Skip to content

Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.

Notifications You must be signed in to change notification settings

liquidworm/advisory

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

2,215 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Zero Science Lab Security Advisory Repository

Welcome to the Zero Science Lab Security Advisory Repository! This repository contains a collection of security advisories, vulnerabilities, proof-of-concepts (PoCs), exploit code, and related resources, organized by year and assigned unique ZSL-YEAR-XXXX identifiers. This repository is intended for security researchers, developers, and IT professionals to study, analyze, and improve security practices.

Table of Contents

  1. Introduction
  2. Repository Structure
  3. Advisory Format
  4. Usage Guidelines
  5. Disclaimer
  6. Contributing
  7. License

Introduction

This repository serves as a centralized resource for security advisories, vulnerabilities, exploit code, and proof-of-concepts (PoCs). Each entry is assigned a unique identifier in the format ZSL-YEAR-XXXX (e.g., ZSL-2008-4891) and organized by year for easy navigation.

Note: This repository is for educational and research purposes only. Use the information responsibly and ethically.


Repository Structure

The repository is organized by year, with each year containing entries in the ZSL-YEAR-XXXX format. Each entry can be an advisory, exploit code, or PoC code. For example:

advisory/
├── 2008/
│ ├── ZSL-2008-4891/
│ ├── ZSL-2008-4892/
│ └── ...
├── 2009/
│ ├── ZSL-2009-4893/
│ ├── ZSL-2009-4894/
│ └── ...
├── 2010/
│ ├── ZSL-2010-4895/
│ ├── ZSL-2010-4896/
│ └── ...
└── ...

Each ZSL-YEAR-XXXX directory may contain:

  • Advisory Details: A description of the vulnerability, including affected systems, CVSS scores, and mitigation strategies.
  • Exploit Code: Functional code that exploits the vulnerability (if available).
  • PoC Code: Proof-of-Concept code demonstrating the vulnerability.
  • References: Links to external resources, such as CVE details, vendor advisories, or research papers.

Advisory Format

Each entry is assigned a unique identifier in the format ZSL-YEAR-XXXX, where:

  • ZSL: Stands for Zero Science Lab.
  • YEAR: The year the entry was published.
  • XXXX: A unique sequential number for the entry within that year, starting from 4891 and going up to 9999.

Example: ZSL-2008-4891 refers to the first entry published in 2008.


Usage Guidelines

  • Authorized Use Only: Ensure you have proper authorization before testing or using any exploits or PoCs in real-world systems.
  • Educational Purpose: This repository is intended for learning and research. Do not use the content for malicious purposes.
  • Compliance: Adhere to all applicable laws and regulations when using the materials in this repository.
  • Reporting Issues: If you find any issues or inaccuracies in the advisories, exploits, or PoCs, please open an issue or submit a pull request.

Disclaimer

This repository and its contents are provided "as-is" without any warranties. The maintainers and contributors are not responsible for any misuse, damage, or legal consequences resulting from the use of this material. Use at your own risk.


Contributing

We welcome contributions to this repository! If you have a security advisory, exploit code, or PoC that you'd like to share, please follow these steps:

  1. Fork the repository.
  2. Create a new branch for your contribution.
  3. Add your content in the appropriate year directory, following the ZSL-YEAR-XXXX format and the unique ID range.
  4. Submit a pull request with a detailed description of your contribution.

Please ensure that your contributions adhere to ethical guidelines and are properly documented.


License

This repository is licensed under GNU GPLv3. By contributing to this repository, you agree to license your work under the same terms.

About

Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • Python 67.4%
  • Perl 26.7%
  • Shell 4.5%
  • Other 1.4%