2019-12-08 22:19:20 +09:00
[
2021-04-12 12:11:05 +09:00
{
"id" : 106299703 ,
"name" : "CVE-2017-0781" ,
"full_name" : "ojasookert\/CVE-2017-0781" ,
"owner" : {
"login" : "ojasookert" ,
"id" : 12931198 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4" ,
"html_url" : "https:\/\/github.com\/ojasookert"
} ,
"html_url" : "https:\/\/github.com\/ojasookert\/CVE-2017-0781" ,
"description" : "Blueborne CVE-2017-0781 Android heap overflow vulnerability" ,
"fork" : false ,
"created_at" : "2017-10-09T15:13:25Z" ,
"updated_at" : "2021-02-13T17:52:38Z" ,
"pushed_at" : "2017-10-09T15:20:11Z" ,
"stargazers_count" : 74 ,
"watchers_count" : 74 ,
"forks_count" : 37 ,
"forks" : 37 ,
"watchers" : 74 ,
"score" : 0
} ,
{
"id" : 125669064 ,
"name" : "android712-blueborne" ,
"full_name" : "marcinguy\/android712-blueborne" ,
"owner" : {
"login" : "marcinguy" ,
"id" : 20355405 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4" ,
"html_url" : "https:\/\/github.com\/marcinguy"
} ,
"html_url" : "https:\/\/github.com\/marcinguy\/android712-blueborne" ,
"description" : "Android Blueborne RCE CVE-2017-0781" ,
"fork" : false ,
"created_at" : "2018-03-17T21:07:24Z" ,
"updated_at" : "2020-12-14T00:02:06Z" ,
"pushed_at" : "2018-04-04T12:59:18Z" ,
"stargazers_count" : 68 ,
"watchers_count" : 68 ,
"forks_count" : 23 ,
"forks" : 23 ,
"watchers" : 68 ,
"score" : 0
} ,
2020-08-10 18:08:39 +09:00
{
"id" : 283876725 ,
"name" : "BlueborneDetection" ,
"full_name" : "mjancek\/BlueborneDetection" ,
"owner" : {
"login" : "mjancek" ,
"id" : 32901382 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/32901382?v=4" ,
2020-08-10 18:08:39 +09:00
"html_url" : "https:\/\/github.com\/mjancek"
} ,
"html_url" : "https:\/\/github.com\/mjancek\/BlueborneDetection" ,
"description" : "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. " ,
"fork" : false ,
"created_at" : "2020-07-30T21:06:19Z" ,
2021-05-01 00:11:25 +09:00
"updated_at" : "2021-04-30T12:44:56Z" ,
"pushed_at" : "2021-04-30T12:44:54Z" ,
2020-08-10 18:08:39 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-10-12 18:09:36 +09:00
} ,
{
"id" : 303310240 ,
"name" : "Blue-Borne" ,
"full_name" : "CrackSoft900\/Blue-Borne" ,
"owner" : {
"login" : "CrackSoft900" ,
"id" : 69074572 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/69074572?v=4" ,
2020-10-12 18:09:36 +09:00
"html_url" : "https:\/\/github.com\/CrackSoft900"
} ,
"html_url" : "https:\/\/github.com\/CrackSoft900\/Blue-Borne" ,
"description" : "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:" ,
"fork" : false ,
"created_at" : "2020-10-12T07:21:08Z" ,
"updated_at" : "2020-10-12T07:22:47Z" ,
2020-11-05 06:09:16 +09:00
"pushed_at" : "2020-11-04T16:49:05Z" ,
2020-10-12 18:09:36 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 22:19:20 +09:00
}
]