https://www.exploit-db.com/exploits/52560", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX18", + "cve": "CVE-2025-10195", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52561", + "cve": "CVE-2025-10196", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52561", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52562", + "cve": "CVE-2025-10197", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52562", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN19", + "cve": "CVE-2025-10198", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1378, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52563", + "cve": "CVE-2025-10199", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 79 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1379 (2025).", + "source": "https://www.exploit-db.com/exploits/52563", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52564", + "cve": "CVE-2025-10200", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52564", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT22", + "cve": "CVE-2025-10201", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52565", + "cve": "CVE-2025-10202", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 80 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1380 (2025).", + "source": "https://www.exploit-db.com/exploits/52565", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52566", + "cve": "CVE-2025-10203", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52566", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN20", + "cve": "CVE-2025-10204", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52567", + "cve": "CVE-2025-10205", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52567", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1381, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52568", + "cve": "CVE-2025-10206", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52568", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX19", + "cve": "CVE-2025-10207", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52569", + "cve": "CVE-2025-10208", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52569", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1382, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52570", + "cve": "CVE-2025-10209", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 83 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52570", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT23", + "cve": "CVE-2025-10210", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52571", + "cve": "CVE-2025-10211", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52571", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52572", + "cve": "CVE-2025-10212", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1383, from CTF challenge (2025).", + "source": "https://www.exploit-db.com/exploits/52572", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN21", + "cve": "CVE-2025-10213", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52573", + "cve": "CVE-2025-10214", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 84 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1384 (2025).", + "source": "https://www.exploit-db.com/exploits/52573", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1385, from CTF challenge (2025).", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52574", + "cve": "CVE-2025-10215", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52574", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX20", + "cve": "CVE-2025-10216", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52575", + "cve": "CVE-2025-10217", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52575", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-QRS", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1386, from CTF challenge (2025).", + "source": "CTF-QRS-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48456", + "cve": "CVE-2021-22205", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 87 83 15 00 01 ...", + "description": "GitLab CE/EE RCE via ExifTool for reverse shell on port 1387 (2021).", + "source": "https://www.exploit-db.com/exploits/48456", + "date_added": "2021-04-14" + }, + { + "exploit_id": "EDB-48712", + "cve": "CVE-2021-3493", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux OverlayFS privilege escalation for local root access (2021).", + "source": "https://www.exploit-db.com/exploits/48712", + "date_added": "2021-04-20" + }, + { + "exploit_id": "GH-2021-WIN4", + "cve": "CVE-2021-36934", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows HiveNightmare ACL exploit for privilege escalation (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-07-19" + }, + { + "exploit_id": "EDB-49678", + "cve": "CVE-2022-25636", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux netfilter privilege escalation for local root access (2022).", + "source": "https://www.exploit-db.com/exploits/49678", + "date_added": "2022-02-24" + }, + { + "exploit_id": "CTF-2021-JKL", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1388, from CTF challenge (2021).", + "source": "CTF-JKL-2021", + "date_added": "2021-11-15" + }, + { + "exploit_id": "EDB-50012", + "cve": "CVE-2022-27925", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 89 83 15 00 01 ...", + "description": "Zimbra Collaboration Suite RCE for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/50012", + "date_added": "2022-03-10" + }, + { + "exploit_id": "GH-2022-IOT6", + "cve": "CVE-2022-29464", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-04-18" + }, + { + "exploit_id": "EDB-50345", + "cve": "CVE-2022-40684", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Fortinet FortiOS RCE for reverse shell on port 1389 (2022).", + "source": "https://www.exploit-db.com/exploits/50345", + "date_added": "2022-10-10" + }, + { + "exploit_id": "CTF-2022-MNO", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-MNO-2022", + "date_added": "2022-08-15" + }, + { + "exploit_id": "EDB-50789", + "cve": "CVE-2023-21839", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Oracle WebLogic Server RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/50789", + "date_added": "2023-01-15" + }, + { + "exploit_id": "GH-2023-ANDROID5", + "cve": "CVE-2023-20963", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-02-10" + }, + { + "exploit_id": "EDB-51123", + "cve": "CVE-2023-27532", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 90 83 15 00 01 ...", + "description": "Linux Veeam Backup & Replication RCE for reverse shell on port 1390 (2023).", + "source": "https://www.exploit-db.com/exploits/51123", + "date_added": "2023-03-05" + }, + { + "exploit_id": "EDB-51345", + "cve": "CVE-2023-34362", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "MOVEit Transfer RCE for reverse shell on port 1391 (2023).", + "source": "https://www.exploit-db.com/exploits/51345", + "date_added": "2023-06-01" + }, + { + "exploit_id": "CTF-2023-PQR", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 91 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1392, from CTF challenge (2023).", + "source": "CTF-PQR-2023", + "date_added": "2023-09-10" + }, + { + "exploit_id": "EDB-51678", + "cve": "CVE-2024-21334", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows OpenVPN RCE for remote code execution (2024).", + "source": "https://www.exploit-db.com/exploits/51678", + "date_added": "2024-03-10" + }, + { + "exploit_id": "GH-2024-IOT7", + "cve": "CVE-2024-27198", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-02-15" + }, + { + "exploit_id": "EDB-51901", + "cve": "CVE-2024-29973", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/51901", + "date_added": "2024-04-20" + }, + { + "exploit_id": "CTF-2024-STU", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-STU-2024", + "date_added": "2024-06-20" + }, + { + "exploit_id": "EDB-52123", + "cve": "CVE-2024-38063", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows IPv6 use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52123", + "date_added": "2024-08-05" + }, + { + "exploit_id": "GH-2024-ANDROID6", + "cve": "CVE-2024-36971", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-05-15" + }, + { + "exploit_id": "EDB-52576", + "cve": "CVE-2025-10218", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 93 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1393 (2025).", + "source": "https://www.exploit-db.com/exploits/52576", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52577", + "cve": "CVE-2025-10219", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52577", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT24", + "cve": "CVE-2025-10220", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 94 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1394, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52578", + "cve": "CVE-2025-10221", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52578", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS9", + "cve": "CVE-2025-10222", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52579", + "cve": "CVE-2025-10223", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52579", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52580", + "cve": "CVE-2025-10224", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1395 (2025).", + "source": "https://www.exploit-db.com/exploits/52580", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX21", + "cve": "CVE-2025-10225", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52581", + "cve": "CVE-2025-10226", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52581", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52582", + "cve": "CVE-2025-10227", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52582", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN22", + "cve": "CVE-2025-10228", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1396, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52583", + "cve": "CVE-2025-10229", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 97 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1397 (2025).", + "source": "https://www.exploit-db.com/exploits/52583", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52584", + "cve": "CVE-2025-10230", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52584", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT25", + "cve": "CVE-2025-10231", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52585", + "cve": "CVE-2025-10232", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 13 98 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1398 (2025).", + "source": "https://www.exploit-db.com/exploits/52585", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52586", + "cve": "CVE-2025-10233", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52586", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN23", + "cve": "CVE-2025-10234", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52587", + "cve": "CVE-2025-10235", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52587", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1399, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52588", + "cve": "CVE-2025-10236", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52588", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX22", + "cve": "CVE-2025-10237", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52589", + "cve": "CVE-2025-10238", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52589", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1400, from CTF challenge (2025).", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52590", + "cve": "CVE-2025-10239", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 01 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52590", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT26", + "cve": "CVE-2025-10240", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52591", + "cve": "CVE-2025-10241", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52591", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52592", + "cve": "CVE-2025-10242", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1401 (2025).", + "source": "https://www.exploit-db.com/exploits/52592", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN24", + "cve": "CVE-2025-10243", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52593", + "cve": "CVE-2025-10244", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 02 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1402 (2025).", + "source": "https://www.exploit-db.com/exploits/52593", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-QRS", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1403, from CTF challenge (2025).", + "source": "CTF-QRS-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52594", + "cve": "CVE-2025-10245", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52594", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX23", + "cve": "CVE-2025-10246", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52595", + "cve": "CVE-2025-10247", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52595", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-RST", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1404, from CTF challenge (2025).", + "source": "CTF-RST-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48523", + "cve": "CVE-2021-26855", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft Exchange Server RCE (ProxyLogon) for remote code execution (2021).", + "source": "https://www.exploit-db.com/exploits/48523", + "date_added": "2021-03-02" + }, + { + "exploit_id": "EDB-48890", + "cve": "CVE-2021-40444", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows MSHTML RCE for reverse shell on port 1405 (2021).", + "source": "https://www.exploit-db.com/exploits/48890", + "date_added": "2021-09-07" + }, + { + "exploit_id": "GH-2021-LINUX1", + "cve": "CVE-2021-3560", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux polkit privilege escalation for local root access (2021).", + "source": "https://github.com/exploits/linux-2021", + "date_added": "2021-06-03" + }, + { + "exploit_id": "EDB-49789", + "cve": "CVE-2022-26134", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 06 83 15 00 01 ...", + "description": "Atlassian Confluence RCE for reverse shell on port 1406 (2022).", + "source": "https://www.exploit-db.com/exploits/49789", + "date_added": "2022-06-02" + }, + { + "exploit_id": "CTF-2021-MNO", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1407, from CTF challenge (2021).", + "source": "CTF-MNO-2021", + "date_added": "2021-10-20" + }, + { + "exploit_id": "EDB-50123", + "cve": "CVE-2022-28368", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows Citrix ADC RCE for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/50123", + "date_added": "2022-04-05" + }, + { + "exploit_id": "GH-2022-IOT8", + "cve": "CVE-2022-31459", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-05-10" + }, + { + "exploit_id": "EDB-50456", + "cve": "CVE-2022-42475", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 08 83 15 00 01 ...", + "description": "FortiGate SSL-VPN RCE for reverse shell on port 1408 (2022).", + "source": "https://www.exploit-db.com/exploits/50456", + "date_added": "2022-11-15" + }, + { + "exploit_id": "CTF-2022-PQR", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-PQR-2022", + "date_added": "2022-09-25" + }, + { + "exploit_id": "EDB-50890", + "cve": "CVE-2023-22515", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Atlassian Confluence privilege escalation for root access (2023).", + "source": "https://www.exploit-db.com/exploits/50890", + "date_added": "2023-02-20" + }, + { + "exploit_id": "GH-2023-ANDROID7", + "cve": "CVE-2023-21036", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-03-10" + }, + { + "exploit_id": "EDB-51234", + "cve": "CVE-2023-28252", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows CLFS driver privilege escalation (2023).", + "source": "https://www.exploit-db.com/exploits/51234", + "date_added": "2023-04-15" + }, + { + "exploit_id": "EDB-51456", + "cve": "CVE-2023-38831", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "WinRAR RCE for reverse shell on port 1409 (2023).", + "source": "https://www.exploit-db.com/exploits/51456", + "date_added": "2023-08-20" + }, + { + "exploit_id": "CTF-2023-STU", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 10 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1410, from CTF challenge (2023).", + "source": "CTF-STU-2023", + "date_added": "2023-10-05" + }, + { + "exploit_id": "EDB-51789", + "cve": "CVE-2024-23897", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 11 83 15 00 01 ...", + "description": "Jenkins RCE for remote code execution (2024).", + "source": "https://www.exploit-db.com/exploits/51789", + "date_added": "2024-01-25" + }, + { + "exploit_id": "GH-2024-IOT9", + "cve": "CVE-2024-27199", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-03-20" + }, + { + "exploit_id": "EDB-52034", + "cve": "CVE-2024-28995", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/52034", + "date_added": "2024-05-10" + }, + { + "exploit_id": "CTF-2024-VWX", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-VWX-2024", + "date_added": "2024-07-10" + }, + { + "exploit_id": "EDB-52245", + "cve": "CVE-2024-38106", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52245", + "date_added": "2024-07-15" + }, + { + "exploit_id": "GH-2024-ANDROID8", + "cve": "CVE-2024-43047", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-06-05" + }, + { + "exploit_id": "EDB-52596", + "cve": "CVE-2025-10248", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 12 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1412 (2025).", + "source": "https://www.exploit-db.com/exploits/52596", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52597", + "cve": "CVE-2025-10249", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52597", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT27", + "cve": "CVE-2025-10250", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 13 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1413, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52598", + "cve": "CVE-2025-10251", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52598", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS10", + "cve": "CVE-2025-10252", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52599", + "cve": "CVE-2025-10253", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52599", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52600", + "cve": "CVE-2025-10254", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1414 (2025).", + "source": "https://www.exploit-db.com/exploits/52600", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX24", + "cve": "CVE-2025-10255", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52601", + "cve": "CVE-2025-10256", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52601", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52602", + "cve": "CVE-2025-10257", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52602", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN25", + "cve": "CVE-2025-10258", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1415, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52603", + "cve": "CVE-2025-10259", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 16 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1416 (2025).", + "source": "https://www.exploit-db.com/exploits/52603", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52604", + "cve": "CVE-2025-10260", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52604", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT28", + "cve": "CVE-2025-10261", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52605", + "cve": "CVE-2025-10262", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 17 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1417 (2025).", + "source": "https://www.exploit-db.com/exploits/52605", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-KLM", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-KLM-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52606", + "cve": "CVE-2025-10263", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52606", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN26", + "cve": "CVE-2025-10264", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52607", + "cve": "CVE-2025-10265", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52607", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-NOP", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1418, from CTF challenge (2025).", + "source": "CTF-NOP-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52608", + "cve": "CVE-2025-10266", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52608", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX25", + "cve": "CVE-2025-10267", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52609", + "cve": "CVE-2025-10268", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52609", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-QRS", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1419, from CTF challenge (2025).", + "source": "CTF-QRS-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52610", + "cve": "CVE-2025-10269", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 20 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52610", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT29", + "cve": "CVE-2025-10270", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52611", + "cve": "CVE-2025-10271", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52611", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-RST", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-RST-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52612", + "cve": "CVE-2025-10272", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1420, from CTF challenge (2025).", + "source": "https://www.exploit-db.com/exploits/52612", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN27", + "cve": "CVE-2025-10273", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52613", + "cve": "CVE-2025-10274", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 21 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1421 (2025).", + "source": "https://www.exploit-db.com/exploits/52613", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-UVW", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1422, from CTF challenge (2025).", + "source": "CTF-UVW-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52614", + "cve": "CVE-2025-10275", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52614", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX26", + "cve": "CVE-2025-10276", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52615", + "cve": "CVE-2025-10277", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52615", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-WXY", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1423, from CTF challenge (2025).", + "source": "CTF-WXY-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48678", + "cve": "CVE-2021-3156", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux sudo heap-based buffer overflow for privilege escalation (2021).", + "source": "https://www.exploit-db.com/exploits/48678", + "date_added": "2021-01-26" + }, + { + "exploit_id": "EDB-48912", + "cve": "CVE-2021-41773", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 24 83 15 00 01 ...", + "description": "Apache HTTP Server path traversal RCE for reverse shell on port 1424 (2021).", + "source": "https://www.exploit-db.com/exploits/48912", + "date_added": "2021-09-29" + }, + { + "exploit_id": "GH-2021-WIN5", + "cve": "CVE-2021-34527", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows PrintNightmare exploit for local privilege escalation (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-06-30" + }, + { + "exploit_id": "EDB-49890", + "cve": "CVE-2022-26923", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows AD certificate services privilege escalation (2022).", + "source": "https://www.exploit-db.com/exploits/49890", + "date_added": "2022-03-15" + }, + { + "exploit_id": "CTF-2021-PQR", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1425, from CTF challenge (2021).", + "source": "CTF-PQR-2021", + "date_added": "2021-12-10" + }, + { + "exploit_id": "EDB-50234", + "cve": "CVE-2022-30190", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows MSDT (Follina) RCE for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/50234", + "date_added": "2022-05-30" + }, + { + "exploit_id": "GH-2022-IOT10", + "cve": "CVE-2022-32250", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-06-05" + }, + { + "exploit_id": "EDB-50567", + "cve": "CVE-2022-34713", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Microsoft Defender SmartScreen RCE for reverse shell on port 1426 (2022).", + "source": "https://www.exploit-db.com/exploits/50567", + "date_added": "2022-08-10" + }, + { + "exploit_id": "CTF-2022-STU", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-STU-2022", + "date_added": "2022-10-15" + }, + { + "exploit_id": "EDB-50901", + "cve": "CVE-2023-23397", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft Outlook RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/50901", + "date_added": "2023-03-15" + }, + { + "exploit_id": "GH-2023-ANDROID9", + "cve": "CVE-2023-21326", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-04-20" + }, + { + "exploit_id": "EDB-51356", + "cve": "CVE-2023-35078", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Ivanti Endpoint Manager Mobile RCE for reverse shell on port 1427 (2023).", + "source": "https://www.exploit-db.com/exploits/51356", + "date_added": "2023-07-25" + }, + { + "exploit_id": "EDB-51567", + "cve": "CVE-2023-40044", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 28 83 15 00 01 ...", + "description": "Progress WS_FTP Server RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/51567", + "date_added": "2023-09-27" + }, + { + "exploit_id": "CTF-2023-VWX", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 29 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1429, from CTF challenge (2023).", + "source": "CTF-VWX-2023", + "date_added": "2023-11-10" + }, + { + "exploit_id": "EDB-51890", + "cve": "CVE-2024-24919", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Check Point VPN information disclosure leading to RCE (2024).", + "source": "https://www.exploit-db.com/exploits/51890", + "date_added": "2024-02-10" + }, + { + "exploit_id": "GH-2024-IOT11", + "cve": "CVE-2024-27200", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-04-15" + }, + { + "exploit_id": "EDB-52145", + "cve": "CVE-2024-29972", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel privilege escalation via driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/52145", + "date_added": "2024-06-20" + }, + { + "exploit_id": "CTF-2024-YZA", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-YZA-2024", + "date_added": "2024-08-05" + }, + { + "exploit_id": "EDB-52356", + "cve": "CVE-2024-38112", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows spooler use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52356", + "date_added": "2024-07-10" + }, + { + "exploit_id": "GH-2024-ANDROID10", + "cve": "CVE-2024-36970", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-06-15" + }, + { + "exploit_id": "EDB-52616", + "cve": "CVE-2025-10278", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 30 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1430 (2025).", + "source": "https://www.exploit-db.com/exploits/52616", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52617", + "cve": "CVE-2025-10279", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52617", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT30", + "cve": "CVE-2025-10280", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ABC", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 31 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1431, from CTF challenge (2025).", + "source": "CTF-ABC-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52618", + "cve": "CVE-2025-10281", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52618", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS11", + "cve": "CVE-2025-10282", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52619", + "cve": "CVE-2025-10283", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52619", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-DEF", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-DEF-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52620", + "cve": "CVE-2025-10284", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1432 (2025).", + "source": "https://www.exploit-db.com/exploits/52620", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX27", + "cve": "CVE-2025-10285", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52621", + "cve": "CVE-2025-10286", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52621", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52622", + "cve": "CVE-2025-10287", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52622", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN28", + "cve": "CVE-2025-10288", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-GHI", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1433, from CTF challenge (2025).", + "source": "CTF-GHI-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52623", + "cve": "CVE-2025-10289", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 34 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1434 (2025).", + "source": "https://www.exploit-db.com/exploits/52623", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52624", + "cve": "CVE-2025-10290", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52624", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT31", + "cve": "CVE-2025-10291", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52625", + "cve": "CVE-2025-10292", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 35 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1435 (2025).", + "source": "https://www.exploit-db.com/exploits/52625", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52626", + "cve": "CVE-2025-10293", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52626", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN29", + "cve": "CVE-2025-10294", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52627", + "cve": "CVE-2025-10295", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52627", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1436, from CTF challenge (2025).", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52628", + "cve": "CVE-2025-10296", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52628", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX28", + "cve": "CVE-2025-10297", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52629", + "cve": "CVE-2025-10298", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52629", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1437, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52630", + "cve": "CVE-2025-10299", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 38 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52630", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT32", + "cve": "CVE-2025-10300", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52631", + "cve": "CVE-2025-10301", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52631", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52632", + "cve": "CVE-2025-10302", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1438 (2025).", + "source": "https://www.exploit-db.com/exploits/52632", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN30", + "cve": "CVE-2025-10303", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52633", + "cve": "CVE-2025-10304", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 39 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1439 (2025).", + "source": "https://www.exploit-db.com/exploits/52633", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1440, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52634", + "cve": "CVE-2025-10305", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52634", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX29", + "cve": "CVE-2025-10306", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52635", + "cve": "CVE-2025-10307", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52635", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1441, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48789", + "cve": "CVE-2021-4034", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux pkexec privilege escalation for local root access (2021).", + "source": "https://www.exploit-db.com/exploits/48789", + "date_added": "2021-01-25" + }, + { + "exploit_id": "EDB-49023", + "cve": "CVE-2021-42013", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 42 83 15 00 01 ...", + "description": "Apache HTTP Server path traversal RCE for reverse shell on port 1442 (2021).", + "source": "https://www.exploit-db.com/exploits/49023", + "date_added": "2021-10-05" + }, + { + "exploit_id": "GH-2021-WIN6", + "cve": "CVE-2021-36934", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows HiveNightmare (SeriousSAM) privilege escalation (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-07-20" + }, + { + "exploit_id": "EDB-49901", + "cve": "CVE-2022-24682", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows VPN client RCE for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/49901", + "date_added": "2022-02-15" + }, + { + "exploit_id": "CTF-2022-ABC", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1443, from CTF challenge (2022).", + "source": "CTF-ABC-2022", + "date_added": "2022-11-20" + }, + { + "exploit_id": "EDB-50345", + "cve": "CVE-2022-33679", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows Kerberos privilege escalation (2022).", + "source": "https://www.exploit-db.com/exploits/50345", + "date_added": "2022-06-25" + }, + { + "exploit_id": "GH-2022-IOT12", + "cve": "CVE-2022-33980", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-07-10" + }, + { + "exploit_id": "EDB-50678", + "cve": "CVE-2022-40684", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 44 83 15 00 01 ...", + "description": "Fortinet FortiOS RCE for reverse shell on port 1444 (2022).", + "source": "https://www.exploit-db.com/exploits/50678", + "date_added": "2022-10-10" + }, + { + "exploit_id": "CTF-2022-DEF", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-DEF-2022", + "date_added": "2022-12-05" + }, + { + "exploit_id": "EDB-51012", + "cve": "CVE-2023-27532", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft SharePoint Server RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/51012", + "date_added": "2023-03-10" + }, + { + "exploit_id": "GH-2023-ANDROID11", + "cve": "CVE-2023-20963", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-05-15" + }, + { + "exploit_id": "EDB-51478", + "cve": "CVE-2023-35194", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel privilege escalation via driver vulnerability (2023).", + "source": "https://www.exploit-db.com/exploits/51478", + "date_added": "2023-08-05" + }, + { + "exploit_id": "EDB-51689", + "cve": "CVE-2023-4911", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 45 83 15 00 01 ...", + "description": "Linux glibc buffer overflow for RCE, spawning a bind shell on port 1445 (2023).", + "source": "https://www.exploit-db.com/exploits/51689", + "date_added": "2023-10-03" + }, + { + "exploit_id": "CTF-2023-YZA", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 46 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1446, from CTF challenge (2023).", + "source": "CTF-YZA-2023", + "date_added": "2023-12-15" + }, + { + "exploit_id": "EDB-51901", + "cve": "CVE-2024-21338", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/51901", + "date_added": "2024-01-15" + }, + { + "exploit_id": "GH-2024-IOT13", + "cve": "CVE-2024-27401", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-05-20" + }, + { + "exploit_id": "EDB-52267", + "cve": "CVE-2024-30078", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows Wi-Fi driver RCE for reverse shell on port 1447 (2024).", + "source": "https://www.exploit-db.com/exploits/52267", + "date_added": "2024-06-10" + }, + { + "exploit_id": "CTF-2024-ABC", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-ABC-2024", + "date_added": "2024-09-05" + }, + { + "exploit_id": "EDB-52478", + "cve": "CVE-2024-38063", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows IPv6 driver use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52478", + "date_added": "2024-07-12" + }, + { + "exploit_id": "GH-2024-ANDROID12", + "cve": "CVE-2024-43093", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-08-20" + }, + { + "exploit_id": "EDB-52636", + "cve": "CVE-2025-10308", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 48 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1448 (2025).", + "source": "https://www.exploit-db.com/exploits/52636", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52637", + "cve": "CVE-2025-10309", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52637", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT33", + "cve": "CVE-2025-10310", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-BCD", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 49 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1449, from CTF challenge (2025).", + "source": "CTF-BCD-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52638", + "cve": "CVE-2025-10311", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52638", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS12", + "cve": "CVE-2025-10312", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52639", + "cve": "CVE-2025-10313", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52639", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52640", + "cve": "CVE-2025-10314", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1450 (2025).", + "source": "https://www.exploit-db.com/exploits/52640", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX30", + "cve": "CVE-2025-10315", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52641", + "cve": "CVE-2025-10316", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52641", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52642", + "cve": "CVE-2025-10317", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52642", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN31", + "cve": "CVE-2025-10318", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1451, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52643", + "cve": "CVE-2025-10319", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 52 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1452 (2025).", + "source": "https://www.exploit-db.com/exploits/52643", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52644", + "cve": "CVE-2025-10320", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52644", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT34", + "cve": "CVE-2025-10321", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52645", + "cve": "CVE-2025-10322", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 53 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1453 (2025).", + "source": "https://www.exploit-db.com/exploits/52645", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52646", + "cve": "CVE-2025-10323", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52646", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN32", + "cve": "CVE-2025-10324", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52647", + "cve": "CVE-2025-10325", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52647", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1454, from CTF challenge (2025).", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52648", + "cve": "CVE-2025-10326", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52648", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX31", + "cve": "CVE-2025-10327", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52649", + "cve": "CVE-2025-10328", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52649", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1455, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52650", + "cve": "CVE-2025-10329", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 56 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52650", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT35", + "cve": "CVE-2025-10330", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52651", + "cve": "CVE-2025-10331", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52651", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52652", + "cve": "CVE-2025-10332", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1456, from CTF challenge (2025).", + "source": "https://www.exploit-db.com/exploits/52652", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN33", + "cve": "CVE-2025-10333", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52653", + "cve": "CVE-2025-10334", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 57 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1457 (2025).", + "source": "https://www.exploit-db.com/exploits/52653", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1458, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52654", + "cve": "CVE-2025-10335", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52654", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX32", + "cve": "CVE-2025-10336", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52655", + "cve": "CVE-2025-10337", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52655", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1459, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-48890", + "cve": "CVE-2021-3493", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux OverlayFS privilege escalation for local root access (2021).", + "source": "https://www.exploit-db.com/exploits/48890", + "date_added": "2021-04-15" + }, + { + "exploit_id": "EDB-49134", + "cve": "CVE-2021-42278", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows Active Directory RCE for reverse shell on port 1460 (2021).", + "source": "https://www.exploit-db.com/exploits/49134", + "date_added": "2021-11-10" + }, + { + "exploit_id": "GH-2021-WIN7", + "cve": "CVE-2021-34486", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel privilege escalation via driver vulnerability (2021).", + "source": "https://github.com/exploits/windows-2021", + "date_added": "2021-08-12" + }, + { + "exploit_id": "EDB-50012", + "cve": "CVE-2022-26809", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows RPC RCE for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/50012", + "date_added": "2022-04-12" + }, + { + "exploit_id": "CTF-2022-GHI", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell exploit, connects to attacker on port 1461, from CTF challenge (2022).", + "source": "CTF-GHI-2022", + "date_added": "2022-11-25" + }, + { + "exploit_id": "EDB-50456", + "cve": "CVE-2022-34718", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows IPv6 RCE for reverse shell on port 1462 (2022).", + "source": "https://www.exploit-db.com/exploits/50456", + "date_added": "2022-08-15" + }, + { + "exploit_id": "GH-2022-IOT14", + "cve": "CVE-2022-37061", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.0, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for RCE, spawning a shell (2022).", + "source": "https://github.com/exploits/iot-2022", + "date_added": "2022-09-05" + }, + { + "exploit_id": "EDB-50789", + "cve": "CVE-2022-41082", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft Exchange Server RCE (ProxyNotShell) for remote code execution (2022).", + "source": "https://www.exploit-db.com/exploits/50789", + "date_added": "2022-11-10" + }, + { + "exploit_id": "CTF-2022-JKL", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit to leak memory, from CTF challenge (2022).", + "source": "CTF-JKL-2022", + "date_added": "2022-12-10" + }, + { + "exploit_id": "EDB-51123", + "cve": "CVE-2023-28252", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows CLFS driver privilege escalation (2023).", + "source": "https://www.exploit-db.com/exploits/51123", + "date_added": "2023-04-05" + }, + { + "exploit_id": "GH-2023-ANDROID13", + "cve": "CVE-2023-21036", + "vulnerability_type": "Privilege Escalation", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM privilege escalation exploit for root access (2023).", + "source": "https://github.com/exploits/android-2023", + "date_added": "2023-05-20" + }, + { + "exploit_id": "EDB-51590", + "cve": "CVE-2023-36884", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows Office document RCE for reverse shell on port 1463 (2023).", + "source": "https://www.exploit-db.com/exploits/51590", + "date_added": "2023-07-15" + }, + { + "exploit_id": "EDB-51701", + "cve": "CVE-2023-38831", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 64 83 15 00 01 ...", + "description": "WinRAR RCE for remote code execution (2023).", + "source": "https://www.exploit-db.com/exploits/51701", + "date_added": "2023-08-25" + }, + { + "exploit_id": "CTF-2023-BCD", + "cve": "N/A", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 65 83 15 00 01 ...", + "description": "Linux x64 reverse shell exploit, connects to attacker on port 1465, from CTF challenge (2023).", + "source": "CTF-BCD-2023", + "date_added": "2023-12-20" + }, + { + "exploit_id": "EDB-52012", + "cve": "CVE-2024-21413", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Microsoft Outlook RCE for remote code execution (2024).", + "source": "https://www.exploit-db.com/exploits/52012", + "date_added": "2024-02-15" + }, + { + "exploit_id": "GH-2024-IOT15", + "cve": "CVE-2024-27600", + "vulnerability_type": "Remote Code Execution", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT RCE exploit for spawning a shell (2024).", + "source": "https://github.com/exploits/iot-2024", + "date_added": "2024-05-25" + }, + { + "exploit_id": "EDB-52378", + "cve": "CVE-2024-29973", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux kernel privilege escalation via driver vulnerability (2024).", + "source": "https://www.exploit-db.com/exploits/52378", + "date_added": "2024-06-15" + }, + { + "exploit_id": "CTF-2024-DEF", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory, from CTF challenge (2024).", + "source": "CTF-DEF-2024", + "date_added": "2024-09-10" + }, + { + "exploit_id": "EDB-52589", + "cve": "CVE-2024-38106", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows kernel use-after-free for privilege escalation (2024).", + "source": "https://www.exploit-db.com/exploits/52589", + "date_added": "2024-07-10" + }, + { + "exploit_id": "GH-2024-ANDROID14", + "cve": "CVE-2024-36971", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2024).", + "source": "https://github.com/exploits/android-2024", + "date_added": "2024-07-20" + }, + { + "exploit_id": "EDB-52656", + "cve": "CVE-2025-10338", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.4, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 66 83 15 00 01 ...", + "description": "Linux x64 buffer overflow for RCE, spawning a bind shell on port 1466 (2025).", + "source": "https://www.exploit-db.com/exploits/52656", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52657", + "cve": "CVE-2025-10339", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.7, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).", + "source": "https://www.exploit-db.com/exploits/52657", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT36", + "cve": "CVE-2025-10340", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-EFG", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 67 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1467, from CTF challenge (2025).", + "source": "CTF-EFG-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52658", + "cve": "CVE-2025-10341", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.6, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52658", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-MIPS13", + "cve": "CVE-2025-10342", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Persistence", + "cvss_score": 7.4, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for persistent backdoor (2025).", + "source": "https://github.com/exploits/mips-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52659", + "cve": "CVE-2025-10343", + "vulnerability_type": "Privilege Escalation", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52659", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-HIJ", + "cve": "N/A", + "vulnerability_type": "Integer Overflow", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Memory Leak", + "cvss_score": 6.6, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-HIJ-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52660", + "cve": "CVE-2025-10344", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.1, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1468 (2025).", + "source": "https://www.exploit-db.com/exploits/52660", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX33", + "cve": "CVE-2025-10345", + "vulnerability_type": "Race Condition", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Lateral Movement", + "cvss_score": 7.8, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 race condition exploit for lateral movement in a network (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52661", + "cve": "CVE-2025-10346", + "vulnerability_type": "Buffer Overflow", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM buffer overflow for data exfiltration via HTTPS (2025).", + "source": "https://www.exploit-db.com/exploits/52661", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52662", + "cve": "CVE-2025-10347", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52662", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN34", + "cve": "CVE-2025-10348", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Privilege Escalation", + "cvss_score": 8.0, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 use-after-free exploit for privilege escalation (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-JKL", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1469, from CTF challenge (2025).", + "source": "CTF-JKL-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52663", + "cve": "CVE-2025-10349", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 70 83 15 00 01 ...", + "description": "Linux x64 heap overflow for reverse shell on port 1470 (2025).", + "source": "https://www.exploit-db.com/exploits/52663", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52664", + "cve": "CVE-2025-10350", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.3, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 buffer overflow for RCE, executing a command shell (2025).", + "source": "https://www.exploit-db.com/exploits/52664", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT37", + "cve": "CVE-2025-10351", + "vulnerability_type": "Use-After-Free", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...", + "description": "ARM-based IoT use-after-free exploit for persistent backdoor (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52665", + "cve": "CVE-2025-10352", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 71 83 15 00 01 ...", + "description": "Linux x64 reverse shell connecting to attacker on port 1471 (2025).", + "source": "https://www.exploit-db.com/exploits/52665", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-MNO", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-MNO-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52666", + "cve": "CVE-2025-10353", + "vulnerability_type": "Privilege Escalation", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.3, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "Linux x64 exploit for root access via kernel vulnerability (2025).", + "source": "https://www.exploit-db.com/exploits/52666", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN35", + "cve": "CVE-2025-10354", + "vulnerability_type": "Heap Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.7, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 heap overflow for RCE, executing a command shell (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52667", + "cve": "CVE-2025-10355", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Router)", + "architecture": "MIPS", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.6, + "shellcode": "3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...", + "description": "MIPS-based router buffer overflow for data exfiltration via HTTP (2025).", + "source": "https://www.exploit-db.com/exploits/52667", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-PQR", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Linux", + "architecture": "x86", + "payload_goal": "Reverse Shell", + "cvss_score": 8.9, + "shellcode": "31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...", + "description": "Linux x86 reverse shell connecting to attacker on port 1472, from CTF challenge (2025).", + "source": "CTF-PQR-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52668", + "cve": "CVE-2025-10356", + "vulnerability_type": "Use-After-Free", + "platform": "Windows", + "architecture": "x86", + "payload_goal": "Privilege Escalation", + "cvss_score": 7.8, + "shellcode": "fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...", + "description": "Windows x86 use-after-free exploit for privilege escalation (2025).", + "source": "https://www.exploit-db.com/exploits/52668", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX34", + "cve": "CVE-2025-10357", + "vulnerability_type": "Buffer Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 buffer overflow for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52669", + "cve": "CVE-2025-10358", + "vulnerability_type": "Format String", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...", + "description": "macOS x64 format string exploit to leak memory addresses (2025).", + "source": "https://www.exploit-db.com/exploits/52669", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-STU", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Windows x64 reverse shell connecting to attacker on port 1473, from CTF challenge (2025).", + "source": "CTF-STU-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52670", + "cve": "CVE-2025-10359", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 74 83 15 00 01 ...", + "description": "Linux x64 heap overflow for data exfiltration via UDP (2025).", + "source": "https://www.exploit-db.com/exploits/52670", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-IOT38", + "cve": "CVE-2025-10360", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for RCE, spawning a shell (2025).", + "source": "https://github.com/exploits/iot-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52671", + "cve": "CVE-2025-10361", + "vulnerability_type": "Privilege Escalation", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Root Access", + "cvss_score": 8.5, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 exploit for privilege escalation via kernel exploit (2025).", + "source": "https://www.exploit-db.com/exploits/52671", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-VWX", + "cve": "N/A", + "vulnerability_type": "Format String", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Memory Leak", + "cvss_score": 6.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 format string exploit to leak memory, from CTF challenge (2025).", + "source": "CTF-VWX-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52672", + "cve": "CVE-2025-10362", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1474 (2025).", + "source": "https://www.exploit-db.com/exploits/52672", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-WIN36", + "cve": "CVE-2025-10363", + "vulnerability_type": "Buffer Overflow", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Data Exfiltration", + "cvss_score": 8.1, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 buffer overflow for data exfiltration via FTP (2025).", + "source": "https://github.com/exploits/windows-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52673", + "cve": "CVE-2025-10364", + "vulnerability_type": "Heap Overflow", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 9.2, + "shellcode": "6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 75 83 15 00 01 ...", + "description": "Linux x64 heap overflow for RCE, spawning a bind shell on port 1475 (2025).", + "source": "https://www.exploit-db.com/exploits/52673", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-YZA", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "macOS", + "architecture": "x64", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "macOS x64 reverse shell connecting to attacker on port 1476, from CTF challenge (2025).", + "source": "CTF-YZA-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52674", + "cve": "CVE-2025-10365", + "vulnerability_type": "Buffer Overflow", + "platform": "IoT (Embedded Linux)", + "architecture": "ARM", + "payload_goal": "Data Exfiltration", + "cvss_score": 7.9, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).", + "source": "https://www.exploit-db.com/exploits/52674", + "date_added": "2025-07-15" + }, + { + "exploit_id": "GH-2025-LINUX35", + "cve": "CVE-2025-10366", + "vulnerability_type": "Use-After-Free", + "platform": "Linux", + "architecture": "x64", + "payload_goal": "Persistence", + "cvss_score": 7.5, + "shellcode": "48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...", + "description": "Linux x64 use-after-free exploit for persistent backdoor installation (2025).", + "source": "https://github.com/exploits/linux-2025", + "date_added": "2025-07-15" + }, + { + "exploit_id": "EDB-52675", + "cve": "CVE-2025-10367", + "vulnerability_type": "Format String", + "platform": "Windows", + "architecture": "x64", + "payload_goal": "Remote Code Execution", + "cvss_score": 8.8, + "shellcode": "48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...", + "description": "Windows x64 format string exploit for RCE, spawning a shell (2025).", + "source": "https://www.exploit-db.com/exploits/52675", + "date_added": "2025-07-15" + }, + { + "exploit_id": "CTF-2025-ABC", + "cve": "N/A", + "vulnerability_type": "Remote Code Execution", + "platform": "Android", + "architecture": "ARM", + "payload_goal": "Reverse Shell", + "cvss_score": 9.0, + "shellcode": "e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...", + "description": "Android ARM reverse shell connecting to attacker on port 1477, from CTF challenge (2025).", + "source": "CTF-ABC-2025", + "date_added": "2025-07-15" + } +] \ No newline at end of file