2024-11-28 19:31:51 +01:00
[
{
"id" : 391818469 ,
"name" : "CVE-2021-31630-OpenPLC_RCE" ,
"full_name" : "hev0x\/CVE-2021-31630-OpenPLC_RCE" ,
"owner" : {
"login" : "hev0x" ,
"id" : 6265911 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4" ,
"html_url" : "https:\/\/github.com\/hev0x" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE" ,
"description" : "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver" ,
"fork" : false ,
"created_at" : "2021-08-02T04:48:24Z" ,
"updated_at" : "2024-08-12T20:15:12Z" ,
"pushed_at" : "2021-08-02T04:48:25Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 775165945 ,
"name" : "CVE-2021-31630-HTB" ,
"full_name" : "Hunt3r0x\/CVE-2021-31630-HTB" ,
"owner" : {
"login" : "Hunt3r0x" ,
"id" : 106396603 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4" ,
"html_url" : "https:\/\/github.com\/Hunt3r0x" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB" ,
"description" : "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform." ,
"fork" : false ,
"created_at" : "2024-03-20T22:02:53Z" ,
"updated_at" : "2024-11-20T19:01:18Z" ,
"pushed_at" : "2024-03-21T15:50:45Z" ,
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 9 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 779013491 ,
"name" : "cve-2021-31630" ,
"full_name" : "thewhiteh4t\/cve-2021-31630" ,
"owner" : {
"login" : "thewhiteh4t" ,
"id" : 36354846 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4" ,
"html_url" : "https:\/\/github.com\/thewhiteh4t" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630" ,
"description" : "Python script for exploiting command injection in Open PLC Webserver v3" ,
"fork" : false ,
"created_at" : "2024-03-28T21:31:45Z" ,
"updated_at" : "2024-10-29T02:45:45Z" ,
"pushed_at" : "2024-07-12T00:16:13Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 5 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"exploit" ,
"openplc" ,
"rce"
] ,
"visibility" : "public" ,
"forks" : 5 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 782064396 ,
"name" : "htb-wifinetictwo-exploit" ,
"full_name" : "behindsecurity\/htb-wifinetictwo-exploit" ,
"owner" : {
"login" : "behindsecurity" ,
"id" : 32421959 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32421959?v=4" ,
"html_url" : "https:\/\/github.com\/behindsecurity" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/behindsecurity\/htb-wifinetictwo-exploit" ,
"description" : "A simple python script to exploit CVE-2021-31630 on HTB WifineticTwo CTF" ,
"fork" : false ,
"created_at" : "2024-04-04T15:12:57Z" ,
"updated_at" : "2024-09-18T21:06:48Z" ,
"pushed_at" : "2024-04-04T16:29:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 786978803 ,
"name" : "CVE-2021-31630" ,
"full_name" : "mind2hex\/CVE-2021-31630" ,
"owner" : {
"login" : "mind2hex" ,
"id" : 51345640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4" ,
"html_url" : "https:\/\/github.com\/mind2hex" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/mind2hex\/CVE-2021-31630" ,
"description" : "OpenPLC 3 WebServer Authenticated Remote Code Execution." ,
"fork" : false ,
"created_at" : "2024-04-15T16:55:30Z" ,
"updated_at" : "2024-04-15T16:56:49Z" ,
"pushed_at" : "2024-04-15T17:07:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 800033894 ,
"name" : "CVE-2021-31630-PoC" ,
"full_name" : "sealldeveloper\/CVE-2021-31630-PoC" ,
"owner" : {
"login" : "sealldeveloper" ,
"id" : 120470330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4" ,
"html_url" : "https:\/\/github.com\/sealldeveloper" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC" ,
"description" : "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary." ,
"fork" : false ,
"created_at" : "2024-05-13T15:17:38Z" ,
"updated_at" : "2024-05-13T15:21:58Z" ,
"pushed_at" : "2024-05-13T15:21:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 810053844 ,
"name" : "CVE-2021-31630" ,
"full_name" : "junnythemarksman\/CVE-2021-31630" ,
"owner" : {
"login" : "junnythemarksman" ,
"id" : 20056452 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4" ,
"html_url" : "https:\/\/github.com\/junnythemarksman" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/junnythemarksman\/CVE-2021-31630" ,
"description" : "Modified the PoC CVE-2021-31630 script by Fellipe Oliveira for HTB " ,
"fork" : false ,
"created_at" : "2024-06-04T00:44:47Z" ,
"updated_at" : "2024-06-04T00:46:34Z" ,
"pushed_at" : "2024-06-04T00:46:31Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 818448931 ,
"name" : "cve-2021-31630" ,
2024-12-24 01:31:38 +01:00
"full_name" : "ttps-byte\/cve-2021-31630" ,
2024-11-28 19:31:51 +01:00
"owner" : {
2024-12-24 01:31:38 +01:00
"login" : "ttps-byte" ,
2024-11-28 19:31:51 +01:00
"id" : 76139191 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4" ,
2024-12-24 01:31:38 +01:00
"html_url" : "https:\/\/github.com\/ttps-byte" ,
2024-11-28 19:31:51 +01:00
"user_view_type" : "public"
} ,
2024-12-24 01:31:38 +01:00
"html_url" : "https:\/\/github.com\/ttps-byte\/cve-2021-31630" ,
2024-11-28 19:31:51 +01:00
"description" : "This is a automation of cve-2021-31630 exploitation" ,
"fork" : false ,
"created_at" : "2024-06-21T22:10:49Z" ,
"updated_at" : "2024-06-29T17:40:49Z" ,
"pushed_at" : "2024-06-29T17:40:46Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 833217533 ,
"name" : "CVE-2021-31630" ,
"full_name" : "manuelsantosiglesias\/CVE-2021-31630" ,
"owner" : {
"login" : "manuelsantosiglesias" ,
"id" : 29311335 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29311335?v=4" ,
"html_url" : "https:\/\/github.com\/manuelsantosiglesias" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/manuelsantosiglesias\/CVE-2021-31630" ,
"description" : "OpenPLC 3 WebServer Authenticated Remote Code Execution." ,
"fork" : false ,
"created_at" : "2024-07-24T15:28:47Z" ,
"updated_at" : "2024-07-24T16:22:41Z" ,
"pushed_at" : "2024-07-24T16:22:38Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 834167517 ,
"name" : "CVE-2021-31630" ,
"full_name" : "FlojBoj\/CVE-2021-31630" ,
"owner" : {
"login" : "FlojBoj" ,
"id" : 170850781 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/170850781?v=4" ,
"html_url" : "https:\/\/github.com\/FlojBoj" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/FlojBoj\/CVE-2021-31630" ,
"description" : "POC Exploit for CVE-2021-31630 written in Python3 and using C reverse shell with non-blocking mode" ,
"fork" : false ,
"created_at" : "2024-07-26T15:06:44Z" ,
"updated_at" : "2024-07-27T14:33:18Z" ,
"pushed_at" : "2024-07-27T14:33:15Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]