nomisec
WORKING POC
2,522 stars
by FiloSottile · infoleak
https://github.com/FiloSottile/Heartbleed
This repository contains a Go-based tool for detecting the Heartbleed vulnerability (CVE-2014-0160) in TLS/SSL services. It includes functionality to test various services (HTTPS, FTP, SMTP, etc.) and checks for vulnerable OpenSSL implementations by sending malformed heartbeat requests.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target service · TLS/SSL service running a vulnerable OpenSSL version
nomisec
SCANNER
574 stars
by musalbas · infoleak
https://github.com/musalbas/heartbleed-masstest
This is a multi-threaded scanner for CVE-2014-0160 (Heartbleed) that checks if remote hosts are vulnerable by sending a crafted heartbeat request without exploiting the server to leak data. It supports scanning multiple hosts, logging results, and resuming scans.
Classification
Scanner 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to target hosts · OpenSSL service exposed on a port (default 443)
nomisec
WORKING POC
451 stars
by titanous · infoleak
https://github.com/titanous/heartbleeder
This repository contains a Go-based tool to test for the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It includes functionality to scan single or multiple hosts, supports PostgreSQL, and provides a web dashboard for monitoring.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · TLS/SSL service running on the target
nomisec
WORKING POC
326 stars
by Lekensteyn · infoleak
https://github.com/Lekensteyn/pacemaker
This repository contains a working proof-of-concept exploit for CVE-2014-0160 (Heartbleed), targeting OpenSSL clients and servers. It includes tools to test for vulnerability by sending malformed heartbeat requests to leak memory contents.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL client/server · Python 2 or 3
nomisec
WORKING POC
167 stars
by sensepost · infoleak
https://github.com/sensepost/heartbleed-poc
This repository contains a Python-based proof-of-concept exploit for CVE-2014-0160 (Heartbleed), which allows reading memory from vulnerable OpenSSL servers. It includes tools for testing and exploiting the vulnerability, as well as guidance for analyzing leaked data.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f and 1.0.2-beta through 1.0.2-beta1
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · Python environment for the PoC script
nomisec
WORKING POC
97 stars
by einaros · infoleak
https://github.com/einaros/heartbleed-tools
This repository contains a set of tools for detecting and exploiting the OpenSSL Heartbleed vulnerability (CVE-2014-0160), including a scanner, data miner, and RSA key restoration utilities. The tools are designed to test for vulnerability, dump memory contents, and recover private keys from vulnerable servers.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · Python environment to run the tools
nomisec
WORKING POC
84 stars
by mpgn · infoleak
https://github.com/mpgn/heartbleed-PoC
This is a functional Python PoC for CVE-2014-0160 (Heartbleed), demonstrating memory leakage from vulnerable OpenSSL servers by exploiting malformed TLS heartbeat requests. It connects to a target, performs the handshake, and extracts sensitive data from server memory.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Python 2.7 · Network access to vulnerable OpenSSL server
nomisec
WORKING POC
40 stars
by isgroup · infoleak
https://github.com/isgroup/openmagic
This repository contains a functional proof-of-concept for CVE-2014-0160 (Heartbleed), including scripts to test and exploit vulnerable OpenSSL services. It automates detection and data extraction from vulnerable hosts.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
OpenSSL service with heartbeat extension enabled · Network access to target
nomisec
WRITEUP
19 stars
by jdauphant · poc
https://github.com/jdauphant/patch-openssl-CVE-2014-0160
This repository provides an Ansible playbook to patch systems vulnerable to CVE-2014-0160 (Heartbleed). It includes instructions for upgrading OpenSSL on Debian-based systems and checking for vulnerability status.
Classification
Writeup 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
Auth required
Prerequisites:
Access to target systems with Ansible · OpenSSL version 1.0.1 through 1.0.1f
nomisec
WORKING POC
18 stars
by DisK0nn3cT · infoleak
https://github.com/DisK0nn3cT/MaltegoHeartbleed
This is a Maltego transform script that tests for the OpenSSL Heartbleed vulnerability (CVE-2014-0160) by sending a malformed heartbeat request to a target server and checking for an excessive response. It is designed to integrate with Maltego for vulnerability detection.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · OpenSSL service exposed on a TCP port (default: 443)
nomisec
WORKING POC
15 stars
by OffensivePython · infoleak
https://github.com/OffensivePython/HeartLeak
This is a functional Python script that exploits the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It includes both a scanner to detect vulnerable hosts and a monitor to extract leaked memory data.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL service
nomisec
WORKING POC
14 stars
by hmlio · poc
https://github.com/hmlio/vaas-cve-2014-0160
This repository provides a Docker container with a vulnerable OpenSSL version (1.0.1f) to demonstrate CVE-2014-0160 (Heartbleed). It includes instructions for verification and exploitation using Nmap and Metasploit to leak memory contents.
Classification
Working Poc 90%
Target:
OpenSSL 1.0.1f and earlier
No auth needed
Prerequisites:
Docker · Network access to the target
nomisec
SCANNER
11 stars
by hybridus · infoleak
https://github.com/hybridus/heartbleedscanner
This repository contains a Python-based network scanner for detecting the OpenSSL Heartbleed vulnerability (CVE-2014-0160). It supports scanning individual hosts, networks, or lists of targets, and can log leaked memory from vulnerable systems.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to target systems · OpenSSL service exposed (e.g., HTTPS, SMTP, POP3, IMAP)
nomisec
WORKING POC
8 stars
by 0x90 · infoleak
https://github.com/0x90/CVE-2014-0160
This repository contains a Python-based proof-of-concept exploit for CVE-2014-0160 (Heartbleed), which allows an attacker to leak memory contents from vulnerable OpenSSL servers via malformed heartbeat requests. The script includes functionality for scanning, monitoring, and extracting printable data from vulnerable hosts.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · SSL/TLS service exposed on the target
nomisec
WORKING POC
7 stars
by DominikTo · poc
https://github.com/DominikTo/bleed
This is a functional proof-of-concept tool for testing the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It sends a malformed heartbeat request to a server and checks if it returns more data than it should, indicating vulnerability.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Server with vulnerable OpenSSL version · Network access to the target server
nomisec
WORKING POC
6 stars
by 0xinf0 · poc
https://github.com/0xinf0/bleeding_onions
This repository contains a Perl script to test for the Heartbleed vulnerability (CVE-2014-0160) in SSL/TLS services, including support for STARTTLS protocols. It also includes a Python script to scan Tor network relays for vulnerability.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to vulnerable SSL/TLS service · Perl and Python environments
nomisec
WORKING POC
5 stars
by hreese · infoleak
https://github.com/hreese/heartbleed-dtls
This repository contains a proof-of-concept exploit for CVE-2014-0160 (Heartbleed) specifically targeting DTLS. It includes code to craft malicious DTLS handshake messages to trigger the heartbeat vulnerability and leak memory contents.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f (DTLS implementation)
No auth needed
Prerequisites:
Network access to a vulnerable DTLS service · DTLS service using a vulnerable version of OpenSSL
nomisec
SCANNER
5 stars
by anthophilee · poc
https://github.com/anthophilee/A2SV--SSL-VUL-Scan
This repository contains a Python-based scanner tool (A2SV) designed to detect multiple SSL/TLS vulnerabilities, including CVE-2015-0204 (FREAK Attack). It automates the scanning process for various CVEs by leveraging Python scripts and dependencies.
Classification
Scanner 90%
Target:
SSL/TLS implementations (various versions)
No auth needed
Prerequisites:
Python 2.x · pip2 · git · network access to target
nomisec
WORKING POC
5 stars
by undacmic · infoleak
https://github.com/undacmic/heartbleed-proof-of-concept
This repository contains a functional proof-of-concept exploit for CVE-2014-0160 (Heartbleed), demonstrating memory leakage from vulnerable OpenSSL servers. The exploit sends malformed heartbeat requests to extract sensitive data from server memory.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL server · Network access to target
nomisec
WORKING POC
4 stars
by yryz · infoleak
https://github.com/yryz/heartbleed.js
This repository contains a Node.js implementation of a scanner for CVE-2014-0160 (Heartbleed), which checks if a target server is vulnerable by sending a malformed heartbeat request and analyzing the response.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · Target server running a vulnerable version of OpenSSL
nomisec
WRITEUP
3 stars
by ingochris · poc
https://github.com/ingochris/heartpatch.us
This repository is a writeup and resource collection for CVE-2014-0160 (Heartbleed), describing the vulnerability and providing references to tools for scanning and patching. It does not contain exploit code but links to external tools like Metasploit and Nmap scripts.
Classification
Writeup 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to target server · OpenSSL heartbeat extension enabled on target
nomisec
SCANNER
3 stars
by mozilla-services · poc
https://github.com/mozilla-services/Heartbleed
This repository contains a Go-based server for testing the Heartbleed vulnerability (CVE-2014-0160). It provides endpoints to check if a target is vulnerable to Heartbleed and includes caching and metrics support.
Classification
Scanner 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · OpenSSL service exposed
nomisec
SCANNER
2 stars
by amerine · infoleak
https://github.com/amerine/coronary
This repository contains a Go-based scanner for detecting CVE-2014-0160 (Heartbleed) in OpenSSL by checking if the heartbeat extension is enabled and vulnerable. It scans CIDR blocks asynchronously and reports vulnerable or secure hosts.
Classification
Scanner 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to target hosts · OpenSSL heartbeat extension enabled on target
nomisec
WRITEUP
2 stars
by zouguangxian · infoleak
https://github.com/zouguangxian/heartbleed
This repository provides a README referencing an Nmap script for detecting the Heartbleed vulnerability (CVE-2014-0160). It includes links to the official Nmap script and additional resources but does not contain exploit code itself.
Classification
Writeup 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL service
nomisec
WORKING POC
2 stars
by indrajeetmp11 · infoleak
https://github.com/indrajeetmp11/Heartbleed-PoC-Exploit-Script
This is a Python-based PoC for CVE-2014-0160 (Heartbleed), which exploits a buffer over-read vulnerability in OpenSSL's TLS heartbeat extension to leak server memory. The script performs a full TLS handshake and sends a crafted heartbeat request to detect and extract leaked data.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target TLS server · Python 3.x
nomisec
SCANNER
2 stars
by cyphar · infoleak
https://github.com/cyphar/heartthreader
This repository contains a multithreaded scanner for detecting the Heartbleed vulnerability (CVE-2014-0160) in TLS/SSL servers. It reads target hosts from input files and tests them for vulnerability using the Heartbeat extension.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
List of target hosts with open TLS/SSL ports (typically 443)
nomisec
WORKING POC
2 stars
by waqasjamal-zz · poc
https://github.com/waqasjamal-zz/HeartBleed-Vulnerability-Checker
This is a Python script that checks for the Heartbleed vulnerability (CVE-2014-0160) in SSL/TLS implementations. It sends a malformed heartbeat request to a target server and analyzes the response to determine if the server is vulnerable.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
List of target domains or IPs · Network connectivity to the target servers
nomisec
SCANNER
2 stars
by pblittle · poc
https://github.com/pblittle/aws-suture
This repository contains a tool called Suture designed to scan AWS EC2 instances for the Heartbleed vulnerability (CVE-2014-0160) by executing remote commands via SSH. It checks the OpenSSL version and compares it against known vulnerable versions.
Classification
Scanner 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
Auth required
Prerequisites:
AWS credentials · SSH access to EC2 instances · OpenSSL installed on target instances
nomisec
WRITEUP
2 stars
by GardeniaWhite · poc
https://github.com/GardeniaWhite/fuzzing
This repository is a workshop on modern fuzzing techniques, including a lesson on finding CVE-2014-0160 (Heartbleed). It provides theoretical and practical lessons on fuzzing C/C++ projects using tools like libFuzzer and radamsa.
Classification
Writeup 90%
Target:
OpenSSL 1.0.1f
No auth needed
Prerequisites:
Basic C/C++ knowledge · Linux-based OS · Clang compiler
nomisec
WORKING POC
2 stars
by GuillermoEscobero · infoleak
https://github.com/GuillermoEscobero/heartbleed
This is a functional proof-of-concept exploit for CVE-2014-0160 (Heartbleed), demonstrating memory leakage from vulnerable OpenSSL servers via malformed heartbeat requests. The code includes a client that sends a crafted TLS heartbeat message to trigger the vulnerability and dumps leaked memory contents.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL server with heartbeat extension enabled
github
WORKING POC
1 stars
by vadimgggg · pythonpoc
https://github.com/vadimgggg/CVE-PoC/tree/main/CVE-2014-0160
This repository contains a functional exploit for CVE-2014-0160 (Heartbleed), including a Dockerfile to set up a vulnerable environment and a Python script to exploit the vulnerability. The script sends malformed heartbeat requests to extract memory contents from vulnerable OpenSSL servers.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL server (1.0.1f or similar)
nomisec
WORKING POC
1 stars
by belmind · infoleak
https://github.com/belmind/heartbleed
This repository contains a functional PoC for CVE-2014-0160 (Heartbleed), including an exploit script (`heartbleed.py`) that tests for the SSL heartbeat vulnerability and a Docker-based vulnerable server setup. Additional scripts simulate data spoofing to demonstrate the impact of the vulnerability.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · Python environment for the exploit script · Docker for the vulnerable server setup
nomisec
WORKING POC
1 stars
by Saymeis · poc
https://github.com/Saymeis/HeartBleed
This repository provides a Docker-based environment to demonstrate the HeartBleed vulnerability (CVE-2014-0160). It includes a vulnerable OpenSSL setup and a simple web application to test the exploit.
Classification
Working Poc 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Docker installed · Basic understanding of HeartBleed exploit
nomisec
SCANNER
1 stars
by proactiveRISK · poc
https://github.com/proactiveRISK/heartbleed-extention
This is a Firefox extension that scans websites for the Heartbleed vulnerability (CVE-2014-0160) by querying a remote server. It does not exploit the vulnerability directly but checks if a host is vulnerable.
Classification
Scanner 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Firefox browser · Network access to the target host
nomisec
WORKING POC
1 stars
by cheese-hub · poc
https://github.com/cheese-hub/heartbleed
This repository contains a demonstration of the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL, including a Python script to exploit the vulnerability and extract sensitive information such as session cookies. The setup involves Docker containers for a vulnerable server, a hacker, and a victim.
Classification
Working Poc 95%
Target:
OpenSSL (versions with Heartbleed vulnerability)
No auth needed
Prerequisites:
Vulnerable OpenSSL version on the target server · Network access to the target server
nomisec
STUB
1 stars
by Xyl2k · poc
https://github.com/Xyl2k/CVE-2014-0160-Chrome-Plugin
The repository contains a truncated jQuery library file and a README, but no functional exploit code for CVE-2014-0160 (Heartbleed). The provided code is unrelated to the vulnerability.
Target:
N/A
No auth needed
nomisec
SCANNER
1 stars
by vortextube · poc
https://github.com/vortextube/ssl_scanner
This Perl script scans remote hosts for SSLv3 support using OpenSSL's s_client command. It checks for SSLv3 vulnerabilities by attempting connections and reporting whether the protocol is supported or not.
Classification
Scanner 100%
Target:
OpenSSL (SSLv3)
No auth needed
Prerequisites:
OpenSSL installed · Perl with Net::IP module
nomisec
WORKING POC
1 stars
by xlucas · infoleak
https://github.com/xlucas/heartbleed
This is a functional Ruby-based PoC for CVE-2014-0160 (Heartbleed), which exploits the OpenSSL vulnerability to leak memory contents from vulnerable servers. It sends a malformed Heartbeat request to extract ~64KB of data from the server's memory.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · Ruby and Bundler installed
nomisec
WORKING POC
1 stars
by sammyfung · poc
https://github.com/sammyfung/openssl-heartbleed-fix
This repository contains a shell script to mitigate CVE-2014-0160 (Heartbleed) by upgrading OpenSSL and regenerating SSL certificates. It automates the patching process for Debian/Ubuntu systems.
Classification
Working Poc 95%
Target:
OpenSSL (versions affected by Heartbleed)
Auth required
Prerequisites:
root access · Debian/Ubuntu system · Apache HTTP server
nomisec
SCANNER
by obayesshelton · poc
https://github.com/obayesshelton/CVE-2014-0160-Scanner
This is a PHP-based scanner for CVE-2014-0160 (Heartbleed) that queries a third-party service to check if domains are vulnerable. It does not exploit the vulnerability but relies on an external API for detection.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
List of domains to scan · Access to the external Heartbleed checking service
nomisec
SCANNER
by marstornado · remote
https://github.com/marstornado/cve-2014-0160-Yunfeng-Jiang
This repository contains detection tools for CVE-2014-0160 (Heartbleed), including scripts to check if a server is vulnerable by sending malformed heartbeat requests. The tools support various protocols (IMAP, SMTP, HTTP, etc.) and can extract data from vulnerable servers.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · OpenSSL service exposed (e.g., HTTPS, IMAPS, etc.)
github
WRITEUP
by OscarYR · poc
https://github.com/OscarYR/CVE_Reproduction/tree/main/Heartbleed/CVE-2014-0160.md
This repository provides a detailed technical analysis of the Heartbleed vulnerability (CVE-2014-0160), including its root cause, exploitation mechanism, and mitigation strategies. It includes screenshots and references to tools like Nmap and Metasploit for detection and exploitation.
Classification
Writeup 100%
Target:
OpenSSL versions 1.0.1 through 1.0.1f (inclusive), and 1.0.2-beta
No auth needed
Prerequisites:
Vulnerable version of OpenSSL with TLS heartbeat extension enabled
nomisec
SCANNER
by cbk914 · infoleak
https://github.com/cbk914/heartbleed-checker
This repository contains a Python script to check for the Heartbleed vulnerability (CVE-2014-0160) by sending a malformed TLS heartbeat request and analyzing the response. It does not exploit the vulnerability but detects its presence.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target host and port · TLS/SSL service running on the target
nomisec
WORKING POC
by timsonner · infoleak
https://github.com/timsonner/cve-2014-0160-heartbleed
This repository contains a Python-based PoC for CVE-2014-0160 (Heartbleed), which exploits a memory disclosure vulnerability in OpenSSL's TLS heartbeat extension. The script supports multiple TLS versions and STARTTLS protocols, allowing attackers to leak sensitive memory contents from vulnerable servers.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL service · TLS/SSL service with heartbeat extension enabled
nomisec
WORKING POC
by yashfren · infoleak
https://github.com/yashfren/CVE-2014-0160-HeartBleed
This is a Python-based proof-of-concept exploit for CVE-2014-0160 (Heartbleed), which tests for the OpenSSL TLS heartbeat extension memory disclosure vulnerability. It supports multiple SSL/TLS versions and attempts to trigger the vulnerability by sending malformed heartbeat requests.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server
nomisec
WORKING POC
by Shayhha · infoleak
https://github.com/Shayhha/HeartbleedAttack
This repository contains a Java-based exploit for CVE-2014-0160 (Heartbleed) along with supporting Bash scripts to flood memory with sensitive data. The exploit targets vulnerable OpenSSL versions (1.0.1 to 1.0.1f) to leak memory contents from Apache and Postfix services.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 to 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL version (1.0.1 to 1.0.1f) · Network access to target server on ports 443 or 465
nomisec
WORKING POC
by pierceoneill · infoleak
https://github.com/pierceoneill/bleeding-heart
This repository contains a functional Python-based PoC for CVE-2014-0160 (Heartbleed), which exploits a memory disclosure vulnerability in OpenSSL's Heartbeat extension. The exploit sends malformed Heartbeat requests to leak server memory contents, potentially exposing sensitive data like private keys or credentials.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 to 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL service (typically HTTPS on port 443)
nomisec
WRITEUP
by zaryouhashraf · poc
https://github.com/zaryouhashraf/CVE-2014-0160
This repository provides a detailed technical analysis of CVE-2014-0160 (Heartbleed), including root cause, impact, affected versions, and mitigation steps. It does not contain exploit code but offers a comprehensive writeup on the vulnerability.
Classification
Writeup 100%
Target:
OpenSSL 1.0.1 - 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL version · Network access to target
nomisec
WRITEUP
by 0xAshwesker · poc
https://github.com/0xAshwesker/CVE-2014-0160
This repository provides a detailed technical analysis of CVE-2014-0160 (Heartbleed), including root cause, impact, affected versions, and mitigation steps. It does not contain exploit code but offers a comprehensive writeup on the vulnerability.
Classification
Writeup 100%
Target:
OpenSSL 1.0.1 - 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL version with heartbeat extension enabled
nomisec
WORKING POC
by 22imer · poc
https://github.com/22imer/CVE-2014-0160
This repository provides a lab environment to demonstrate the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL, allowing memory leakage from a vulnerable nginx server. It includes a Flask app to simulate sensitive data storage and a script to trigger memory leaks via TLS heartbeat requests.
Classification
Working Poc 95%
Target:
OpenSSL (TLS heartbeat extension)
No auth needed
Prerequisites:
Vulnerable OpenSSL version (1.0.1-1.0.1f) · TLS heartbeat support enabled
nomisec
WORKING POC
by SimoesCTT · poc
https://github.com/SimoesCTT/CTT-HEARTBLEED-Temporal-Resonance-Memory-Leak-Exploit-Heartbleed-CVE-2014-0160
This is a functional PoC exploit for CVE-2014-0160 (Heartbleed), targeting OpenSSL 1.0.1-1.0.1f. It leverages the heartbeat extension vulnerability to leak memory contents from vulnerable servers, with additional 'CTT Temporal Resonance' enhancements for layered memory extraction.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 - 1.0.1f
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL service · OpenSSL 1.0.1-1.0.1f with heartbeat enabled
nomisec
WORKING POC
by rouze-d · poc
https://github.com/rouze-d/heartbleed
This repository contains a functional proof-of-concept exploit for CVE-2014-0160 (Heartbleed), which targets the OpenSSL TLS heartbeat extension vulnerability to leak memory contents from vulnerable servers. It includes a Python script for exploitation and a bash wrapper for automation.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1f and earlier
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL service · OpenSSL service with heartbeat extension enabled
nomisec
WORKING POC
by WildfootW · remote
https://github.com/WildfootW/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed
This is a functional Python exploit for CVE-2014-0160 (Heartbleed), which extracts memory contents from vulnerable OpenSSL servers via malformed TLS heartbeat requests. It includes features like STARTTLS support, multiple iterations, and RSA private key extraction.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1f and earlier with TLS heartbeat enabled
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL service · TLS heartbeat extension enabled on target
nomisec
WRITEUP
by cved-sources · poc
https://github.com/cved-sources/cve-2014-0160
This repository is a README file referencing CVE-2014-0160 (Heartbleed) and provides links to related Docker containers and tools for managing vulnerable environments. It does not contain exploit code but serves as documentation for testing setups.
Classification
Writeup 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL version (1.0.1-1.0.1f)
nomisec
WORKING POC
by takeshixx · infoleak
https://github.com/takeshixx/ssl-heartbleed.nse
This is an Nmap NSE script designed to detect and exploit the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It supports multiple protocols (FTP, SMTP, XMPP) and TLS versions, and can dump leaked memory for analysis.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Nmap with NSE support · Network access to vulnerable OpenSSL service
nomisec
SCANNER
by siddolo · poc
https://github.com/siddolo/knockbleed
This repository contains a shell script that automates the testing of subdomains for the Heartbleed vulnerability (CVE-2014-0160) using the 'knock' subdomain scanner and 'check-ssl-heartbleed' tool. It iterates through subdomains of a given domain and checks for vulnerability by sending malformed heartbeat requests.
Classification
Scanner 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
knock subdomain scanner · check-ssl-heartbleed tool · perl · python
nomisec
WORKING POC
by a0726h77 · poc
https://github.com/a0726h77/heartbleed-test
This repository contains a functional proof-of-concept for CVE-2014-0160 (Heartbleed), including scripts to test vulnerable servers for memory leakage. The primary script `heartbleed-test.py` sends malformed heartbeat requests to exploit the vulnerability and dump memory contents.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · Python environment
nomisec
WORKING POC
by GeeksXtreme · poc
https://github.com/GeeksXtreme/ssl-heartbleed.nse
This is an Nmap NSE script designed to detect and exploit the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It supports multiple protocols (FTP, SMTP, XMPP) and TLS versions, and can dump leaked memory to a file.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Nmap with NSE support · Vulnerable OpenSSL service
nomisec
WORKING POC
by froyo75 · poc
https://github.com/froyo75/Heartbleed_Dockerfile_with_Nginx
This repository provides a Dockerized environment with Nginx and a vulnerable OpenSSL version (1.0.1f) to test CVE-2014-0160 (Heartbleed). It includes instructions for exploiting the vulnerability to leak memory contents, including HTTP Basic Authentication credentials.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1f with Nginx
No auth needed
Prerequisites:
Docker installed · Python for running the Heartbleed PoC script · curl for generating HTTP requests
nomisec
SCANNER
by roganartu · poc
https://github.com/roganartu/heartbleedchecker-chrome
This is a Chrome extension that checks if a website is vulnerable to the Heartbleed OpenSSL bug (CVE-2014-0160) by querying an external service. It displays a warning if the site is vulnerable and caches results to avoid repeated checks.
Classification
Scanner 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Chrome browser · Extension installed · Network access to external checking service
nomisec
WORKING POC
by MrE-Fog · poc
https://github.com/MrE-Fog/CVE-2014-0160-Chrome-Plugin
This repository contains a Chrome plugin PoC for CVE-2014-0160 (Heartbleed), likely demonstrating the vulnerability in a browser context. The provided JavaScript file includes jQuery and appears to be part of a plugin, but the actual exploit logic is truncated.
Classification
Working Poc 90%
Target:
Chrome (plugin-based exploitation of OpenSSL Heartbleed)
No auth needed
Prerequisites:
Vulnerable OpenSSL version (1.0.1-1.0.1f) · Chrome browser with plugin support
nomisec
WORKING POC
by h3x0v3rl0rd · poc
https://github.com/h3x0v3rl0rd/CVE-2014-0160_Heartbleed
This is a functional Python script that exploits the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL by sending malformed heartbeat requests to extract memory contents from vulnerable servers. It supports both direct SSL/TLS connections and STARTTLS (SMTP).
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · OpenSSL server with heartbeat extension enabled
nomisec
WORKING POC
by ThanHuuTuan · poc
https://github.com/ThanHuuTuan/Heartexploit
This repository contains a functional proof-of-concept exploit for the Heartbleed vulnerability (CVE-2014-0160). It includes a Python script to test for the vulnerability by sending malformed heartbeat requests to an SSL/TLS server and a bash script to automate the process.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · OpenSSL vulnerable version
nomisec
WORKING POC
by idkqh7 · poc
https://github.com/idkqh7/heatbleeding
This repository contains a functional PoC for CVE-2014-0160 (Heartbleed), specifically targeting 1Password databases to test for vulnerable HTTPS hosts. It includes a script to extract HTTPS hosts from a 1Password database and another to test each host for the Heartbleed vulnerability.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Exported 1Password database (data.1pif file) · Network access to the target HTTPS hosts
nomisec
SCANNER
by iSCInc · poc
https://github.com/iSCInc/heartbleed
This repository contains a checker tool for CVE-2014-0160 (Heartbleed), designed to detect vulnerable OpenSSL implementations. The provided code is primarily frontend JavaScript and does not include the actual exploit logic.
Classification
Scanner 90%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL service
nomisec
WRITEUP
by ArtemCyberLab · poc
https://github.com/ArtemCyberLab/Project-Field-Analysis-and-Memory-Leak-Demonstration
This repository contains a detailed writeup demonstrating the exploitation of CVE-2014-0160 (Heartbleed) using Nmap and Metasploit to extract sensitive information from a vulnerable OpenSSL server. It includes steps for vulnerability detection, exploitation, and analysis of leaked memory data.
Classification
Writeup 100%
Target:
OpenSSL 1.0.1
No auth needed
Prerequisites:
Network access to the target · Nmap and Metasploit installed
nomisec
WORKING POC
by artofscripting-zz · remote
https://github.com/artofscripting-zz/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS
This repository contains a Python script to test for the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. The script sends a malformed heartbeat request to detect if the server leaks memory contents.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to the target server · OpenSSL service running on the target
nomisec
WORKING POC
by tomdevman · poc
https://github.com/tomdevman/heartbleed-bug
This repository contains a Python-based proof-of-concept exploit for CVE-2014-0160 (Heartbleed), which allows an attacker to leak memory contents from vulnerable OpenSSL servers. The tool includes features to detect leaked cookies, passwords, and custom keys, and supports both console and file output.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server · TLS/SSL service exposed on a reachable port
nomisec
WORKING POC
by caiqiqi · remote
https://github.com/caiqiqi/OpenSSL-HeartBleed-CVE-2014-0160-PoC
This is a Python-based proof-of-concept exploit for the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL. It crafts malicious Heartbeat requests to leak memory contents from vulnerable servers.
Classification
Working Poc 95%
Target:
OpenSSL 1.0.1 - 1.0.1f
No auth needed
Prerequisites:
Network access to vulnerable OpenSSL service · TLS/SSL service with Heartbeat extension enabled
vulncheck_xdb
WORKING POC
local
https://gitlab.com/ret2eax/pacemaker
This repository contains a functional Python-based exploit for CVE-2014-0160 (Heartbleed), targeting vulnerable OpenSSL clients. It includes a server to test client vulnerability and a script to exploit servers, demonstrating memory leakage via malformed Heartbeat requests.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Vulnerable OpenSSL client or server · Network connectivity to the target
exploitdb
WORKING POC
VERIFIED
by Jared Stafford · pythonremotemultiple
https://www.exploit-db.com/exploits/32745
This Python script demonstrates CVE-2014-0160 (Heartbleed) by sending a malformed TLS heartbeat request to a server and analyzing the response to determine if it leaks memory contents. It includes functions for sending crafted packets and parsing responses to detect vulnerability.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL server
vulncheck_xdb
WORKING POC
remote
https://github.com/threat9/routersploit
This repository contains the RouterSploit framework, an exploitation toolkit for embedded devices, including modules for exploits, credential testing, scanners, and payloads. It is designed to test and exploit vulnerabilities in routers and other embedded systems.
Classification
Working Poc 95%
Target:
Embedded devices (routers, cameras, etc.)
No auth needed
Prerequisites:
Python 3.6+ · network access to target device
metasploit
WORKING POC
by Neel Mehta, Riku, Antti, Matti, hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/server/openssl_heartbeat_client_memory.rb
This Metasploit module exploits the Heartbleed vulnerability (CVE-2014-0160) in OpenSSL by acting as a fake SSL server to leak memory from connecting clients. It captures heartbeat responses to extract sensitive data such as private keys or session tokens.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to target clients · OpenSSL vulnerable to Heartbleed
exploitdb
WORKING POC
VERIFIED
by Fitzl Csaba · pythonremotemultiple
https://www.exploit-db.com/exploits/32764
This Python script demonstrates CVE-2014-0160 (Heartbleed) by sending a malformed TLS heartbeat request to a server and analyzing the response to detect memory leakage. It supports multiple SSL/TLS versions and checks for vulnerability by verifying if the server returns more data than expected.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1f and earlier versions with TLS heartbeat extension enabled
No auth needed
Prerequisites:
Network access to the target server · Target server must have TLS heartbeat extension enabled
metasploit
WORKING POC
by Neel Mehta, Riku, Antti, Matti · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/ssl/openssl_heartbleed.rb
This Metasploit module exploits the OpenSSL Heartbleed vulnerability (CVE-2014-0160) to leak memory contents from vulnerable servers. It supports scanning, memory dumping, and private key recovery via crafted heartbeat requests.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 through 1.0.1f
No auth needed
Prerequisites:
Network access to a vulnerable OpenSSL service · TLS/SSL service with heartbeat extension enabled
exploitdb
WORKING POC
cremotemultiple
https://www.exploit-db.com/exploits/32791
This is a functional exploit for CVE-2014-0160 (Heartbleed), which leverages a missing bounds check in OpenSSL's heartbeat extension to leak up to 65,535 bytes of remote heap memory per request. The exploit establishes an SSL/TLS connection, sends a malformed heartbeat request, and decrypts the leaked data.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 to 1.0.1f
No auth needed
Prerequisites:
Target must be using a vulnerable OpenSSL version · Network connectivity to the target service
exploitdb
WORKING POC
cremotemultiple
https://www.exploit-db.com/exploits/32998
This is a functional exploit for CVE-2014-0160 (Heartbleed), which leverages a missing bounds check in OpenSSL's heartbeat extension to leak up to 65,535 bytes of remote heap memory per request. The exploit supports both TLS and DTLS, decrypts the leaked data, and writes it to a file for analysis.
Classification
Working Poc 100%
Target:
OpenSSL 1.0.1 to 1.0.1f
No auth needed
Prerequisites:
Target must be using a vulnerable version of OpenSSL (1.0.1 to 1.0.1f) · TLS/DTLS heartbeat extension must be enabled on the target