2019-12-08 14:19:20 +01:00
[
2020-04-05 05:07:47 +02:00
{
"id" : 212541592 ,
"name" : "CVE-2019-11932" ,
"full_name" : "dorkerdevil\/CVE-2019-11932" ,
"owner" : {
"login" : "dorkerdevil" ,
"id" : 15796745 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4" ,
"html_url" : "https:\/\/github.com\/dorkerdevil"
} ,
"html_url" : "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932" ,
"description" : " double-free bug in WhatsApp exploit poc" ,
"fork" : false ,
"created_at" : "2019-10-03T09:26:24Z" ,
"updated_at" : "2020-03-29T02:31:11Z" ,
"pushed_at" : "2019-10-03T09:43:55Z" ,
"stargazers_count" : 241 ,
"watchers_count" : 241 ,
"forks_count" : 74 ,
"forks" : 74 ,
"watchers" : 241 ,
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
"id" : 212824676 ,
"name" : "WhatsRCE" ,
"full_name" : "KeepWannabe\/WhatsRCE" ,
"owner" : {
"login" : "KeepWannabe" ,
"id" : 31374361 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/31374361?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/KeepWannabe"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/KeepWannabe\/WhatsRCE" ,
"description" : "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)" ,
"fork" : false ,
"created_at" : "2019-10-04T13:45:44Z" ,
2020-04-16 11:07:52 +02:00
"updated_at" : "2020-04-16T08:55:46Z" ,
2019-12-15 04:30:01 +01:00
"pushed_at" : "2019-12-13T19:07:53Z" ,
2020-04-16 11:07:52 +02:00
"stargazers_count" : 65 ,
"watchers_count" : 65 ,
2020-04-06 11:07:54 +02:00
"forks_count" : 23 ,
"forks" : 23 ,
2020-04-16 11:07:52 +02:00
"watchers" : 65 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 212837105 ,
"name" : "CVE-2019-11932" ,
"full_name" : "awakened1712\/CVE-2019-11932" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "awakened1712" ,
"id" : 628212 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/628212?v=4" ,
"html_url" : "https:\/\/github.com\/awakened1712"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/awakened1712\/CVE-2019-11932" ,
"description" : "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-10-04T14:43:57Z" ,
2020-04-16 11:07:52 +02:00
"updated_at" : "2020-04-16T03:39:27Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-11-30T10:28:01Z" ,
2020-04-16 11:07:52 +02:00
"stargazers_count" : 114 ,
"watchers_count" : 114 ,
2020-04-01 05:07:58 +02:00
"forks_count" : 57 ,
"forks" : 57 ,
2020-04-16 11:07:52 +02:00
"watchers" : 114 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
2020-04-05 05:07:47 +02:00
{
"id" : 212954402 ,
"name" : "CVE-2019-11932" ,
"full_name" : "TulungagungCyberLink\/CVE-2019-11932" ,
"owner" : {
"login" : "TulungagungCyberLink" ,
"id" : 46483873 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/46483873?v=4" ,
"html_url" : "https:\/\/github.com\/TulungagungCyberLink"
} ,
"html_url" : "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932" ,
"description" : "Double-Free BUG in WhatsApp exploit poc." ,
"fork" : false ,
"created_at" : "2019-10-05T06:24:08Z" ,
"updated_at" : "2019-11-03T03:01:39Z" ,
"pushed_at" : "2019-10-08T06:17:40Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0
} ,
{
"id" : 213187543 ,
"name" : "CVE-2019-11932" ,
"full_name" : "infiniteLoopers\/CVE-2019-11932" ,
"owner" : {
"login" : "infiniteLoopers" ,
"id" : 27885817 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/27885817?v=4" ,
"html_url" : "https:\/\/github.com\/infiniteLoopers"
} ,
"html_url" : "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-10-06T14:54:35Z" ,
"updated_at" : "2019-10-18T20:41:54Z" ,
"pushed_at" : "2019-10-06T15:34:22Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 3 ,
"forks" : 3 ,
"watchers" : 3 ,
"score" : 0
} ,
2019-12-08 14:19:20 +01:00
{
2019-12-12 06:14:27 +01:00
"id" : 213971107 ,
2019-12-08 14:19:20 +01:00
"name" : "CVE-2019-11932" ,
2019-12-12 06:14:27 +01:00
"full_name" : "alexanderstonec\/CVE-2019-11932" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "alexanderstonec" ,
"id" : 52692998 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/52692998?v=4" ,
"html_url" : "https:\/\/github.com\/alexanderstonec"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/alexanderstonec\/CVE-2019-11932" ,
"description" : "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244" ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-10-09T16:41:38Z" ,
2020-03-19 04:07:17 +01:00
"updated_at" : "2020-03-19T03:06:30Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-10-09T17:00:02Z" ,
2020-03-19 04:07:17 +01:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2019-12-12 06:14:27 +01:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-03-19 04:07:17 +01:00
"watchers" : 6 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
2019-12-12 06:14:27 +01:00
"id" : 215516489 ,
"name" : "CVE-2019-11932-SupportApp" ,
"full_name" : "valbrux\/CVE-2019-11932-SupportApp" ,
2019-12-08 14:19:20 +01:00
"owner" : {
2019-12-12 06:14:27 +01:00
"login" : "valbrux" ,
"id" : 20357515 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/20357515?v=4" ,
"html_url" : "https:\/\/github.com\/valbrux"
2019-12-08 14:19:20 +01:00
} ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp" ,
"description" : "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. " ,
2019-12-08 14:19:20 +01:00
"fork" : false ,
2019-12-12 06:14:27 +01:00
"created_at" : "2019-10-16T10:04:30Z" ,
2020-04-16 11:07:52 +02:00
"updated_at" : "2020-04-16T08:54:56Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-10-16T12:20:53Z" ,
2020-04-16 11:07:52 +02:00
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
2020-03-21 22:07:27 +01:00
"forks_count" : 9 ,
"forks" : 9 ,
2020-04-16 11:07:52 +02:00
"watchers" : 19 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2019-12-08 14:19:20 +01:00
} ,
{
"id" : 215635890 ,
"name" : "CVE-2019-11932" ,
"full_name" : "fastmo\/CVE-2019-11932" ,
"owner" : {
"login" : "fastmo" ,
"id" : 53575270 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/53575270?v=4" ,
2019-12-12 06:14:27 +01:00
"html_url" : "https:\/\/github.com\/fastmo"
2019-12-08 14:19:20 +01:00
} ,
"html_url" : "https:\/\/github.com\/fastmo\/CVE-2019-11932" ,
"description" : "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto." ,
"fork" : false ,
"created_at" : "2019-10-16T20:13:23Z" ,
2020-03-30 05:08:37 +02:00
"updated_at" : "2020-03-30T02:16:58Z" ,
2019-12-08 14:19:20 +01:00
"pushed_at" : "2019-10-16T20:24:56Z" ,
2019-12-31 10:30:02 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-03-30 05:08:37 +02:00
"forks_count" : 3 ,
"forks" : 3 ,
2019-12-31 10:30:02 +01:00
"watchers" : 1 ,
2019-12-12 06:14:27 +01:00
"score" : 0
} ,
{
"id" : 217001772 ,
"name" : "CVE-2019-11932-whatsApp-exploit" ,
"full_name" : "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit" ,
"owner" : {
"login" : "mRanonyMousTZ" ,
"id" : 38766899 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/38766899?v=4" ,
"html_url" : "https:\/\/github.com\/mRanonyMousTZ"
} ,
"html_url" : "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit" ,
"description" : "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/" ,
"fork" : false ,
"created_at" : "2019-10-23T08:02:15Z" ,
2020-04-16 11:07:52 +02:00
"updated_at" : "2020-04-16T03:39:45Z" ,
2019-12-12 06:14:27 +01:00
"pushed_at" : "2019-10-23T08:25:48Z" ,
2020-04-16 11:07:52 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2020-04-06 11:07:54 +02:00
"forks_count" : 4 ,
"forks" : 4 ,
2020-04-16 11:07:52 +02:00
"watchers" : 5 ,
2019-12-09 16:05:38 +01:00
"score" : 0
2020-01-06 22:30:02 +01:00
} ,
{
"id" : 228222453 ,
"name" : "CVE-2019-11932" ,
"full_name" : "SmoZy92\/CVE-2019-11932" ,
"owner" : {
"login" : "SmoZy92" ,
"id" : 58377338 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/58377338?v=4" ,
"html_url" : "https:\/\/github.com\/SmoZy92"
} ,
"html_url" : "https:\/\/github.com\/SmoZy92\/CVE-2019-11932" ,
"description" : null ,
"fork" : false ,
"created_at" : "2019-12-15T17:21:26Z" ,
2020-02-12 04:07:28 +01:00
"updated_at" : "2020-02-12T00:00:14Z" ,
2020-01-06 22:30:02 +01:00
"pushed_at" : "2019-12-15T17:40:15Z" ,
2020-02-12 04:07:28 +01:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2020-01-06 22:30:02 +01:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-02-12 04:07:28 +01:00
"watchers" : 5 ,
2020-01-06 22:30:02 +01:00
"score" : 0
2020-03-28 04:07:11 +01:00
} ,
{
"id" : 239654888 ,
"name" : "https-github.com-awakened171" ,
"full_name" : "dashtic172\/https-github.com-awakened171" ,
"owner" : {
"login" : "dashtic172" ,
"id" : 60906735 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/60906735?v=4" ,
"html_url" : "https:\/\/github.com\/dashtic172"
} ,
"html_url" : "https:\/\/github.com\/dashtic172\/https-github.com-awakened171" ,
"description" : "https:\/\/github.com\/awakened1712\/CVE-2019-11932" ,
"fork" : false ,
"created_at" : "2020-02-11T02:00:14Z" ,
"updated_at" : "2020-02-11T02:00:14Z" ,
"pushed_at" : "2020-02-11T02:00:15Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]