Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| - | n/a | n/a | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | Collected fixes for bash CVE-2014-6271 | https://github.com/dlitz/bash-cve-2014-6271-fixes | POC Details |
| 2 | Patch for CVE-2014-6271 | https://github.com/npm/ansible-bashpocalypse | POC Details |
| 3 | patched-bash-4.3 for CVE-2014-6271 | https://github.com/ryancnelson/patched-bash-4.3 | POC Details |
| 4 | Chef cookbook that will fail if bash vulnerability found per CVE-2014-6271 | https://github.com/jblaine/cookbook-bash-CVE-2014-6271 | POC Details |
| 5 | None | https://github.com/rrreeeyyy/cve-2014-6271-spec | POC Details |
| 6 | Python Scanner for "ShellShock" (CVE-2014-6271) | https://github.com/scottjpack/shellshock_scanner | POC Details |
| 7 | Written fro CVE-2014-6271 | https://github.com/Anklebiter87/Cgi-bin_bash_Reverse | POC Details |
| 8 | a auto script to fix CVE-2014-6271 bash vulnerability | https://github.com/justzx2011/bash-up | POC Details |
| 9 | None | https://github.com/mattclegg/CVE-2014-6271 | POC Details |
| 10 | Quick and dirty nessus .audit file to check is bash is vulnerable to CVE-2014-6271 | https://github.com/ilismal/Nessus_CVE-2014-6271_check | POC Details |
| 11 | CVE-2014-6271 RCE tool | https://github.com/RainMak3r/Rainstorm | POC Details |
| 12 | Simple script to check for CVE-2014-6271 | https://github.com/gabemarshall/shocknaww | POC Details |
| 13 | None | https://github.com/woltage/CVE-2014-6271 | POC Details |
| 14 | CVE-2014-6271の検証用Vagrantfileです | https://github.com/ariarijp/vagrant-shellshock | POC Details |
| 15 | scripts associate with bourne shell EVN function parsing vulnerability CVE-2014-6271 | https://github.com/themson/shellshock | POC Details |
| 16 | CVE-2014-6271 (ShellShock) RCE PoC tool | https://github.com/securusglobal/BadBash | POC Details |
| 17 | scaner for cve-2014-6271 | https://github.com/villadora/CVE-2014-6271 | POC Details |
| 18 | Salt recipe for shellshock (CVE-2014-6271) | https://github.com/APSL/salt-shellshock | POC Details |
| 19 | Ansible role to check the CVE-2014-6271 vulnerability | https://github.com/teedeedubya/bash-fix-exploit | POC Details |
| 20 | Debian Lenny Bash packages with cve-2014-6271 patches (i386 and amd64) | https://github.com/internero/debian-lenny-bash_3.2.52-cve-2014-6271 | POC Details |
| 21 | None | https://github.com/u20024804/bash-3.2-fixed-CVE-2014-6271 | POC Details |
| 22 | None | https://github.com/u20024804/bash-4.2-fixed-CVE-2014-6271 | POC Details |
| 23 | None | https://github.com/u20024804/bash-4.3-fixed-CVE-2014-6271 | POC Details |
| 24 | A python script to enumerate CGI scripts vulnerable to CVE-2014-6271 on one specific server | https://github.com/francisck/shellshock-cgi | POC Details |
| 25 | A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug) | https://github.com/proclnas/ShellShock-CGI-Scan | POC Details |
| 26 | CVE-2014-6271 Remote Interactive Shell - PoC Exploit | https://github.com/sch3m4/RIS | POC Details |
| 27 | None | https://github.com/ryeyao/CVE-2014-6271_Test | POC Details |
| 28 | shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGI | https://github.com/cj1324/CGIShell | POC Details |
| 29 | This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possible | https://github.com/renanvicente/puppet-shellshock | POC Details |
| 30 | Android app to scan for bash Vulnerability - CVE-2014-6271 also known as Shellshock | https://github.com/indiandragon/Shellshock-Vulnerability-Scan | POC Details |
| 31 | :scream: Python library and utility for CVE-2014-6271 (aka. "shellshock") | https://github.com/ramnes/pyshellshock | POC Details |
| 32 | This is a Python Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271 | https://github.com/akiraaisha/shellshocker-python | POC Details |
| 33 | Using google to scan sites for "ShellShock" (CVE-2014-6271) | https://github.com/352926/shellshock_crawler | POC Details |
| 34 | system reading course | https://github.com/kelleykong/cve-2014-6271-mengjia-kong | POC Details |
| 35 | reading course | https://github.com/huanlu/cve-2014-6271-huan-lu | POC Details |
| 36 | This is an Android Application that helps you detect if your machine that run bash is vulnerable by CVE-2014-6271 | https://github.com/sunnyjiang/shellshocker-android | POC Details |
| 37 | A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug). | https://github.com/P0cL4bs/ShellShock-CGI-Scan | POC Details |
| 38 | Vulnerability as a service: showcasing CVS-2014-6271, a.k.a. Shellshock | https://github.com/hmlio/vaas-cve-2014-6271 | POC Details |
| 39 | Shellshock exploit + vulnerable environment | https://github.com/opsxcq/exploit-CVE-2014-6271 | POC Details |
| 40 | None | https://github.com/Pilou-Pilou/docker_CVE-2014-6271. | POC Details |
| 41 | Shellshock POC | CVE-2014-6271 | cgi-bin reverse shell | https://github.com/zalalov/CVE-2014-6271 | POC Details |
| 42 | A simple python shell-like exploit for the Shellschok CVE-2014-6271 bug. | https://github.com/heikipikker/shellshock-shell | POC Details |
| 43 | Shellshock exploitation script that is able to upload and RCE using any vector due to its versatility. | https://github.com/0x00-0x00/CVE-2014-6271 | POC Details |
| 44 | CS4238 Computer Security Practices | https://github.com/kowshik-sundararajan/CVE-2014-6271 | POC Details |
| 45 | Shellshock vulnerability attacker | https://github.com/w4fz5uck5/ShockZaum-CVE-2014-6271 | POC Details |
| 46 | None | https://github.com/Aruthw/CVE-2014-6271 | POC Details |
| 47 | cve-2014-6271 | https://github.com/cved-sources/cve-2014-6271 | POC Details |
| 48 | None | https://github.com/shawntns/exploit-CVE-2014-6271 | POC Details |
| 49 | None | https://github.com/Sindadziy/cve-2014-6271 | POC Details |
| 50 | cve-2014-6271 | https://github.com/wenyu1999/bash-shellshock | POC Details |
| 51 | None | https://github.com/Sindayifu/CVE-2019-14287-CVE-2014-6271 | POC Details |
| 52 | None | https://github.com/Any3ite/CVE-2014-6271 | POC Details |
| 53 | *CVE-2014-6271* Unix Arbitrary Code Execution Exploit commonly know as Shell Shock. Examples, Docs, Incident Response and Vulnerability/Risk Assessment, and Additional Resources may be dumped here. Enjoy :) --- somhmxxghoul --- | https://github.com/somhm-solutions/Shell-Shock | POC Details |
| 54 | This is an individual assignment for secure network programming | https://github.com/rashmikadileeshara/CVE-2014-6271-Shellshock- | POC Details |
| 55 | None | https://github.com/Dilith006/CVE-2014-6271 | POC Details |
| 56 | None | https://github.com/cyberharsh/Shellbash-CVE-2014-6271 | POC Details |
| 57 | None | https://github.com/MuirlandOracle/CVE-2014-6271-IPFire | POC Details |
| 58 | This Repo is PoC environment of CVE-2014-6271(https://nvd.nist.gov/vuln/detail/cve-2014-6271). | https://github.com/mochizuki875/CVE-2014-6271-Apache-Debian | POC Details |
| 59 | Shellshock exploit aka CVE-2014-6271 | https://github.com/b4keSn4ke/CVE-2014-6271 | POC Details |
| 60 | CVE-2014-6271 Shellshock | https://github.com/hadrian3689/shellshock | POC Details |
| 61 | ShellShock interactive-shell exploit | https://github.com/akr3ch/CVE-2014-6271 | POC Details |
| 62 | None | https://github.com/0xConstant/CVE-2014-6271 | POC Details |
| 63 | [Python/Shell] - Tested in HackTheBox - Shocker (Easy) CVE-2014-6271 | https://github.com/Gurguii/cgi-bin-shellshock | POC Details |
| 64 | A docker container vulnerable to Shellshock - CVE-2014-6271 | https://github.com/anujbhan/shellshock-victim-host | POC Details |
| 65 | [CVE-2014-6271] Apache Shellshock Remote Command Injection tool for quick reverse shell and file browsing | https://github.com/FilipStudeny/-CVE-2014-6271-Shellshock-Remote-Command-Injection- | POC Details |
| 66 | None | https://github.com/mritunjay-k/CVE-2014-6271 | POC Details |
| 67 | None | https://github.com/Brandaoo/CVE-2014-6271 | POC Details |
| 68 | Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi | https://github.com/Jsmoreira02/CVE-2014-6271 | POC Details |
| 69 | None | https://github.com/hanmin0512/CVE-2014-6271_pwnable | POC Details |
| 70 | Shellshock vulnerability reverse shell | https://github.com/0xTabun/CVE-2014-6271 | POC Details |
| 71 | EXPLOIT FOR CVE-2014-6271 | https://github.com/0xN7y/CVE-2014-6271 | POC Details |
| 72 | The Shellshock Exploit is a tool designed to efficiently exploit the Shellshock vulnerability (CVE-2014-6271) in susceptible CGI servers, enabling a precise takeover of the target server. Shellshock is a critical security vulnerability that affects the Bash shell, allowing attackers to execute arbitrary commands on the targeted system | https://github.com/MY7H404/CVE-2014-6271-Shellshock | POC Details |
| 73 | Shellshock exploit (CVE-2014-6271) | https://github.com/AlissoftCodes/Shellshock | POC Details |
| 74 | Python3 Shellshock (CVE-2014-6271) Scanner | https://github.com/hackintoanetwork/shellshock | POC Details |
| 75 | Shellshock exploit (CVE-2014-6271) | https://github.com/AlissonFaoli/Shellshock | POC Details |
| 76 | Shelly is a lightweight and efficient vulnerability scanner designed to identify and mitigate Shellshock (CVE-2014-6271 & CVE-2014-7169) vulnerabilities in Bash environments. | https://github.com/ajansha/shellshock | POC Details |
| 77 | A PoC exploit for CVE-2014-6271 - Shellshock | https://github.com/K3ysTr0K3R/CVE-2014-6271-EXPLOIT | POC Details |
| 78 | Exploit para abusar de la vulnerabilidad Shellshock (CVE-2014-6271). | https://github.com/TheRealCiscoo/Shellshock-Exploit | POC Details |
| 79 | None | https://github.com/RadYio/CVE-2014-6271 | POC Details |
| 80 | None | https://github.com/banomaly/CVE-2014-6271 | POC Details |
| 81 | Vulnerability Exploitation | https://github.com/YunchoHang/CVE-2014-6271-SHELLSHOCK | POC Details |
| 82 | GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka ShellShock. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2014/CVE-2014-6271.yaml | POC Details |
| 83 | None | https://github.com/Threekiii/Awesome-POC/blob/master/%E6%93%8D%E4%BD%9C%E7%B3%BB%E7%BB%9F%E6%BC%8F%E6%B4%9E/Shellshock%20%E7%A0%B4%E5%A3%B3%E6%BC%8F%E6%B4%9E%20CVE-2014-6271.md | POC Details |
| 84 | None | https://github.com/chaitin/xray-plugins/blob/main/poc/manual/bash-cve-2014-6271.yml | POC Details |
| 85 | https://github.com/vulhub/vulhub/blob/master/bash/CVE-2014-6271/README.md | POC Details | |
| 86 | None | https://github.com/Isidoro4-kor/bash-CVE-2014-6271 | POC Details |
| 87 | Shellshock Vulnerability Scanner | https://github.com/moften/CVE-2014-6271 | POC Details |
| 88 | CVE-2014-6271(RCE) poc Exploit | https://github.com/knightc0de/Shellshock_vuln_Exploit | POC Details |
| 89 | This is my implementation of shellshock exploit | https://github.com/rsherstnev/CVE-2014-6271 | POC Details |
| 90 | None | https://github.com/RAJMadhusankha/Shellshock-CVE-2014-6271-Exploitation-and-Analysis | POC Details |
| 91 | Exploitation of "Shellshock" Vulnerability. Remote code execution in Apache with mod_cgi | https://github.com/J0hnTh3Kn1ght/CVE-2014-6271 | POC Details |
| 92 | A complete, modern demonstration lab for CVE-2014-6271 (Shellshock), including architecture, exploitation steps, Burp Suite usage, reverse shells, countermeasures, and full command cheat-sheet. | https://github.com/DrHaitham/CVE-2014-6271-Shellshock- | POC Details |
| 93 | Recreating Shellshock (CVE-2014-6271) - the bash vulnerability that endangered millions of servers. Automated exploitation toolkit + Burp Suite methodology + Docker lab. Built for security research & education. Offensive security portfolio project. | https://github.com/mtaha-sec/bash-apocalypse | POC Details |
| 94 | None | https://github.com/andres101c/Shellshock-CVE-2014-6271 | POC Details |
| 95 | CVE-2014-6271 Shellshock | https://github.com/Industri4l-H3ll-Xpl0it3rs/CVE-2014-6271-Shellshock | POC Details |
No public POC found.
Login to generate AI POCNo comments yet