2023-09-02 09:24:03 +09:00
[
{
"id" : 391818469 ,
"name" : "CVE-2021-31630-OpenPLC_RCE" ,
2023-12-11 15:35:15 +09:00
"full_name" : "hev0x\/CVE-2021-31630-OpenPLC_RCE" ,
2023-09-02 09:24:03 +09:00
"owner" : {
2023-12-11 15:35:15 +09:00
"login" : "hev0x" ,
2023-09-02 09:24:03 +09:00
"id" : 6265911 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4" ,
2023-12-11 15:35:15 +09:00
"html_url" : "https:\/\/github.com\/hev0x"
2023-09-02 09:24:03 +09:00
} ,
2023-12-11 15:35:15 +09:00
"html_url" : "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE" ,
2023-09-02 09:24:03 +09:00
"description" : "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver" ,
"fork" : false ,
"created_at" : "2021-08-02T04:48:24Z" ,
2023-09-28 21:53:01 +09:00
"updated_at" : "2023-09-28T11:30:04Z" ,
2023-09-02 09:24:03 +09:00
"pushed_at" : "2021-08-02T04:48:25Z" ,
2023-09-28 21:53:01 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-09-02 09:24:03 +09:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2023-09-28 21:53:01 +09:00
"watchers" : 3 ,
2023-09-02 09:24:03 +09:00
"score" : 0 ,
"subscribers_count" : 2
2024-03-21 09:26:53 +09:00
} ,
{
"id" : 775165945 ,
"name" : "CVE-2021-31630-HTB" ,
"full_name" : "Hunt3r0x\/CVE-2021-31630-HTB" ,
"owner" : {
"login" : "Hunt3r0x" ,
"id" : 106396603 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4" ,
"html_url" : "https:\/\/github.com\/Hunt3r0x"
} ,
"html_url" : "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB" ,
"description" : "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform." ,
"fork" : false ,
"created_at" : "2024-03-20T22:02:53Z" ,
2024-04-30 09:32:48 +09:00
"updated_at" : "2024-04-29T20:28:31Z" ,
2024-03-22 03:27:15 +09:00
"pushed_at" : "2024-03-21T15:50:45Z" ,
2024-04-30 09:32:48 +09:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2024-03-21 09:26:53 +09:00
"has_discussions" : false ,
2024-04-30 21:35:02 +09:00
"forks_count" : 1 ,
2024-03-21 09:26:53 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-04-30 21:35:02 +09:00
"forks" : 1 ,
2024-04-30 09:32:48 +09:00
"watchers" : 5 ,
2024-03-21 09:26:53 +09:00
"score" : 0 ,
2024-03-22 15:26:48 +09:00
"subscribers_count" : 1
2024-03-29 09:26:36 +09:00
} ,
{
"id" : 779013491 ,
"name" : "cve-2021-31630" ,
"full_name" : "thewhiteh4t\/cve-2021-31630" ,
"owner" : {
"login" : "thewhiteh4t" ,
"id" : 36354846 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4" ,
"html_url" : "https:\/\/github.com\/thewhiteh4t"
} ,
"html_url" : "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630" ,
"description" : "Python script for exploiting command injection in Open PLC Webserver v3" ,
"fork" : false ,
"created_at" : "2024-03-28T21:31:45Z" ,
2024-05-14 03:28:59 +09:00
"updated_at" : "2024-05-13T15:07:00Z" ,
2024-03-29 09:26:36 +09:00
"pushed_at" : "2024-03-28T22:14:23Z" ,
2024-05-14 03:28:59 +09:00
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
2024-03-29 09:26:36 +09:00
"has_discussions" : false ,
2024-04-30 21:35:02 +09:00
"forks_count" : 2 ,
2024-03-29 09:26:36 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"exploit" ,
"openplc" ,
"rce"
] ,
"visibility" : "public" ,
2024-04-30 21:35:02 +09:00
"forks" : 2 ,
2024-05-14 03:28:59 +09:00
"watchers" : 8 ,
2024-03-31 03:27:18 +09:00
"score" : 0 ,
2024-04-20 09:31:14 +09:00
"subscribers_count" : 2
2024-04-16 03:28:06 +09:00
} ,
{
"id" : 786978803 ,
"name" : "CVE-2021-31630" ,
"full_name" : "mind2hex\/CVE-2021-31630" ,
"owner" : {
"login" : "mind2hex" ,
"id" : 51345640 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4" ,
"html_url" : "https:\/\/github.com\/mind2hex"
} ,
"html_url" : "https:\/\/github.com\/mind2hex\/CVE-2021-31630" ,
"description" : "OpenPLC 3 WebServer Authenticated Remote Code Execution." ,
"fork" : false ,
"created_at" : "2024-04-15T16:55:30Z" ,
"updated_at" : "2024-04-15T16:56:49Z" ,
"pushed_at" : "2024-04-15T17:07:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
2024-04-16 09:29:21 +09:00
"subscribers_count" : 1
2024-05-14 03:28:59 +09:00
} ,
{
"id" : 800033894 ,
"name" : "CVE-2021-31630-PoC" ,
"full_name" : "sealldeveloper\/CVE-2021-31630-PoC" ,
"owner" : {
"login" : "sealldeveloper" ,
"id" : 120470330 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4" ,
"html_url" : "https:\/\/github.com\/sealldeveloper"
} ,
"html_url" : "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC" ,
"description" : "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary." ,
"fork" : false ,
"created_at" : "2024-05-13T15:17:38Z" ,
"updated_at" : "2024-05-13T15:21:58Z" ,
"pushed_at" : "2024-05-13T15:21:54Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 0
2023-09-02 09:24:03 +09:00
}
]