Skip to content

pullsec/cve-deep-dive

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

8 Commits
 
 
 
 

Repository files navigation

Report Bug · Request Feature

Table of Contents
  1. about
  2. cve list
  3. repository structure
  4. scripts
  5. usage
  6. faq

about

CVE Deep Dive is based on a research-oriented approach to vulnerability analysis.

In this context, each CVE is analyzed in an isolated lab environment in order to understand:

  • how the vulnerability works
  • what is the root cause
  • what changed in the patch
  • what is the real impact on the system

This project focuses on technical understanding rather than exploitation.

cve list

cve id component status notes
CVE-2026-31431 kernel in progress initial lab + inspector script

repository structure

Each CVE is isolated in its own directory.

CVE-XXXX-XXXX/
├── README.md
├── notes.md
├── scripts/
├── analysis/
├── lab/
└── artifacts/

This structure allows:

  • clean separation between CVEs
  • reproducible lab environments
  • structured analysis workflow

scripts

Each CVE may include helper scripts used during analysis.

script role description
cve_2026_31431.py inspection collects system information and kernel context

These scripts are designed for:

  • environment inspection
  • system context analysis
  • lab validation

They do not perform exploitation.

usage

Note

All scripts are intended to be executed in isolated lab environments only.

example

python3 scripts/cve_2026_31431.py --confirm-lab

Note

this repository does not provide weaponized exploits all tests are performed in controlled environments the goal is to understand vulnerabilities, not to abuse them

faq

why no exploits are provided?

The goal is to understand vulnerabilities, not to publish weaponized code.

why use a lab environment?

Testing is done in isolated systems to avoid impacting real environments and to safely reproduce behavior.

what is the purpose of the scripts?

Scripts are used to inspect and document the environment, not to exploit the vulnerability.

About

This repository is where I dig into CVEs to understand their root cause, how they were patched, and how they can be exploited.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Contributors

Languages