This repository contains curated proof-of-concept exploits
and exploitation artifacts derived from real-world vulnerabilities.
All materials are published strictly for security research,
technical analysis, and reproducibility purposes.
The focus is on memory corruption, kernel exploitation,
and system-level vulnerability research.
| Component | CVE | Description | Affected Versions | Release Date | Author |
|---|---|---|---|---|---|
| libarchive | CVE-2025-5914 | Ownership confusion in libarchive library | 3.8.0 | 2026-01-11 | Byte Reaper |
| linux kernel (ebpf) | CVE-2025-39913 | UAF in kernel linux (psock-cork) | 6.12.38 | 2025-10-01 | Byte Reaper |
| linux kernel (writeback subsystem) | CVE-2025-39866 | use-after-free and race condition in linux kernel | 6.12.16 | 2025-09-26 | Byte Reaper |
| Tenda routers | CVE-2025-7795 | Buffer overflow vulnerability in Tenda routers | FH451 1.0.0.9 | 2025-07-18 | Byte Reaper |
| mbedTLS | CVE-2025-47917 | Use-After-Free in mbedTLS leading to remote code execution (RCE) | 3.6.4 | 2025-07-20 | Byte Reaper |
| Linux kernel pipe buffer handling | CVE-2022-084 | Dirty Pipe in Linux kernel (privilege escalation) | 5.16.11 | 2022-03-29 | Byte Reaper |
Bytrep selectively reviews external research artifacts
that align with the scope and technical depth of our work.
Submissions may include proof-of-concept exploits,
technical analyses, or vulnerability research derived
from real-world security issues.
All submissions are evaluated by our internal research team.
Publication is at the sole discretion of Bytrep.