2023-01-07 09:35:14 +09:00
[
{
"id" : 54610074 ,
"name" : "CVE-2015-1805" ,
"full_name" : "panyu6325\/CVE-2015-1805" ,
"owner" : {
"login" : "panyu6325" ,
"id" : 18021466 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18021466?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/panyu6325" ,
"user_view_type" : "public"
2023-01-07 09:35:14 +09:00
} ,
"html_url" : "https:\/\/github.com\/panyu6325\/CVE-2015-1805" ,
"description" : null ,
"fork" : false ,
"created_at" : "2016-03-24T02:55:09Z" ,
2023-09-27 21:50:10 +09:00
"updated_at" : "2023-09-27T08:05:00Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2016-04-20T03:52:22Z" ,
2023-09-27 21:50:10 +09:00
"stargazers_count" : 31 ,
"watchers_count" : 31 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2023-05-11 03:29:06 +09:00
"forks_count" : 29 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-05-11 03:29:06 +09:00
"forks" : 29 ,
2023-09-27 21:50:10 +09:00
"watchers" : 31 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 4
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 55229693 ,
"name" : "iovyroot" ,
"full_name" : "dosomder\/iovyroot" ,
"owner" : {
"login" : "dosomder" ,
"id" : 3040570 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/3040570?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/dosomder" ,
"user_view_type" : "public"
2023-01-07 09:35:14 +09:00
} ,
"html_url" : "https:\/\/github.com\/dosomder\/iovyroot" ,
"description" : "CVE-2015-1805 root tool" ,
"fork" : false ,
"created_at" : "2016-04-01T12:10:14Z" ,
2024-11-21 09:31:25 +09:00
"updated_at" : "2024-11-20T19:18:22Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2017-11-23T20:55:03Z" ,
2024-11-10 10:31:12 +09:00
"stargazers_count" : 270 ,
"watchers_count" : 270 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2024-04-18 09:30:57 +09:00
"forks_count" : 150 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-04-18 09:30:57 +09:00
"forks" : 150 ,
2024-11-10 10:31:12 +09:00
"watchers" : 270 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
2024-03-19 03:26:59 +09:00
"subscribers_count" : 19
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 62271946 ,
"name" : "cve-2015-1805" ,
"full_name" : "FloatingGuy\/cve-2015-1805" ,
"owner" : {
"login" : "FloatingGuy" ,
"id" : 6472909 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/6472909?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/FloatingGuy" ,
"user_view_type" : "public"
2023-01-07 09:35:14 +09:00
} ,
"html_url" : "https:\/\/github.com\/FloatingGuy\/cve-2015-1805" ,
"description" : null ,
"fork" : false ,
"created_at" : "2016-06-30T02:13:26Z" ,
"updated_at" : "2021-11-01T07:27:37Z" ,
"pushed_at" : "2016-06-30T03:01:22Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 3 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
2023-12-12 03:44:54 +09:00
"subscribers_count" : 3
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 155538729 ,
"name" : "iovy_root_research" ,
"full_name" : "mobilelinux\/iovy_root_research" ,
"owner" : {
"login" : "mobilelinux" ,
"id" : 4749010 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4749010?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/mobilelinux" ,
"user_view_type" : "public"
2023-01-07 09:35:14 +09:00
} ,
"html_url" : "https:\/\/github.com\/mobilelinux\/iovy_root_research" ,
"description" : "A root tool based on the [CVE-2015-1805 vulnerability](https:\/\/access.redhat.com\/security\/cve\/cve-2015-1805) It supports 32 and 64bit, get sys call table address via swi." ,
"fork" : false ,
"created_at" : "2018-10-31T10:26:15Z" ,
"updated_at" : "2018-10-31T10:44:18Z" ,
"pushed_at" : "2018-11-01T14:59:30Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 2
2023-06-19 17:13:15 +09:00
} ,
{
"id" : 600898813 ,
"name" : "Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805" ,
"full_name" : "ireshchaminda1\/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805" ,
"owner" : {
"login" : "ireshchaminda1" ,
"id" : 123410545 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/123410545?v=4" ,
2024-10-18 09:30:24 +09:00
"html_url" : "https:\/\/github.com\/ireshchaminda1" ,
"user_view_type" : "public"
2023-06-19 17:13:15 +09:00
} ,
"html_url" : "https:\/\/github.com\/ireshchaminda1\/Android-Privilege-Escalation-Remote-Access-Vulnerability-CVE-2015-1805" ,
"description" : "AndroRAT is a capability that can be used to inject a root exploit as a silent installation to perform a malicious task on the device. This AndroRAT is designed to exploit CVE-2015-1805, a vulnerability that was discovered and made public in 2016." ,
"fork" : false ,
"created_at" : "2023-02-12T23:00:18Z" ,
2024-10-02 15:30:57 +09:00
"updated_at" : "2024-10-02T01:17:12Z" ,
2023-06-19 17:13:15 +09:00
"pushed_at" : "2023-02-12T23:14:00Z" ,
2024-10-02 15:30:57 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-06-19 17:13:15 +09:00
"has_discussions" : false ,
2023-12-16 03:43:33 +09:00
"forks_count" : 0 ,
2023-06-19 17:13:15 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-12-16 03:43:33 +09:00
"forks" : 0 ,
2024-10-02 15:30:57 +09:00
"watchers" : 3 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 09:35:14 +09:00
}
]