Hamid-K / nginx-rift-private-lab
PublicPrivate Nginx Rift ASLR lab, exploit chain, and demo recordings
NGINX Rift is a private security research lab that demonstrates a critical vulnerability (CVE-2026-42945) in NGINX web server software. The project provides tools for security researchers and system administrators to safely test whether their servers are affected by a heap buffer overflow bug in the server's rewrite module. The main tool, nginx_rifter.py, acts as an assessment-first scanner that investigates target servers through file-read pathways, determines if they're vulnerable, and optionally demonstrates the complete exploit chain including ASLR bypass techniques. The project is designed for authorized testing in controlled lab environments and includes documentation about which server versions are affected and which updates fix the vulnerability.
How It Works
You hear about a serious flaw in popular web server software that could let attackers run commands on your servers.
You download the research lab files and run a simple setup script to create a controlled test server on your own machine.
You launch the main assessment program, pointing it at your test server to safely check if it's vulnerable.
The program examines your server through special read-only pathways, learning details about how it's configured and where important parts live in memory.
Just check if your server is vulnerable and see what conditions would need to be met for an attack.
Watch the complete attack unfold, including how the server's memory protection is bypassed.
The tool outputs detailed findings about your server's configuration and whether the vulnerability could be exploited.
You now know whether your server needs updating, and you can show this to your team as proof of what was tested.
Star Growth
Repurpose is a Pro feature
Generate ready-to-use prompts for X threads, LinkedIn posts, blog posts, YouTube scripts, and more -- with full repo context baked in.
Unlock RepurposeSimilar repos coming soon.