PoC-in-GitHub/2015/CVE-2015-0204.json

25 lines
1.5 KiB
JSON
Raw Normal View History

2020-12-26 04:09:07 +01:00
[
2021-01-01 16:09:36 +01:00
{
"id": 325974459,
"name": "A2SV--SSL-VUL-Scan",
"full_name": "nyctophile6\/A2SV--SSL-VUL-Scan",
"owner": {
"login": "nyctophile6",
"id": 75995332,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/75995332?v=4",
"html_url": "https:\/\/github.com\/nyctophile6"
},
"html_url": "https:\/\/github.com\/nyctophile6\/A2SV--SSL-VUL-Scan",
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2021-01-01T12:26:12Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-12-26 04:09:07 +01:00
}
]