mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/09/29 00:10:05
This commit is contained in:
parent
c93cf6da0a
commit
00645ba0fa
25 changed files with 176 additions and 176 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2015-7547",
|
||||
"fork": false,
|
||||
"created_at": "2016-02-10T21:13:54Z",
|
||||
"updated_at": "2020-09-23T21:11:56Z",
|
||||
"updated_at": "2020-09-28T12:57:46Z",
|
||||
"pushed_at": "2016-02-20T07:57:58Z",
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 546,
|
||||
"watchers": 547,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-09-23T05:11:45Z",
|
||||
"stargazers_count": 427,
|
||||
"watchers_count": 427,
|
||||
"forks_count": 192,
|
||||
"forks": 192,
|
||||
"forks_count": 191,
|
||||
"forks": 191,
|
||||
"watchers": 427,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-03T06:14:28Z",
|
||||
"updated_at": "2020-03-05T08:20:20Z",
|
||||
"updated_at": "2020-09-28T14:29:52Z",
|
||||
"pushed_at": "2018-01-03T00:42:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-31T01:54:40Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
|
||||
"fork": false,
|
||||
"created_at": "2017-05-26T00:58:25Z",
|
||||
"updated_at": "2020-09-25T17:35:33Z",
|
||||
"updated_at": "2020-09-28T14:01:53Z",
|
||||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"stargazers_count": 247,
|
||||
"watchers_count": 247,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 246,
|
||||
"watchers": 247,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-07-24T17:54:54Z",
|
||||
"stargazers_count": 468,
|
||||
"watchers_count": 468,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"watchers": 468,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-09-23T02:27:42Z",
|
||||
"updated_at": "2020-09-28T11:09:04Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 309,
|
||||
"watchers": 310,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-08T08:26:26Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-10-30T01:48:42Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T15:01:38Z",
|
||||
"updated_at": "2020-09-27T21:04:12Z",
|
||||
"updated_at": "2020-09-28T12:14:33Z",
|
||||
"pushed_at": "2019-06-13T13:07:03Z",
|
||||
"stargazers_count": 335,
|
||||
"watchers_count": 335,
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"forks_count": 189,
|
||||
"forks": 189,
|
||||
"watchers": 335,
|
||||
"watchers": 336,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2164,14 +2164,14 @@
|
|||
{
|
||||
"id": 206928449,
|
||||
"name": "CVE-2019-0708-BlueKeep",
|
||||
"full_name": "adkinguzi\/CVE-2019-0708-BlueKeep",
|
||||
"full_name": "upknboy\/CVE-2019-0708-BlueKeep",
|
||||
"owner": {
|
||||
"login": "adkinguzi",
|
||||
"login": "upknboy",
|
||||
"id": 31617622,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4",
|
||||
"html_url": "https:\/\/github.com\/adkinguzi"
|
||||
"html_url": "https:\/\/github.com\/upknboy"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep",
|
||||
"html_url": "https:\/\/github.com\/upknboy\/CVE-2019-0708-BlueKeep",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-09-07T06:50:47Z",
|
||||
|
@ -2497,13 +2497,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-08-29T05:47:05Z",
|
||||
"updated_at": "2020-09-28T12:13:48Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 58,
|
||||
"watchers": 59,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-27T19:32:07Z",
|
||||
"updated_at": "2020-09-18T10:30:07Z",
|
||||
"updated_at": "2020-09-28T14:02:50Z",
|
||||
"pushed_at": "2020-08-27T19:33:42Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T06:32:08Z",
|
||||
"updated_at": "2020-09-11T14:56:11Z",
|
||||
"updated_at": "2020-09-28T11:10:48Z",
|
||||
"pushed_at": "2019-11-12T03:58:00Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 60,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-14T17:27:37Z",
|
||||
"updated_at": "2020-09-10T14:31:55Z",
|
||||
"updated_at": "2020-09-28T11:27:15Z",
|
||||
"pushed_at": "2019-10-15T01:04:08Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 52,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -772,13 +772,13 @@
|
|||
"description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-18T08:29:28Z",
|
||||
"updated_at": "2020-07-15T08:20:44Z",
|
||||
"updated_at": "2020-09-28T14:23:34Z",
|
||||
"pushed_at": "2020-03-18T08:57:36Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1094,13 +1094,13 @@
|
|||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-20T14:35:48Z",
|
||||
"updated_at": "2020-09-28T02:44:36Z",
|
||||
"updated_at": "2020-09-28T13:32:37Z",
|
||||
"pushed_at": "2020-06-09T20:46:45Z",
|
||||
"stargazers_count": 320,
|
||||
"watchers_count": 320,
|
||||
"stargazers_count": 321,
|
||||
"watchers_count": 321,
|
||||
"forks_count": 103,
|
||||
"forks": 103,
|
||||
"watchers": 320,
|
||||
"watchers": 321,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1264,29 +1264,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 268985001,
|
||||
"name": "SMBGhost",
|
||||
"full_name": "fdbao\/SMBGhost",
|
||||
"owner": {
|
||||
"login": "fdbao",
|
||||
"id": 38367799,
|
||||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38367799?v=4",
|
||||
"html_url": "https:\/\/github.com\/fdbao"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fdbao\/SMBGhost",
|
||||
"description": "批量测试CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-03T03:59:49Z",
|
||||
"updated_at": "2020-07-14T08:05:05Z",
|
||||
"pushed_at": "2020-06-03T04:01:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 270919583,
|
||||
"name": "CVE-2020-0796",
|
||||
|
@ -1333,6 +1310,29 @@
|
|||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 271468541,
|
||||
"name": "SMBGhost",
|
||||
"full_name": "1060275195\/SMBGhost",
|
||||
"owner": {
|
||||
"login": "1060275195",
|
||||
"id": 37568190,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37568190?v=4",
|
||||
"html_url": "https:\/\/github.com\/1060275195"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/1060275195\/SMBGhost",
|
||||
"description": "批量测试CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-11T06:24:30Z",
|
||||
"updated_at": "2020-09-28T13:21:59Z",
|
||||
"pushed_at": "2020-06-03T04:01:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 273582266,
|
||||
"name": "SMBGhost-LPE-Metasploit-Module",
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-17T09:21:36Z",
|
||||
"updated_at": "2020-09-23T13:46:00Z",
|
||||
"updated_at": "2020-09-28T13:42:30Z",
|
||||
"pushed_at": "2020-06-16T08:08:46Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-17T16:49:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": "This repository holds the advisory of the CVE-2020-14294",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-24T08:49:05Z",
|
||||
"updated_at": "2020-09-24T09:55:20Z",
|
||||
"pushed_at": "2020-09-24T09:54:51Z",
|
||||
"updated_at": "2020-09-28T13:11:18Z",
|
||||
"pushed_at": "2020-09-28T13:11:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-09-28T06:46:05Z",
|
||||
"updated_at": "2020-09-28T14:37:53Z",
|
||||
"pushed_at": "2020-09-23T07:04:58Z",
|
||||
"stargazers_count": 1068,
|
||||
"watchers_count": 1068,
|
||||
"forks_count": 223,
|
||||
"forks": 223,
|
||||
"watchers": 1068,
|
||||
"stargazers_count": 1072,
|
||||
"watchers_count": 1072,
|
||||
"forks_count": 224,
|
||||
"forks": 224,
|
||||
"watchers": 1072,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:52:37Z",
|
||||
"updated_at": "2020-09-23T15:58:50Z",
|
||||
"updated_at": "2020-09-28T12:25:26Z",
|
||||
"pushed_at": "2020-09-14T16:53:07Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2020-09-28T06:19:59Z",
|
||||
"updated_at": "2020-09-28T13:08:59Z",
|
||||
"pushed_at": "2020-09-25T15:32:01Z",
|
||||
"stargazers_count": 619,
|
||||
"watchers_count": 619,
|
||||
"forks_count": 178,
|
||||
"forks": 178,
|
||||
"watchers": 619,
|
||||
"stargazers_count": 621,
|
||||
"watchers_count": 621,
|
||||
"forks_count": 179,
|
||||
"forks": 179,
|
||||
"watchers": 621,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-09-28T08:18:20Z",
|
||||
"updated_at": "2020-09-28T13:38:08Z",
|
||||
"pushed_at": "2020-09-17T18:06:57Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -151,13 +151,13 @@
|
|||
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:27:14Z",
|
||||
"updated_at": "2020-09-28T01:47:51Z",
|
||||
"updated_at": "2020-09-28T09:55:52Z",
|
||||
"pushed_at": "2020-09-16T14:05:27Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,13 +335,13 @@
|
|||
"description": "cve-2020-1472 复现利用及其exp",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-16T03:40:47Z",
|
||||
"updated_at": "2020-09-27T02:03:32Z",
|
||||
"updated_at": "2020-09-28T14:06:18Z",
|
||||
"pushed_at": "2020-09-16T15:03:32Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -574,29 +574,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296960827,
|
||||
"name": "Zerologon",
|
||||
"full_name": "batmanli61\/Zerologon",
|
||||
"owner": {
|
||||
"login": "batmanli61",
|
||||
"id": 19485801,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19485801?v=4",
|
||||
"html_url": "https:\/\/github.com\/batmanli61"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/batmanli61\/Zerologon",
|
||||
"description": "Zerologon Exploit | CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-19T22:21:24Z",
|
||||
"updated_at": "2020-09-19T22:31:15Z",
|
||||
"pushed_at": "2020-09-19T22:31:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 296966855,
|
||||
"name": "CVE-2020-1472",
|
||||
|
@ -734,5 +711,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 299264416,
|
||||
"name": "CVE-2020-1472",
|
||||
"full_name": "Whippet0\/CVE-2020-1472",
|
||||
"owner": {
|
||||
"login": "Whippet0",
|
||||
"id": 46486374,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46486374?v=4",
|
||||
"html_url": "https:\/\/github.com\/Whippet0"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472",
|
||||
"description": "CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-28T09:54:31Z",
|
||||
"updated_at": "2020-09-28T10:00:34Z",
|
||||
"pushed_at": "2020-09-28T10:00:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploits for CVE-2020-17382",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T18:26:32Z",
|
||||
"updated_at": "2020-09-28T09:09:55Z",
|
||||
"updated_at": "2020-09-28T11:54:35Z",
|
||||
"pushed_at": "2020-09-26T15:17:50Z",
|
||||
"stargazers_count": 59,
|
||||
"watchers_count": 59,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 59,
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 60,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 135,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2020-09-28T05:08:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-5837 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T08:15:18Z",
|
||||
"updated_at": "2020-09-23T13:45:34Z",
|
||||
"updated_at": "2020-09-28T13:42:11Z",
|
||||
"pushed_at": "2020-05-13T09:45:12Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-04-07T11:17:27Z",
|
||||
"updated_at": "2020-09-23T13:45:46Z",
|
||||
"updated_at": "2020-09-28T13:42:23Z",
|
||||
"pushed_at": "2020-07-14T06:39:31Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Hacking Artifactory with server side template injection",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T13:56:43Z",
|
||||
"updated_at": "2020-09-28T09:00:39Z",
|
||||
"updated_at": "2020-09-28T12:55:50Z",
|
||||
"pushed_at": "2020-03-12T06:55:39Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 21,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-03T07:57:53Z",
|
||||
"updated_at": "2020-09-23T13:45:37Z",
|
||||
"updated_at": "2020-09-28T13:42:18Z",
|
||||
"pushed_at": "2020-06-08T20:23:53Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -310,9 +310,9 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [halsten/CVE-2020-0796](https://github.com/halsten/CVE-2020-0796)
|
||||
- [ysyyrps123/CVE-2020-0796](https://github.com/ysyyrps123/CVE-2020-0796)
|
||||
- [ysyyrps123/CVE-2020-0796-exp](https://github.com/ysyyrps123/CVE-2020-0796-exp)
|
||||
- [fdbao/SMBGhost](https://github.com/fdbao/SMBGhost)
|
||||
- [exp-sky/CVE-2020-0796](https://github.com/exp-sky/CVE-2020-0796)
|
||||
- [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation)
|
||||
- [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost)
|
||||
- [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module)
|
||||
- [ZecOps/SMBGhost-SMBleed-scanner](https://github.com/ZecOps/SMBGhost-SMBleed-scanner)
|
||||
- [getdrive/smbghost](https://github.com/getdrive/smbghost)
|
||||
|
@ -521,13 +521,13 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
|
|||
- [zeronetworks/zerologon](https://github.com/zeronetworks/zerologon)
|
||||
- [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472)
|
||||
- [midpipps/CVE-2020-1472-Easy](https://github.com/midpipps/CVE-2020-1472-Easy)
|
||||
- [batmanli61/Zerologon](https://github.com/batmanli61/Zerologon)
|
||||
- [hectorgie/CVE-2020-1472](https://github.com/hectorgie/CVE-2020-1472)
|
||||
- [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes)
|
||||
- [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472)
|
||||
- [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472)
|
||||
- [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472)
|
||||
- [Fa1c0n35/CVE-2020-1472-02-](https://github.com/Fa1c0n35/CVE-2020-1472-02-)
|
||||
- [Whippet0/CVE-2020-1472](https://github.com/Whippet0/CVE-2020-1472)
|
||||
|
||||
### CVE-2020-1493
|
||||
|
||||
|
@ -2554,7 +2554,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708)
|
||||
- [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE)
|
||||
- [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF)
|
||||
- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep)
|
||||
- [upknboy/CVE-2019-0708-BlueKeep](https://github.com/upknboy/CVE-2019-0708-BlueKeep)
|
||||
- [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708)
|
||||
- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-)
|
||||
- [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)
|
||||
|
|
Loading…
Reference in a new issue