2022-07-04 14:18:14 +02:00
[
{
"id" : 406167128 ,
"name" : "Sashimi-Evil-OctoBot-Tentacle" ,
"full_name" : "Nwqda\/Sashimi-Evil-OctoBot-Tentacle" ,
"owner" : {
"login" : "Nwqda" ,
"id" : 89986678 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89986678?v=4" ,
"html_url" : "https:\/\/github.com\/Nwqda"
} ,
"html_url" : "https:\/\/github.com\/Nwqda\/Sashimi-Evil-OctoBot-Tentacle" ,
"description" : "Script PoC that exploits the Tentacles upload functionality of OctoBot trading bot and which leads to a remote code execution (RCE). CVE-2021-36711" ,
"fork" : false ,
"created_at" : "2021-09-14T00:10:30Z" ,
"updated_at" : "2022-07-04T11:27:33Z" ,
2022-07-09 08:34:51 +02:00
"pushed_at" : "2022-07-09T05:48:05Z" ,
2022-07-04 14:18:14 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2022-07-26 08:16:42 +02:00
"forks_count" : 2 ,
2022-07-04 14:18:14 +02:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cryptobot" ,
"cryptocurrency" ,
"infosec" ,
"octobot" ,
"payloads" ,
"poc" ,
"rce" ,
"remote-code-execution" ,
"tentacles" ,
"trading-bot" ,
"vulnerability"
] ,
"visibility" : "public" ,
2022-07-26 08:16:42 +02:00
"forks" : 2 ,
2022-07-04 14:18:14 +02:00
"watchers" : 1 ,
"score" : 0
}
]