This repository contains curated proof-of-concept exploits and exploitation artifacts derived from real-world vulnerabilities.
All materials are published strictly for security research, technical analysis, and reproducibility purposes.
The focus is on memory corruption, kernel exploitation, and system-level vulnerability research.
| Component | CVE | Description | Version | Date | Author |
|---|---|---|---|---|---|
| libarchive | CVE-2025-5914 | Ownership confusion | 3.8.0 | 2026-01-11 | Byte Reaper |
| linux kernel (ebpf) | CVE-2025-39913 | UAF psock-cork | 6.12.38 | 2025-10-01 | Byte Reaper |
| linux kernel | CVE-2025-39866 | UAF + race | 6.12.16 | 2025-09-26 | Byte Reaper |
| Tenda | CVE-2025-7795 | Buffer overflow | FH451 | 2025-07-18 | Byte Reaper |
| mbedTLS | CVE-2025-47917 | UAF RCE | 3.6.4 | 2025-07-20 | Byte Reaper |
| Linux pipe | CVE-2022-0847 | Dirty Pipe | 5.16.11 | 2022-03-29 | Byte Reaper |