PoC-in-GitHub/2011/CVE-2011-2523.json

683 lines
23 KiB
JSON
Raw Normal View History

2023-06-19 10:13:15 +02:00
[
{
"id": 356390440,
"name": "vsftpd2.3.4PyExploit",
"full_name": "HerculesRD\/vsftpd2.3.4PyExploit",
"owner": {
"login": "HerculesRD",
"id": 73125772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/HerculesRD",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit",
"description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python",
"fork": false,
"created_at": "2021-04-09T20:26:01Z",
"updated_at": "2021-04-12T17:16:08Z",
"pushed_at": "2021-04-12T17:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 363437748,
"name": "CVE-2011-2523",
"full_name": "nobodyatall648\/CVE-2011-2523",
"owner": {
"login": "nobodyatall648",
"id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/nobodyatall648",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523",
"description": "vsftpd 2.3.4 Backdoor Exploit",
"fork": false,
"created_at": "2021-05-01T15:03:55Z",
2023-08-21 08:27:27 +02:00
"updated_at": "2023-08-21T04:47:15Z",
2023-06-19 10:13:15 +02:00
"pushed_at": "2021-06-25T19:05:49Z",
2023-08-21 08:27:27 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2023-06-19 10:13:15 +02:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2023-08-21 08:27:27 +02:00
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 401789640,
"name": "CVE-2011-2523",
"full_name": "Gr4ykt\/CVE-2011-2523",
"owner": {
"login": "Gr4ykt",
"id": 78503985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Gr4ykt",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523",
"description": "https:\/\/www.exploit-db.com\/exploits\/49757",
"fork": false,
"created_at": "2021-08-31T17:31:30Z",
"updated_at": "2021-08-31T17:34:41Z",
"pushed_at": "2021-08-31T17:34:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 425428807,
"name": "CVE-2011-2523",
"full_name": "padsalatushal\/CVE-2011-2523",
"owner": {
"login": "padsalatushal",
"id": 57517785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/padsalatushal",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2021-11-07T06:20:27Z",
2024-09-02 08:29:51 +02:00
"updated_at": "2024-09-02T04:20:45Z",
2023-06-19 10:13:15 +02:00
"pushed_at": "2023-01-08T17:46:12Z",
2024-09-02 08:29:51 +02:00
"stargazers_count": 12,
"watchers_count": 12,
2023-06-19 10:13:15 +02:00
"has_discussions": false,
2024-01-13 13:33:33 +01:00
"forks_count": 2,
2023-06-19 10:13:15 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
2024-01-13 13:33:33 +01:00
"forks": 2,
2024-09-02 08:29:51 +02:00
"watchers": 12,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 497133986,
"name": "OffensivePascal-CVE-2011-2523",
"full_name": "MFernstrom\/OffensivePascal-CVE-2011-2523",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523",
"description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523",
"fork": false,
"created_at": "2022-05-27T20:47:01Z",
"updated_at": "2022-05-29T18:03:07Z",
"pushed_at": "2022-05-28T00:24:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 2
2023-06-19 10:13:15 +02:00
},
{
"id": 501728395,
"name": "-CVE-2011-2523",
"full_name": "0xSojalSec\/-CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:25:25Z",
2024-08-13 02:29:46 +02:00
"updated_at": "2024-08-12T20:23:59Z",
2023-06-19 10:13:15 +02:00
"pushed_at": "2022-06-09T16:31:05Z",
2024-08-13 02:29:46 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2023-06-19 10:13:15 +02:00
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
2024-08-13 02:29:46 +02:00
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 501728828,
"name": "CVE-2011-2523",
"full_name": "0xSojalSec\/CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/0xSojalSec\/CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:26:43Z",
"updated_at": "2023-02-16T21:08:24Z",
"pushed_at": "2022-06-04T17:26:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 0
2023-06-19 10:13:15 +02:00
},
{
"id": 573823365,
"name": "CTF---CVE-2011-2523",
"full_name": "XiangSi-Howard\/CTF---CVE-2011-2523",
"owner": {
"login": "XiangSi-Howard",
"id": 54540850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54540850?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/XiangSi-Howard",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/XiangSi-Howard\/CTF---CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2022-12-03T14:47:52Z",
"updated_at": "2022-12-03T14:47:52Z",
"pushed_at": "2022-12-04T15:22:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 597877966,
"name": "CVE-2011-2523",
2023-12-04 01:31:29 +01:00
"full_name": "cowsecurity\/CVE-2011-2523",
2023-06-19 10:13:15 +02:00
"owner": {
2023-12-04 01:31:29 +01:00
"login": "cowsecurity",
2023-06-19 10:13:15 +02:00
"id": 74612612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/cowsecurity",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
2023-12-04 01:31:29 +01:00
"html_url": "https:\/\/github.com\/cowsecurity\/CVE-2011-2523",
2023-06-19 10:13:15 +02:00
"description": "CVE-2011-2523 exploit",
"fork": false,
"created_at": "2023-02-05T22:17:34Z",
"updated_at": "2023-04-01T15:46:38Z",
"pushed_at": "2023-02-05T22:19:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-06-19 10:13:15 +02:00
},
{
"id": 638624173,
"name": "CVE-2011-2523",
"full_name": "Lynk4\/CVE-2011-2523",
"owner": {
"login": "Lynk4",
"id": 44930131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44930131?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Lynk4",
"user_view_type": "public"
2023-06-19 10:13:15 +02:00
},
"html_url": "https:\/\/github.com\/Lynk4\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2023-05-09T18:44:05Z",
2024-03-26 07:26:44 +01:00
"updated_at": "2024-03-26T03:45:20Z",
2023-06-19 10:13:15 +02:00
"pushed_at": "2023-05-09T19:14:25Z",
2024-03-16 01:26:22 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2023-06-19 10:13:15 +02:00
"has_discussions": false,
2024-05-16 08:28:54 +02:00
"forks_count": 1,
2023-06-19 10:13:15 +02:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
2023-07-05 15:54:24 +02:00
"metasploitable",
"metasploitable-2",
"metasploitable-3",
2023-06-19 10:13:15 +02:00
"python",
"vsftpd-exploit"
],
"visibility": "public",
2024-05-16 08:28:54 +02:00
"forks": 1,
2024-03-16 01:26:22 +01:00
"watchers": 2,
2023-06-19 15:46:37 +02:00
"score": 0,
"subscribers_count": 1
2023-10-17 02:28:37 +02:00
},
{
"id": 705865634,
"name": "CVE-2011-2523",
"full_name": "vaishnavucv\/CVE-2011-2523",
"owner": {
"login": "vaishnavucv",
"id": 76824366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76824366?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/vaishnavucv",
"user_view_type": "public"
2023-10-17 02:28:37 +02:00
},
"html_url": "https:\/\/github.com\/vaishnavucv\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ",
"fork": false,
"created_at": "2023-10-16T21:00:27Z",
2024-10-22 20:31:20 +02:00
"updated_at": "2024-10-22T16:11:18Z",
"pushed_at": "2024-10-22T16:11:15Z",
2023-10-17 02:28:37 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-10-17 20:45:39 +02:00
"subscribers_count": 1
2023-11-25 01:31:56 +01:00
},
{
"id": 723160395,
"name": "vsftpd-exploit",
"full_name": "chleba124\/vsftpd-exploit",
"owner": {
"login": "chleba124",
"id": 121700816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121700816?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/chleba124",
"user_view_type": "public"
2023-11-25 01:31:56 +01:00
},
"html_url": "https:\/\/github.com\/chleba124\/vsftpd-exploit",
"description": "A tool that exploits the CVE-2011-2523 vulnerability.",
"fork": false,
"created_at": "2023-11-24T21:09:00Z",
2024-03-02 13:26:20 +01:00
"updated_at": "2024-03-02T06:59:24Z",
"pushed_at": "2024-03-02T07:04:25Z",
2023-11-25 01:31:56 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-11-25 19:26:52 +01:00
"subscribers_count": 1
2023-11-28 13:34:31 +01:00
},
{
"id": 724568768,
"name": "CVE-2011-2523-poc",
"full_name": "4m3rr0r\/CVE-2011-2523-poc",
"owner": {
"login": "4m3rr0r",
"id": 90191914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/4m3rr0r",
"user_view_type": "public"
2023-11-28 13:34:31 +01:00
},
"html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2011-2523-poc",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2023-11-28T10:52:33Z",
2023-12-13 19:59:38 +01:00
"updated_at": "2023-12-13T13:37:13Z",
2023-11-28 19:29:25 +01:00
"pushed_at": "2023-11-28T13:36:42Z",
2023-12-13 19:59:38 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2023-11-28 13:34:31 +01:00
"has_discussions": false,
2023-12-13 19:59:38 +01:00
"forks_count": 1,
2023-11-28 13:34:31 +01:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
2023-12-13 19:59:38 +01:00
"forks": 1,
"watchers": 3,
2023-11-28 13:34:31 +01:00
"score": 0,
2023-11-28 19:29:25 +01:00
"subscribers_count": 1
2024-03-05 13:27:02 +01:00
},
{
"id": 767459057,
"name": "Exploit-CVE-2011-2523",
"full_name": "Shubham-2k1\/Exploit-CVE-2011-2523",
"owner": {
"login": "Shubham-2k1",
"id": 71768868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71768868?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Shubham-2k1",
"user_view_type": "public"
2024-03-05 13:27:02 +01:00
},
"html_url": "https:\/\/github.com\/Shubham-2k1\/Exploit-CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2024-03-05T10:31:42Z",
"updated_at": "2024-03-05T10:32:04Z",
"pushed_at": "2024-03-05T10:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-03-05 19:27:04 +01:00
"subscribers_count": 1
2024-04-23 08:28:22 +02:00
},
{
"id": 790562403,
"name": "SmileySploit",
"full_name": "Tenor-Z\/SmileySploit",
"owner": {
"login": "Tenor-Z",
"id": 55516164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Tenor-Z",
"user_view_type": "public"
2024-04-23 08:28:22 +02:00
},
"html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit",
"description": "A basic script that exploits CVE-2011-2523",
"fork": false,
"created_at": "2024-04-23T05:33:39Z",
"updated_at": "2024-04-23T05:36:57Z",
"pushed_at": "2024-04-23T05:36:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-04-23 20:29:00 +02:00
"subscribers_count": 1
2024-06-27 08:28:51 +02:00
},
2024-09-16 02:29:32 +02:00
{
"id": 806726183,
"name": "CVE-2011-2523-PoC",
2024-11-05 01:32:01 +01:00
"full_name": "0xB0y426\/CVE-2011-2523-PoC",
2024-09-16 02:29:32 +02:00
"owner": {
2024-11-05 01:32:01 +01:00
"login": "0xB0y426",
2024-09-16 02:29:32 +02:00
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
2024-11-05 01:32:01 +01:00
"html_url": "https:\/\/github.com\/0xB0y426",
2024-10-18 02:30:24 +02:00
"user_view_type": "public"
2024-09-16 02:29:32 +02:00
},
2024-11-05 01:32:01 +01:00
"html_url": "https:\/\/github.com\/0xB0y426\/CVE-2011-2523-PoC",
2024-09-16 02:29:32 +02:00
"description": "PoC CVE-2011-2523 ",
"fork": false,
"created_at": "2024-05-27T19:13:59Z",
"updated_at": "2024-09-15T18:39:16Z",
"pushed_at": "2024-05-27T19:16:03Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-11-22 13:39:50 +01:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 815324755,
"name": "CVE-2011-2523",
"full_name": "sug4r-wr41th\/CVE-2011-2523",
"owner": {
"login": "sug4r-wr41th",
"id": 136193030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136193030?v=4",
"html_url": "https:\/\/github.com\/sug4r-wr41th",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sug4r-wr41th\/CVE-2011-2523",
"description": "vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC",
"fork": false,
"created_at": "2024-06-14T21:32:09Z",
"updated_at": "2024-11-22T07:39:06Z",
"pushed_at": "2024-06-15T18:03:42Z",
"stargazers_count": 0,
"watchers_count": 0,
2024-09-16 02:29:32 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-09-16 20:30:49 +02:00
"subscribers_count": 1
2024-09-16 02:29:32 +02:00
},
2024-07-03 14:29:27 +02:00
{
"id": 823495260,
"name": "CVE-Research",
"full_name": "AnugiArrawwala\/CVE-Research",
"owner": {
"login": "AnugiArrawwala",
"id": 141626082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141626082?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/AnugiArrawwala",
"user_view_type": "public"
2024-07-03 14:29:27 +02:00
},
"html_url": "https:\/\/github.com\/AnugiArrawwala\/CVE-Research",
"description": "CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523",
"fork": false,
"created_at": "2024-07-03T06:30:54Z",
"updated_at": "2024-07-03T06:52:39Z",
"pushed_at": "2024-07-03T06:52:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2024-07-03 20:29:41 +02:00
"subscribers_count": 1
2024-08-04 02:29:04 +02:00
},
{
"id": 837704091,
"name": "vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"full_name": "Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"owner": {
"login": "Gill-Singh-A",
"id": 123238182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123238182?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/Gill-Singh-A",
"user_view_type": "public"
2024-08-04 02:29:04 +02:00
},
"html_url": "https:\/\/github.com\/Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"description": "A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4",
"fork": false,
"created_at": "2024-08-03T19:06:59Z",
2024-11-20 19:32:37 +01:00
"updated_at": "2024-11-20T16:30:59Z",
2024-08-04 02:29:04 +02:00
"pushed_at": "2024-08-03T19:07:19Z",
2024-11-20 19:32:37 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2024-08-04 02:29:04 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"ftp",
"python3",
"remote-exploit",
"ssh",
"vsftp"
],
"visibility": "public",
"forks": 0,
2024-11-20 19:32:37 +01:00
"watchers": 1,
2024-08-04 02:29:04 +02:00
"score": 0,
2024-08-04 20:28:51 +02:00
"subscribers_count": 1
2024-09-05 02:29:50 +02:00
},
{
"id": 852500356,
"name": "vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"full_name": "everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"owner": {
"login": "everythingBlackkk",
"id": 142638957,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142638957?v=4",
2024-10-18 02:30:24 +02:00
"html_url": "https:\/\/github.com\/everythingBlackkk",
"user_view_type": "public"
2024-09-05 02:29:50 +02:00
},
"html_url": "https:\/\/github.com\/everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-",
"description": "This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)",
"fork": false,
"created_at": "2024-09-04T23:10:14Z",
2024-09-16 02:29:32 +02:00
"updated_at": "2024-09-15T19:55:00Z",
2024-09-05 02:29:50 +02:00
"pushed_at": "2024-09-04T23:42:37Z",
2024-09-16 02:29:32 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2024-09-05 02:29:50 +02:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2024-09-16 02:29:32 +02:00
"watchers": 1,
2024-09-05 02:29:50 +02:00
"score": 0,
2024-09-05 20:30:03 +02:00
"subscribers_count": 1
2024-12-26 01:31:44 +01:00
},
{
"id": 908317555,
"name": "CVE-2011-2523",
"full_name": "NullBrunk\/CVE-2011-2523",
"owner": {
"login": "NullBrunk",
"id": 125673909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125673909?v=4",
"html_url": "https:\/\/github.com\/NullBrunk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2011-2523",
"description": "VsFTPd 2.3.4 Backdoor Command Execution",
"fork": false,
"created_at": "2024-12-25T18:04:10Z",
2024-12-26 19:31:45 +01:00
"updated_at": "2024-12-26T13:05:44Z",
"pushed_at": "2024-12-26T13:05:41Z",
2024-12-26 01:31:44 +01:00
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
2024-12-26 19:31:45 +01:00
"subscribers_count": 2
2023-06-19 10:13:15 +02:00
}
]