CVE Proofs of Concept
This page lists proof-of-concept (PoC) exploits for CVEs, providing references for security researchers and pentesters. Each PoC includes a link, a brief description of its usage, and a screenshot of the repository or tool. Links are color-coded in cyan to indicate CVE PoCs. Use these responsibly and only in authorized environments.
CVE-2025-24071 PoC - NTLMv2 Hash Auth Forcing
Provided a proof-of-concept exploit to capture NTLMv2 hashes via user file interaction, targeting Windows File Explorer vulnerabilities (CVE-2025-24054/24071).[](https://github.com/helidem/CVE-2025-24054_CVE-2025-24071-PoC)

CVE-2023-0386 PoC - Ubuntu Priv Escalation "OverlayFS"
Provided a proof-of-concept exploit to escalate to root on a vulnerable linux box via OverlayFS. To exploit this, an attacker first creates a FUSE (File System in User Space) file system, and adds a binary that is owned by userid 0 in that file system and has the SetUID bit set. The error in OverlayFS allows for that file to be copied out of the FUSE FS into the main on maintaining it’s owner and SetUID.

Want to Add More?
This is the start of my CVE PoC collection. If you have recommendations for other PoC exploits or want me to add more to this list, let me know! I’ll keep this page updated as I discover new references.