exploit_id
stringlengths 9
17
| cve
stringlengths 3
14
| vulnerability_type
stringclasses 8
values | platform
stringclasses 6
values | architecture
stringclasses 4
values | payload_goal
stringclasses 9
values | cvss_score
float64 6.4
9.8
| shellcode
stringclasses 140
values | description
stringlengths 44
129
| source
stringlengths 12
41
| date_added
stringdate 2021-01-25 00:00:00
2025-07-15 00:00:00
|
---|---|---|---|---|---|---|---|---|---|---|
EDB-52245
|
CVE-2024-38106
|
Use-After-Free
|
Windows
|
x64
|
Privilege Escalation
| 8.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows kernel use-after-free for privilege escalation (2024).
|
https://www.exploit-db.com/exploits/52245
|
2024-07-15
|
GH-2024-ANDROID8
|
CVE-2024-43047
|
Privilege Escalation
|
Android
|
ARM
|
Root Access
| 7.8 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM privilege escalation exploit for root access (2024).
|
https://github.com/exploits/android-2024
|
2024-06-05
|
EDB-52596
|
CVE-2025-10248
|
Buffer Overflow
|
Linux
|
x64
|
Remote Code Execution
| 9.4 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 12 83 15 00 01 ...
|
Linux x64 buffer overflow for RCE, spawning a bind shell on port 1412 (2025).
|
https://www.exploit-db.com/exploits/52596
|
2025-07-15
|
EDB-52597
|
CVE-2025-10249
|
Format String
|
Windows
|
x86
|
Privilege Escalation
| 7.7 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).
|
https://www.exploit-db.com/exploits/52597
|
2025-07-15
|
GH-2025-IOT27
|
CVE-2025-10250
|
Use-After-Free
|
IoT (Embedded Linux)
|
ARM
|
Data Exfiltration
| 8.1 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
CTF-2025-BCD
|
N/A
|
Remote Code Execution
|
Linux
|
x64
|
Reverse Shell
| 9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 13 83 15 00 01 ...
|
Linux x64 reverse shell connecting to attacker on port 1413, from CTF challenge (2025).
|
CTF-BCD-2025
|
2025-07-15
|
EDB-52598
|
CVE-2025-10251
|
Heap Overflow
|
Windows
|
x64
|
Remote Code Execution
| 8.6 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 heap overflow for RCE, executing a command shell (2025).
|
https://www.exploit-db.com/exploits/52598
|
2025-07-15
|
GH-2025-MIPS10
|
CVE-2025-10252
|
Buffer Overflow
|
IoT (Router)
|
MIPS
|
Persistence
| 7.4 |
3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...
|
MIPS-based router buffer overflow for persistent backdoor (2025).
|
https://github.com/exploits/mips-2025
|
2025-07-15
|
EDB-52599
|
CVE-2025-10253
|
Privilege Escalation
|
macOS
|
x64
|
Root Access
| 8.3 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
macOS x64 exploit for root access via kernel vulnerability (2025).
|
https://www.exploit-db.com/exploits/52599
|
2025-07-15
|
CTF-2025-EFG
|
N/A
|
Integer Overflow
|
Linux
|
x86
|
Memory Leak
| 6.6 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).
|
CTF-EFG-2025
|
2025-07-15
|
EDB-52600
|
CVE-2025-10254
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9.1 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Windows x64 reverse shell connecting to attacker on port 1414 (2025).
|
https://www.exploit-db.com/exploits/52600
|
2025-07-15
|
GH-2025-LINUX24
|
CVE-2025-10255
|
Race Condition
|
Linux
|
x64
|
Lateral Movement
| 7.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 race condition exploit for lateral movement in a network (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52601
|
CVE-2025-10256
|
Buffer Overflow
|
Android
|
ARM
|
Data Exfiltration
| 7.9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM buffer overflow for data exfiltration via HTTPS (2025).
|
https://www.exploit-db.com/exploits/52601
|
2025-07-15
|
EDB-52602
|
CVE-2025-10257
|
Format String
|
Linux
|
x86
|
Remote Code Execution
| 8.8 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 format string exploit for RCE, spawning a shell (2025).
|
https://www.exploit-db.com/exploits/52602
|
2025-07-15
|
GH-2025-WIN25
|
CVE-2025-10258
|
Use-After-Free
|
Windows
|
x64
|
Privilege Escalation
| 8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 use-after-free exploit for privilege escalation (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
CTF-2025-HIJ
|
N/A
|
Remote Code Execution
|
macOS
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
macOS x64 reverse shell connecting to attacker on port 1415, from CTF challenge (2025).
|
CTF-HIJ-2025
|
2025-07-15
|
EDB-52603
|
CVE-2025-10259
|
Heap Overflow
|
Linux
|
x64
|
Reverse Shell
| 8.9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 16 83 15 00 01 ...
|
Linux x64 heap overflow for reverse shell on port 1416 (2025).
|
https://www.exploit-db.com/exploits/52603
|
2025-07-15
|
EDB-52604
|
CVE-2025-10260
|
Buffer Overflow
|
Windows
|
x86
|
Remote Code Execution
| 9.3 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 buffer overflow for RCE, executing a command shell (2025).
|
https://www.exploit-db.com/exploits/52604
|
2025-07-15
|
GH-2025-IOT28
|
CVE-2025-10261
|
Use-After-Free
|
IoT (Embedded Linux)
|
ARM
|
Persistence
| 7.5 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...
|
ARM-based IoT use-after-free exploit for persistent backdoor (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
EDB-52605
|
CVE-2025-10262
|
Remote Code Execution
|
Linux
|
x64
|
Reverse Shell
| 9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 17 83 15 00 01 ...
|
Linux x64 reverse shell connecting to attacker on port 1417 (2025).
|
https://www.exploit-db.com/exploits/52605
|
2025-07-15
|
CTF-2025-KLM
|
N/A
|
Format String
|
Windows
|
x64
|
Memory Leak
| 6.5 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 format string exploit to leak memory, from CTF challenge (2025).
|
CTF-KLM-2025
|
2025-07-15
|
EDB-52606
|
CVE-2025-10263
|
Privilege Escalation
|
Linux
|
x64
|
Root Access
| 8.3 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
Linux x64 exploit for root access via kernel vulnerability (2025).
|
https://www.exploit-db.com/exploits/52606
|
2025-07-15
|
GH-2025-WIN26
|
CVE-2025-10264
|
Heap Overflow
|
Windows
|
x64
|
Remote Code Execution
| 8.7 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 heap overflow for RCE, executing a command shell (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
EDB-52607
|
CVE-2025-10265
|
Buffer Overflow
|
IoT (Router)
|
MIPS
|
Data Exfiltration
| 7.6 |
3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...
|
MIPS-based router buffer overflow for data exfiltration via HTTP (2025).
|
https://www.exploit-db.com/exploits/52607
|
2025-07-15
|
CTF-2025-NOP
|
N/A
|
Remote Code Execution
|
Linux
|
x86
|
Reverse Shell
| 8.9 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 reverse shell connecting to attacker on port 1418, from CTF challenge (2025).
|
CTF-NOP-2025
|
2025-07-15
|
EDB-52608
|
CVE-2025-10266
|
Use-After-Free
|
Windows
|
x86
|
Privilege Escalation
| 7.8 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 use-after-free exploit for privilege escalation (2025).
|
https://www.exploit-db.com/exploits/52608
|
2025-07-15
|
GH-2025-LINUX25
|
CVE-2025-10267
|
Buffer Overflow
|
Linux
|
x64
|
Persistence
| 7.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 buffer overflow for persistent backdoor installation (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52609
|
CVE-2025-10268
|
Format String
|
macOS
|
x64
|
Memory Leak
| 6.5 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
macOS x64 format string exploit to leak memory addresses (2025).
|
https://www.exploit-db.com/exploits/52609
|
2025-07-15
|
CTF-2025-QRS
|
N/A
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Windows x64 reverse shell connecting to attacker on port 1419, from CTF challenge (2025).
|
CTF-QRS-2025
|
2025-07-15
|
EDB-52610
|
CVE-2025-10269
|
Heap Overflow
|
Linux
|
x64
|
Data Exfiltration
| 8.1 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 20 83 15 00 01 ...
|
Linux x64 heap overflow for data exfiltration via UDP (2025).
|
https://www.exploit-db.com/exploits/52610
|
2025-07-15
|
GH-2025-IOT29
|
CVE-2025-10270
|
Buffer Overflow
|
IoT (Embedded Linux)
|
ARM
|
Remote Code Execution
| 9.2 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT buffer overflow for RCE, spawning a shell (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
EDB-52611
|
CVE-2025-10271
|
Privilege Escalation
|
Windows
|
x64
|
Root Access
| 8.5 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 exploit for privilege escalation via kernel exploit (2025).
|
https://www.exploit-db.com/exploits/52611
|
2025-07-15
|
CTF-2025-RST
|
N/A
|
Format String
|
Linux
|
x64
|
Memory Leak
| 6.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 format string exploit to leak memory, from CTF challenge (2025).
|
CTF-RST-2025
|
2025-07-15
|
EDB-52612
|
CVE-2025-10272
|
Remote Code Execution
|
Android
|
ARM
|
Reverse Shell
| 9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM reverse shell connecting to attacker on port 1420, from CTF challenge (2025).
|
https://www.exploit-db.com/exploits/52612
|
2025-07-15
|
GH-2025-WIN27
|
CVE-2025-10273
|
Buffer Overflow
|
Windows
|
x64
|
Data Exfiltration
| 8.1 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 buffer overflow for data exfiltration via FTP (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
EDB-52613
|
CVE-2025-10274
|
Heap Overflow
|
Linux
|
x64
|
Remote Code Execution
| 9.2 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 21 83 15 00 01 ...
|
Linux x64 heap overflow for RCE, spawning a bind shell on port 1421 (2025).
|
https://www.exploit-db.com/exploits/52613
|
2025-07-15
|
CTF-2025-UVW
|
N/A
|
Remote Code Execution
|
macOS
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
macOS x64 reverse shell connecting to attacker on port 1422, from CTF challenge (2025).
|
CTF-UVW-2025
|
2025-07-15
|
EDB-52614
|
CVE-2025-10275
|
Buffer Overflow
|
IoT (Embedded Linux)
|
ARM
|
Data Exfiltration
| 7.9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).
|
https://www.exploit-db.com/exploits/52614
|
2025-07-15
|
GH-2025-LINUX26
|
CVE-2025-10276
|
Use-After-Free
|
Linux
|
x64
|
Persistence
| 7.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 use-after-free exploit for persistent backdoor installation (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52615
|
CVE-2025-10277
|
Format String
|
Windows
|
x64
|
Remote Code Execution
| 8.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 format string exploit for RCE, spawning a shell (2025).
|
https://www.exploit-db.com/exploits/52615
|
2025-07-15
|
CTF-2025-WXY
|
N/A
|
Remote Code Execution
|
Android
|
ARM
|
Reverse Shell
| 9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM reverse shell connecting to attacker on port 1423, from CTF challenge (2025).
|
CTF-WXY-2025
|
2025-07-15
|
EDB-48678
|
CVE-2021-3156
|
Privilege Escalation
|
Linux
|
x64
|
Root Access
| 7.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux sudo heap-based buffer overflow for privilege escalation (2021).
|
https://www.exploit-db.com/exploits/48678
|
2021-01-26
|
EDB-48912
|
CVE-2021-41773
|
Remote Code Execution
|
Linux
|
x64
|
Reverse Shell
| 9.8 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 24 83 15 00 01 ...
|
Apache HTTP Server path traversal RCE for reverse shell on port 1424 (2021).
|
https://www.exploit-db.com/exploits/48912
|
2021-09-29
|
GH-2021-WIN5
|
CVE-2021-34527
|
Privilege Escalation
|
Windows
|
x64
|
Root Access
| 8.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows PrintNightmare exploit for local privilege escalation (2021).
|
https://github.com/exploits/windows-2021
|
2021-06-30
|
EDB-49890
|
CVE-2022-26923
|
Privilege Escalation
|
Windows
|
x64
|
Root Access
| 7.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows AD certificate services privilege escalation (2022).
|
https://www.exploit-db.com/exploits/49890
|
2022-03-15
|
CTF-2021-PQR
|
N/A
|
Buffer Overflow
|
Linux
|
x86
|
Reverse Shell
| 8.9 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 reverse shell exploit, connects to attacker on port 1425, from CTF challenge (2021).
|
CTF-PQR-2021
|
2021-12-10
|
EDB-50234
|
CVE-2022-30190
|
Remote Code Execution
|
Windows
|
x64
|
Remote Code Execution
| 9.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows MSDT (Follina) RCE for remote code execution (2022).
|
https://www.exploit-db.com/exploits/50234
|
2022-05-30
|
GH-2022-IOT10
|
CVE-2022-32250
|
Buffer Overflow
|
IoT (Router)
|
MIPS
|
Remote Code Execution
| 9 |
3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...
|
MIPS-based router buffer overflow for RCE, spawning a shell (2022).
|
https://github.com/exploits/iot-2022
|
2022-06-05
|
EDB-50567
|
CVE-2022-34713
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Microsoft Defender SmartScreen RCE for reverse shell on port 1426 (2022).
|
https://www.exploit-db.com/exploits/50567
|
2022-08-10
|
CTF-2022-STU
|
N/A
|
Format String
|
Linux
|
x86
|
Memory Leak
| 6.5 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 format string exploit to leak memory, from CTF challenge (2022).
|
CTF-STU-2022
|
2022-10-15
|
EDB-50901
|
CVE-2023-23397
|
Remote Code Execution
|
Windows
|
x64
|
Remote Code Execution
| 9.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Microsoft Outlook RCE for remote code execution (2023).
|
https://www.exploit-db.com/exploits/50901
|
2023-03-15
|
GH-2023-ANDROID9
|
CVE-2023-21326
|
Privilege Escalation
|
Android
|
ARM
|
Root Access
| 7.8 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM privilege escalation exploit for root access (2023).
|
https://github.com/exploits/android-2023
|
2023-04-20
|
EDB-51356
|
CVE-2023-35078
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Ivanti Endpoint Manager Mobile RCE for reverse shell on port 1427 (2023).
|
https://www.exploit-db.com/exploits/51356
|
2023-07-25
|
EDB-51567
|
CVE-2023-40044
|
Remote Code Execution
|
Linux
|
x64
|
Remote Code Execution
| 9.8 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 28 83 15 00 01 ...
|
Progress WS_FTP Server RCE for remote code execution (2023).
|
https://www.exploit-db.com/exploits/51567
|
2023-09-27
|
CTF-2023-VWX
|
N/A
|
Buffer Overflow
|
Linux
|
x64
|
Reverse Shell
| 8.9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 29 83 15 00 01 ...
|
Linux x64 reverse shell exploit, connects to attacker on port 1429, from CTF challenge (2023).
|
CTF-VWX-2023
|
2023-11-10
|
EDB-51890
|
CVE-2024-24919
|
Remote Code Execution
|
Windows
|
x64
|
Remote Code Execution
| 9.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Check Point VPN information disclosure leading to RCE (2024).
|
https://www.exploit-db.com/exploits/51890
|
2024-02-10
|
GH-2024-IOT11
|
CVE-2024-27200
|
Remote Code Execution
|
IoT (Embedded Linux)
|
ARM
|
Remote Code Execution
| 9.2 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT RCE exploit for spawning a shell (2024).
|
https://github.com/exploits/iot-2024
|
2024-04-15
|
EDB-52145
|
CVE-2024-29972
|
Privilege Escalation
|
Linux
|
x64
|
Root Access
| 7.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux kernel privilege escalation via driver vulnerability (2024).
|
https://www.exploit-db.com/exploits/52145
|
2024-06-20
|
CTF-2024-YZA
|
N/A
|
Format String
|
macOS
|
x64
|
Memory Leak
| 6.5 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
macOS x64 format string exploit to leak memory, from CTF challenge (2024).
|
CTF-YZA-2024
|
2024-08-05
|
EDB-52356
|
CVE-2024-38112
|
Use-After-Free
|
Windows
|
x64
|
Privilege Escalation
| 8.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows spooler use-after-free for privilege escalation (2024).
|
https://www.exploit-db.com/exploits/52356
|
2024-07-10
|
GH-2024-ANDROID10
|
CVE-2024-36970
|
Buffer Overflow
|
Android
|
ARM
|
Data Exfiltration
| 7.9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM buffer overflow for data exfiltration via HTTPS (2024).
|
https://github.com/exploits/android-2024
|
2024-06-15
|
EDB-52616
|
CVE-2025-10278
|
Buffer Overflow
|
Linux
|
x64
|
Remote Code Execution
| 9.4 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 30 83 15 00 01 ...
|
Linux x64 buffer overflow for RCE, spawning a bind shell on port 1430 (2025).
|
https://www.exploit-db.com/exploits/52616
|
2025-07-15
|
EDB-52617
|
CVE-2025-10279
|
Format String
|
Windows
|
x86
|
Privilege Escalation
| 7.7 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 format string exploit for privilege escalation via kernel32.dll (2025).
|
https://www.exploit-db.com/exploits/52617
|
2025-07-15
|
GH-2025-IOT30
|
CVE-2025-10280
|
Use-After-Free
|
IoT (Embedded Linux)
|
ARM
|
Data Exfiltration
| 8.1 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT use-after-free exploit for data exfiltration via FTP (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
CTF-2025-ABC
|
N/A
|
Remote Code Execution
|
Linux
|
x64
|
Reverse Shell
| 9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 31 83 15 00 01 ...
|
Linux x64 reverse shell connecting to attacker on port 1431, from CTF challenge (2025).
|
CTF-ABC-2025
|
2025-07-15
|
EDB-52618
|
CVE-2025-10281
|
Heap Overflow
|
Windows
|
x64
|
Remote Code Execution
| 8.6 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 heap overflow for RCE, executing a command shell (2025).
|
https://www.exploit-db.com/exploits/52618
|
2025-07-15
|
GH-2025-MIPS11
|
CVE-2025-10282
|
Buffer Overflow
|
IoT (Router)
|
MIPS
|
Persistence
| 7.4 |
3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...
|
MIPS-based router buffer overflow for persistent backdoor (2025).
|
https://github.com/exploits/mips-2025
|
2025-07-15
|
EDB-52619
|
CVE-2025-10283
|
Privilege Escalation
|
macOS
|
x64
|
Root Access
| 8.3 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
macOS x64 exploit for root access via kernel vulnerability (2025).
|
https://www.exploit-db.com/exploits/52619
|
2025-07-15
|
CTF-2025-DEF
|
N/A
|
Integer Overflow
|
Linux
|
x86
|
Memory Leak
| 6.6 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 integer overflow exploit to leak memory, from CTF challenge (2025).
|
CTF-DEF-2025
|
2025-07-15
|
EDB-52620
|
CVE-2025-10284
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9.1 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Windows x64 reverse shell connecting to attacker on port 1432 (2025).
|
https://www.exploit-db.com/exploits/52620
|
2025-07-15
|
GH-2025-LINUX27
|
CVE-2025-10285
|
Race Condition
|
Linux
|
x64
|
Lateral Movement
| 7.8 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 race condition exploit for lateral movement in a network (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52621
|
CVE-2025-10286
|
Buffer Overflow
|
Android
|
ARM
|
Data Exfiltration
| 7.9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM buffer overflow for data exfiltration via HTTPS (2025).
|
https://www.exploit-db.com/exploits/52621
|
2025-07-15
|
EDB-52622
|
CVE-2025-10287
|
Format String
|
Linux
|
x86
|
Remote Code Execution
| 8.8 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 format string exploit for RCE, spawning a shell (2025).
|
https://www.exploit-db.com/exploits/52622
|
2025-07-15
|
GH-2025-WIN28
|
CVE-2025-10288
|
Use-After-Free
|
Windows
|
x64
|
Privilege Escalation
| 8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 use-after-free exploit for privilege escalation (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
CTF-2025-GHI
|
N/A
|
Remote Code Execution
|
macOS
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
macOS x64 reverse shell connecting to attacker on port 1433, from CTF challenge (2025).
|
CTF-GHI-2025
|
2025-07-15
|
EDB-52623
|
CVE-2025-10289
|
Heap Overflow
|
Linux
|
x64
|
Reverse Shell
| 8.9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 34 83 15 00 01 ...
|
Linux x64 heap overflow for reverse shell on port 1434 (2025).
|
https://www.exploit-db.com/exploits/52623
|
2025-07-15
|
EDB-52624
|
CVE-2025-10290
|
Buffer Overflow
|
Windows
|
x86
|
Remote Code Execution
| 9.3 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 buffer overflow for RCE, executing a command shell (2025).
|
https://www.exploit-db.com/exploits/52624
|
2025-07-15
|
GH-2025-IOT31
|
CVE-2025-10291
|
Use-After-Free
|
IoT (Embedded Linux)
|
ARM
|
Persistence
| 7.5 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ...
|
ARM-based IoT use-after-free exploit for persistent backdoor (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
EDB-52625
|
CVE-2025-10292
|
Remote Code Execution
|
Linux
|
x64
|
Reverse Shell
| 9 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 35 83 15 00 01 ...
|
Linux x64 reverse shell connecting to attacker on port 1435 (2025).
|
https://www.exploit-db.com/exploits/52625
|
2025-07-15
|
CTF-2025-JKL
|
N/A
|
Format String
|
Windows
|
x64
|
Memory Leak
| 6.5 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 format string exploit to leak memory, from CTF challenge (2025).
|
CTF-JKL-2025
|
2025-07-15
|
EDB-52626
|
CVE-2025-10293
|
Privilege Escalation
|
Linux
|
x64
|
Root Access
| 8.3 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
Linux x64 exploit for root access via kernel vulnerability (2025).
|
https://www.exploit-db.com/exploits/52626
|
2025-07-15
|
GH-2025-WIN29
|
CVE-2025-10294
|
Heap Overflow
|
Windows
|
x64
|
Remote Code Execution
| 8.7 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 heap overflow for RCE, executing a command shell (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
EDB-52627
|
CVE-2025-10295
|
Buffer Overflow
|
IoT (Router)
|
MIPS
|
Data Exfiltration
| 7.6 |
3c 08 00 00 35 08 00 00 3c 09 00 00 35 29 00 00 8f a4 00 00 ...
|
MIPS-based router buffer overflow for data exfiltration via HTTP (2025).
|
https://www.exploit-db.com/exploits/52627
|
2025-07-15
|
CTF-2025-MNO
|
N/A
|
Remote Code Execution
|
Linux
|
x86
|
Reverse Shell
| 8.9 |
31 c0 50 68 2f 2f 73 68 68 2f 62 69 6e 89 e3 50 53 89 e1 99 b0 0b cd 80 ...
|
Linux x86 reverse shell connecting to attacker on port 1436, from CTF challenge (2025).
|
CTF-MNO-2025
|
2025-07-15
|
EDB-52628
|
CVE-2025-10296
|
Use-After-Free
|
Windows
|
x86
|
Privilege Escalation
| 7.8 |
fc e8 89 00 00 00 60 89 e5 31 d2 64 8b 52 30 8b 52 0c 8b 52 14 ...
|
Windows x86 use-after-free exploit for privilege escalation (2025).
|
https://www.exploit-db.com/exploits/52628
|
2025-07-15
|
GH-2025-LINUX28
|
CVE-2025-10297
|
Buffer Overflow
|
Linux
|
x64
|
Persistence
| 7.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 buffer overflow for persistent backdoor installation (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52629
|
CVE-2025-10298
|
Format String
|
macOS
|
x64
|
Memory Leak
| 6.5 |
48 31 c0 48 83 c0 02 48 31 ff 48 83 c7 01 0f 05 48 89 c7 ...
|
macOS x64 format string exploit to leak memory addresses (2025).
|
https://www.exploit-db.com/exploits/52629
|
2025-07-15
|
CTF-2025-PQR
|
N/A
|
Remote Code Execution
|
Windows
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Windows x64 reverse shell connecting to attacker on port 1437, from CTF challenge (2025).
|
CTF-PQR-2025
|
2025-07-15
|
EDB-52630
|
CVE-2025-10299
|
Heap Overflow
|
Linux
|
x64
|
Data Exfiltration
| 8.1 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 38 83 15 00 01 ...
|
Linux x64 heap overflow for data exfiltration via UDP (2025).
|
https://www.exploit-db.com/exploits/52630
|
2025-07-15
|
GH-2025-IOT32
|
CVE-2025-10300
|
Buffer Overflow
|
IoT (Embedded Linux)
|
ARM
|
Remote Code Execution
| 9.2 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT buffer overflow for RCE, spawning a shell (2025).
|
https://github.com/exploits/iot-2025
|
2025-07-15
|
EDB-52631
|
CVE-2025-10301
|
Privilege Escalation
|
Windows
|
x64
|
Root Access
| 8.5 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 exploit for privilege escalation via kernel exploit (2025).
|
https://www.exploit-db.com/exploits/52631
|
2025-07-15
|
CTF-2025-STU
|
N/A
|
Format String
|
Linux
|
x64
|
Memory Leak
| 6.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 format string exploit to leak memory, from CTF challenge (2025).
|
CTF-STU-2025
|
2025-07-15
|
EDB-52632
|
CVE-2025-10302
|
Remote Code Execution
|
Android
|
ARM
|
Reverse Shell
| 9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM reverse shell connecting to attacker on port 1438 (2025).
|
https://www.exploit-db.com/exploits/52632
|
2025-07-15
|
GH-2025-WIN30
|
CVE-2025-10303
|
Buffer Overflow
|
Windows
|
x64
|
Data Exfiltration
| 8.1 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 buffer overflow for data exfiltration via FTP (2025).
|
https://github.com/exploits/windows-2025
|
2025-07-15
|
EDB-52633
|
CVE-2025-10304
|
Heap Overflow
|
Linux
|
x64
|
Remote Code Execution
| 9.2 |
6a 29 58 99 6a 02 5f 6a 01 5e 0f 05 48 97 48 b9 02 00 14 39 83 15 00 01 ...
|
Linux x64 heap overflow for RCE, spawning a bind shell on port 1439 (2025).
|
https://www.exploit-db.com/exploits/52633
|
2025-07-15
|
CTF-2025-VWX
|
N/A
|
Remote Code Execution
|
macOS
|
x64
|
Reverse Shell
| 9 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
macOS x64 reverse shell connecting to attacker on port 1440, from CTF challenge (2025).
|
CTF-VWX-2025
|
2025-07-15
|
EDB-52634
|
CVE-2025-10305
|
Buffer Overflow
|
IoT (Embedded Linux)
|
ARM
|
Data Exfiltration
| 7.9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
ARM-based IoT buffer overflow for data exfiltration via SMTP (2025).
|
https://www.exploit-db.com/exploits/52634
|
2025-07-15
|
GH-2025-LINUX29
|
CVE-2025-10306
|
Use-After-Free
|
Linux
|
x64
|
Persistence
| 7.5 |
48 31 c0 48 31 db 48 31 d2 48 83 ec 08 6a 00 6a 01 6a 02 48 89 e7 ...
|
Linux x64 use-after-free exploit for persistent backdoor installation (2025).
|
https://github.com/exploits/linux-2025
|
2025-07-15
|
EDB-52635
|
CVE-2025-10307
|
Format String
|
Windows
|
x64
|
Remote Code Execution
| 8.8 |
48 83 ec 28 65 48 8b 04 25 30 00 00 00 48 8b 40 60 48 8b 40 18 ...
|
Windows x64 format string exploit for RCE, spawning a shell (2025).
|
https://www.exploit-db.com/exploits/52635
|
2025-07-15
|
CTF-2025-YZA
|
N/A
|
Remote Code Execution
|
Android
|
ARM
|
Reverse Shell
| 9 |
e3a01000 e3a02001 e3a03002 e1a0c00d e92dd800 e3a07029 ef000000 ...
|
Android ARM reverse shell connecting to attacker on port 1441, from CTF challenge (2025).
|
CTF-YZA-2025
|
2025-07-15
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.