2020-06-21 05:07:51 +02:00
[
2020-08-06 05:08:30 +02:00
{
"id" : 203542766 ,
"name" : "CVE-2019-11510" ,
"full_name" : "projectzeroindia\/CVE-2019-11510" ,
"owner" : {
"login" : "projectzeroindia" ,
"id" : 54312442 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4" ,
2020-08-06 05:08:30 +02:00
"html_url" : "https:\/\/github.com\/projectzeroindia"
} ,
"html_url" : "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510" ,
"description" : "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)" ,
"fork" : false ,
"created_at" : "2019-08-21T08:40:26Z" ,
2021-04-07 17:11:10 +02:00
"updated_at" : "2021-04-07T14:49:11Z" ,
2020-08-06 05:08:30 +02:00
"pushed_at" : "2020-01-11T13:55:33Z" ,
2021-04-07 17:11:10 +02:00
"stargazers_count" : 342 ,
"watchers_count" : 342 ,
2021-02-14 10:09:13 +01:00
"forks_count" : 137 ,
"forks" : 137 ,
2021-04-07 17:11:10 +02:00
"watchers" : 342 ,
2020-08-06 05:08:30 +02:00
"score" : 0
} ,
{
"id" : 207348255 ,
"name" : "pwn-pulse" ,
"full_name" : "BishopFox\/pwn-pulse" ,
"owner" : {
"login" : "BishopFox" ,
"id" : 4523757 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4" ,
2020-08-06 05:08:30 +02:00
"html_url" : "https:\/\/github.com\/BishopFox"
} ,
"html_url" : "https:\/\/github.com\/BishopFox\/pwn-pulse" ,
"description" : "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)" ,
"fork" : false ,
"created_at" : "2019-09-09T15:58:39Z" ,
2021-03-02 10:09:21 +01:00
"updated_at" : "2021-03-02T04:35:42Z" ,
2020-08-06 05:08:30 +02:00
"pushed_at" : "2020-01-15T17:01:50Z" ,
2021-03-02 10:09:21 +01:00
"stargazers_count" : 108 ,
"watchers_count" : 108 ,
2021-01-24 22:09:42 +01:00
"forks_count" : 50 ,
"forks" : 50 ,
2021-03-02 10:09:21 +01:00
"watchers" : 108 ,
2020-08-06 05:08:30 +02:00
"score" : 0
} ,
2020-06-21 05:07:51 +02:00
{
"id" : 226548291 ,
"name" : "pulsexploit" ,
"full_name" : "aqhmal\/pulsexploit" ,
"owner" : {
"login" : "aqhmal" ,
"id" : 22043590 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/aqhmal"
} ,
"html_url" : "https:\/\/github.com\/aqhmal\/pulsexploit" ,
"description" : "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script." ,
"fork" : false ,
"created_at" : "2019-12-07T17:09:24Z" ,
2021-02-01 04:09:42 +01:00
"updated_at" : "2021-02-01T00:34:37Z" ,
2020-06-21 05:07:51 +02:00
"pushed_at" : "2020-04-25T05:06:45Z" ,
2021-02-01 04:09:42 +01:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 3 ,
"forks" : 3 ,
"watchers" : 3 ,
2020-06-21 05:07:51 +02:00
"score" : 0
} ,
{
"id" : 256271162 ,
"name" : "check-your-pulse" ,
"full_name" : "cisagov\/check-your-pulse" ,
"owner" : {
"login" : "cisagov" ,
"id" : 18539691 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4" ,
2020-06-21 05:07:51 +02:00
"html_url" : "https:\/\/github.com\/cisagov"
} ,
"html_url" : "https:\/\/github.com\/cisagov\/check-your-pulse" ,
"description" : "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510." ,
"fork" : false ,
"created_at" : "2020-04-16T16:32:47Z" ,
2021-03-11 04:09:39 +01:00
"updated_at" : "2021-03-10T22:46:37Z" ,
2020-08-20 05:08:33 +02:00
"pushed_at" : "2020-08-19T22:44:06Z" ,
2021-03-11 04:09:39 +01:00
"stargazers_count" : 21 ,
"watchers_count" : 21 ,
2020-10-21 11:09:06 +02:00
"forks_count" : 6 ,
"forks" : 6 ,
2021-03-11 04:09:39 +01:00
"watchers" : 21 ,
2020-06-21 05:07:51 +02:00
"score" : 0
2020-07-27 17:10:13 +02:00
} ,
{
"id" : 282932489 ,
"name" : "pulse-exploit" ,
"full_name" : "andripwn\/pulse-exploit" ,
"owner" : {
"login" : "andripwn" ,
"id" : 52893492 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4" ,
2020-07-27 17:10:13 +02:00
"html_url" : "https:\/\/github.com\/andripwn"
} ,
"html_url" : "https:\/\/github.com\/andripwn\/pulse-exploit" ,
"description" : "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API." ,
"fork" : false ,
"created_at" : "2020-07-27T15:06:08Z" ,
2020-12-13 16:09:45 +01:00
"updated_at" : "2020-12-13T12:56:51Z" ,
2020-07-27 17:10:13 +02:00
"pushed_at" : "2020-07-27T15:07:24Z" ,
2020-12-13 16:09:45 +01:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-07-27 17:10:13 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-12-13 16:09:45 +01:00
"watchers" : 1 ,
2020-07-27 17:10:13 +02:00
"score" : 0
2020-09-17 23:09:32 +02:00
} ,
{
"id" : 296402155 ,
"name" : "CVE-2019-11510-PulseVPN" ,
2020-10-20 23:08:37 +02:00
"full_name" : "pwn3z\/CVE-2019-11510-PulseVPN" ,
2020-09-17 23:09:32 +02:00
"owner" : {
2020-10-20 23:08:37 +02:00
"login" : "pwn3z" ,
2020-09-17 23:09:32 +02:00
"id" : 71440287 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4" ,
2020-10-20 23:08:37 +02:00
"html_url" : "https:\/\/github.com\/pwn3z"
2020-09-17 23:09:32 +02:00
} ,
2020-10-20 23:08:37 +02:00
"html_url" : "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN" ,
2020-09-17 23:09:32 +02:00
"description" : null ,
"fork" : false ,
"created_at" : "2020-09-17T17:53:56Z" ,
2020-11-06 04:09:07 +01:00
"updated_at" : "2020-11-05T21:41:20Z" ,
"pushed_at" : "2020-11-05T21:41:18Z" ,
2020-09-20 17:08:13 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-09-17 23:09:32 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-09-20 17:08:13 +02:00
"watchers" : 1 ,
2020-09-17 23:09:32 +02:00
"score" : 0
2020-06-21 05:07:51 +02:00
}
]