This repository contains curated proof-of-concept exploits
and exploitation artifacts derived from real-world vulnerabilities.
All materials are published strictly for security research,
technical analysis, and reproducibility purposes.
The focus is on memory corruption, kernel exploitation,
and system-level vulnerability research.
| CVE | Description | Type | Vulnerability release date | Author |
|---|---|---|---|---|
| CVE-2025-39913 | UAF in kernel ≤ 6.12.38 linux (psock-cork) | OS | 2025-10-01 | Byte Reaper |
| CVE-2025-39866 | use-after-free and race condition in linux kernel 6.12.16 | OS | 2025-09-26 | Byte Reaper |
| CVE-2025-7795 | Buffer overflow vulnerability in Tenda routers | Network | 2025-07-18 | Byte Reaper |
| CVE-2025-47917 | Use-After-Free in mbedTLS leading to remote code execution (RCE) | Network | 2025-07-20 | Byte Reaper |
| CVE-2022-0847 | Dirty Pipe in Linux kernel ≤5.16.11 (privilege escalation.) | OS | 2022-03-29 | Byte Reaper |
Bytrep selectively reviews external research artifacts
that align with the scope and technical depth of our work.
Submissions may include proof-of-concept exploits,
technical analyses, or vulnerability research derived
from real-world security issues.
All submissions are evaluated by our internal research team.
Publication is at the sole discretion of Bytrep.