2023-02-07 09:32:52 +09:00
[
2023-11-03 15:25:04 +09:00
{
"id" : 598309338 ,
"name" : "CVE-2022-4510" ,
"full_name" : "electr0sm0g\/CVE-2022-4510" ,
"owner" : {
"login" : "electr0sm0g" ,
"id" : 8340491 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/8340491?v=4" ,
"html_url" : "https:\/\/github.com\/electr0sm0g"
} ,
"html_url" : "https:\/\/github.com\/electr0sm0g\/CVE-2022-4510" ,
"description" : "Binwalk Remote Command Execution" ,
"fork" : false ,
"created_at" : "2023-02-06T20:53:49Z" ,
2024-05-05 03:27:20 +09:00
"updated_at" : "2024-05-04T13:10:54Z" ,
2023-11-03 15:25:04 +09:00
"pushed_at" : "2023-02-06T20:54:33Z" ,
2024-05-05 03:27:20 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2023-11-03 15:25:04 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2024-05-05 03:27:20 +09:00
"watchers" : 6 ,
2023-11-03 15:25:04 +09:00
"score" : 0 ,
"subscribers_count" : 1
} ,
2023-06-27 15:33:51 +09:00
{
"id" : 659028420 ,
"name" : "CVE-2022-4510-WalkingPath" ,
"full_name" : "adhikara13\/CVE-2022-4510-WalkingPath" ,
"owner" : {
"login" : "adhikara13" ,
"id" : 44716348 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4" ,
"html_url" : "https:\/\/github.com\/adhikara13"
} ,
"html_url" : "https:\/\/github.com\/adhikara13\/CVE-2022-4510-WalkingPath" ,
"description" : "A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations." ,
"fork" : false ,
"created_at" : "2023-06-27T02:20:13Z" ,
2024-05-05 03:27:20 +09:00
"updated_at" : "2024-05-04T13:10:55Z" ,
2023-06-27 15:33:51 +09:00
"pushed_at" : "2023-06-27T02:29:26Z" ,
2024-05-05 03:27:20 +09:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2023-06-27 15:33:51 +09:00
"has_discussions" : false ,
2023-11-28 21:34:31 +09:00
"forks_count" : 3 ,
2023-06-27 15:33:51 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-11-28 21:34:31 +09:00
"forks" : 3 ,
2024-05-05 03:27:20 +09:00
"watchers" : 11 ,
2023-06-27 15:33:51 +09:00
"score" : 0 ,
2023-08-25 15:31:35 +09:00
"subscribers_count" : 1
2023-07-01 15:26:20 +09:00
} ,
2023-07-12 09:32:36 +09:00
{
"id" : 665275498 ,
"name" : "BadPfs" ,
"full_name" : "Kalagious\/BadPfs" ,
"owner" : {
"login" : "Kalagious" ,
"id" : 44515549 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44515549?v=4" ,
"html_url" : "https:\/\/github.com\/Kalagious"
} ,
"html_url" : "https:\/\/github.com\/Kalagious\/BadPfs" ,
"description" : "Python script that generates pfs payloads to exploit CVE-2022-4510" ,
"fork" : false ,
"created_at" : "2023-07-11T20:55:58Z" ,
2023-07-19 03:48:10 +09:00
"updated_at" : "2023-07-18T15:32:59Z" ,
2023-07-12 09:32:36 +09:00
"pushed_at" : "2023-07-11T20:59:48Z" ,
2023-07-19 03:48:10 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-07-12 09:32:36 +09:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2023-07-19 03:48:10 +09:00
"watchers" : 2 ,
2023-07-12 09:32:36 +09:00
"score" : 0 ,
2023-07-12 15:55:37 +09:00
"subscribers_count" : 1
2023-02-07 09:32:52 +09:00
}
]