diff --git a/2015/CVE-2015-7547.json b/2015/CVE-2015-7547.json
index 269e438290..06ea8d71d3 100644
--- a/2015/CVE-2015-7547.json
+++ b/2015/CVE-2015-7547.json
@@ -13,13 +13,13 @@
         "description": "Proof of concept for CVE-2015-7547",
         "fork": false,
         "created_at": "2016-02-10T21:13:54Z",
-        "updated_at": "2020-09-23T21:11:56Z",
+        "updated_at": "2020-09-28T12:57:46Z",
         "pushed_at": "2016-02-20T07:57:58Z",
-        "stargazers_count": 546,
-        "watchers_count": 546,
+        "stargazers_count": 547,
+        "watchers_count": 547,
         "forks_count": 179,
         "forks": 179,
-        "watchers": 546,
+        "watchers": 547,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-0785.json b/2017/CVE-2017-0785.json
index c7a4639a03..d90e8b7928 100644
--- a/2017/CVE-2017-0785.json
+++ b/2017/CVE-2017-0785.json
@@ -17,8 +17,8 @@
         "pushed_at": "2017-09-23T05:11:45Z",
         "stargazers_count": 427,
         "watchers_count": 427,
-        "forks_count": 192,
-        "forks": 192,
+        "forks_count": 191,
+        "forks": 191,
         "watchers": 427,
         "score": 0
     },
diff --git a/2017/CVE-2017-10271.json b/2017/CVE-2017-10271.json
index 8d72e103aa..90dfc16f77 100644
--- a/2017/CVE-2017-10271.json
+++ b/2017/CVE-2017-10271.json
@@ -128,13 +128,13 @@
         "description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
         "fork": false,
         "created_at": "2018-01-03T06:14:28Z",
-        "updated_at": "2020-03-05T08:20:20Z",
+        "updated_at": "2020-09-28T14:29:52Z",
         "pushed_at": "2018-01-03T00:42:57Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "forks_count": 38,
-        "forks": 38,
-        "watchers": 2,
+        "stargazers_count": 3,
+        "watchers_count": 3,
+        "forks_count": 39,
+        "forks": 39,
+        "watchers": 3,
         "score": 0
     },
     {
diff --git a/2017/CVE-2017-11783.json b/2017/CVE-2017-11783.json
index 83f00f35ab..c6324b7afe 100644
--- a/2017/CVE-2017-11783.json
+++ b/2017/CVE-2017-11783.json
@@ -17,8 +17,8 @@
         "pushed_at": "2018-08-31T01:54:40Z",
         "stargazers_count": 3,
         "watchers_count": 3,
-        "forks_count": 5,
-        "forks": 5,
+        "forks_count": 4,
+        "forks": 4,
         "watchers": 3,
         "score": 0
     }
diff --git a/2017/CVE-2017-7494.json b/2017/CVE-2017-7494.json
index a82b138c1a..c1674cf44e 100644
--- a/2017/CVE-2017-7494.json
+++ b/2017/CVE-2017-7494.json
@@ -59,13 +59,13 @@
         "description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
         "fork": false,
         "created_at": "2017-05-26T00:58:25Z",
-        "updated_at": "2020-09-25T17:35:33Z",
+        "updated_at": "2020-09-28T14:01:53Z",
         "pushed_at": "2017-10-31T16:20:29Z",
-        "stargazers_count": 246,
-        "watchers_count": 246,
+        "stargazers_count": 247,
+        "watchers_count": 247,
         "forks_count": 88,
         "forks": 88,
-        "watchers": 246,
+        "watchers": 247,
         "score": 0
     },
     {
diff --git a/2018/CVE-2018-10933.json b/2018/CVE-2018-10933.json
index 25639df170..75c50e693d 100644
--- a/2018/CVE-2018-10933.json
+++ b/2018/CVE-2018-10933.json
@@ -40,8 +40,8 @@
         "pushed_at": "2020-07-24T17:54:54Z",
         "stargazers_count": 468,
         "watchers_count": 468,
-        "forks_count": 115,
-        "forks": 115,
+        "forks_count": 114,
+        "forks": 114,
         "watchers": 468,
         "score": 0
     },
diff --git a/2018/CVE-2018-5955.json b/2018/CVE-2018-5955.json
index 951a4b8519..ba3428507b 100644
--- a/2018/CVE-2018-5955.json
+++ b/2018/CVE-2018-5955.json
@@ -36,13 +36,13 @@
         "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
         "fork": false,
         "created_at": "2019-12-21T22:45:55Z",
-        "updated_at": "2020-09-23T02:27:42Z",
+        "updated_at": "2020-09-28T11:09:04Z",
         "pushed_at": "2020-01-05T21:46:25Z",
-        "stargazers_count": 309,
-        "watchers_count": 309,
+        "stargazers_count": 310,
+        "watchers_count": 310,
         "forks_count": 71,
         "forks": 71,
-        "watchers": 309,
+        "watchers": 310,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2018/CVE-2018-8639.json b/2018/CVE-2018-8639.json
index 084ef3d20f..e065075b9d 100644
--- a/2018/CVE-2018-8639.json
+++ b/2018/CVE-2018-8639.json
@@ -17,8 +17,8 @@
         "pushed_at": "2019-04-08T08:26:26Z",
         "stargazers_count": 125,
         "watchers_count": 125,
-        "forks_count": 51,
-        "forks": 51,
+        "forks_count": 50,
+        "forks": 50,
         "watchers": 125,
         "score": 0
     },
diff --git a/2018/CVE-2018-9206.json b/2018/CVE-2018-9206.json
index 50f47b2740..d5773c331c 100644
--- a/2018/CVE-2018-9206.json
+++ b/2018/CVE-2018-9206.json
@@ -40,8 +40,8 @@
         "pushed_at": "2018-10-30T01:48:42Z",
         "stargazers_count": 62,
         "watchers_count": 62,
-        "forks_count": 17,
-        "forks": 17,
+        "forks_count": 16,
+        "forks": 16,
         "watchers": 62,
         "score": 0
     },
diff --git a/2019/CVE-2019-0708.json b/2019/CVE-2019-0708.json
index ee3728936f..ff318b6d1f 100644
--- a/2019/CVE-2019-0708.json
+++ b/2019/CVE-2019-0708.json
@@ -312,13 +312,13 @@
         "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
         "fork": false,
         "created_at": "2019-05-15T15:01:38Z",
-        "updated_at": "2020-09-27T21:04:12Z",
+        "updated_at": "2020-09-28T12:14:33Z",
         "pushed_at": "2019-06-13T13:07:03Z",
-        "stargazers_count": 335,
-        "watchers_count": 335,
+        "stargazers_count": 336,
+        "watchers_count": 336,
         "forks_count": 189,
         "forks": 189,
-        "watchers": 335,
+        "watchers": 336,
         "score": 0
     },
     {
@@ -2164,14 +2164,14 @@
     {
         "id": 206928449,
         "name": "CVE-2019-0708-BlueKeep",
-        "full_name": "adkinguzi\/CVE-2019-0708-BlueKeep",
+        "full_name": "upknboy\/CVE-2019-0708-BlueKeep",
         "owner": {
-            "login": "adkinguzi",
+            "login": "upknboy",
             "id": 31617622,
             "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4",
-            "html_url": "https:\/\/github.com\/adkinguzi"
+            "html_url": "https:\/\/github.com\/upknboy"
         },
-        "html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep",
+        "html_url": "https:\/\/github.com\/upknboy\/CVE-2019-0708-BlueKeep",
         "description": null,
         "fork": false,
         "created_at": "2019-09-07T06:50:47Z",
@@ -2497,13 +2497,13 @@
         "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
         "fork": false,
         "created_at": "2020-01-21T02:22:29Z",
-        "updated_at": "2020-08-29T05:47:05Z",
+        "updated_at": "2020-09-28T12:13:48Z",
         "pushed_at": "2020-01-21T03:15:41Z",
-        "stargazers_count": 58,
-        "watchers_count": 58,
+        "stargazers_count": 59,
+        "watchers_count": 59,
         "forks_count": 20,
         "forks": 20,
-        "watchers": 58,
+        "watchers": 59,
         "score": 0
     },
     {
diff --git a/2019/CVE-2019-17026.json b/2019/CVE-2019-17026.json
index f47fd75be9..299be3fc5b 100644
--- a/2019/CVE-2019-17026.json
+++ b/2019/CVE-2019-17026.json
@@ -13,13 +13,13 @@
         "description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
         "fork": false,
         "created_at": "2020-08-27T19:32:07Z",
-        "updated_at": "2020-09-18T10:30:07Z",
+        "updated_at": "2020-09-28T14:02:50Z",
         "pushed_at": "2020-08-27T19:33:42Z",
-        "stargazers_count": 42,
-        "watchers_count": 42,
+        "stargazers_count": 43,
+        "watchers_count": 43,
         "forks_count": 16,
         "forks": 16,
-        "watchers": 42,
+        "watchers": 43,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2019/CVE-2019-2215.json b/2019/CVE-2019-2215.json
index 605618e4fb..e357515734 100644
--- a/2019/CVE-2019-2215.json
+++ b/2019/CVE-2019-2215.json
@@ -13,13 +13,13 @@
         "description": null,
         "fork": false,
         "created_at": "2019-10-04T06:32:08Z",
-        "updated_at": "2020-09-11T14:56:11Z",
+        "updated_at": "2020-09-28T11:10:48Z",
         "pushed_at": "2019-11-12T03:58:00Z",
-        "stargazers_count": 60,
-        "watchers_count": 60,
+        "stargazers_count": 61,
+        "watchers_count": 61,
         "forks_count": 24,
         "forks": 24,
-        "watchers": 60,
+        "watchers": 61,
         "score": 0
     },
     {
@@ -59,13 +59,13 @@
         "description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
         "fork": false,
         "created_at": "2019-10-14T17:27:37Z",
-        "updated_at": "2020-09-10T14:31:55Z",
+        "updated_at": "2020-09-28T11:27:15Z",
         "pushed_at": "2019-10-15T01:04:08Z",
-        "stargazers_count": 52,
-        "watchers_count": 52,
+        "stargazers_count": 53,
+        "watchers_count": 53,
         "forks_count": 39,
         "forks": 39,
-        "watchers": 52,
+        "watchers": 53,
         "score": 0
     },
     {
diff --git a/2020/CVE-2020-0796.json b/2020/CVE-2020-0796.json
index 6b1aeaa197..43c8a9806e 100644
--- a/2020/CVE-2020-0796.json
+++ b/2020/CVE-2020-0796.json
@@ -772,13 +772,13 @@
         "description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
         "fork": false,
         "created_at": "2020-03-18T08:29:28Z",
-        "updated_at": "2020-07-15T08:20:44Z",
+        "updated_at": "2020-09-28T14:23:34Z",
         "pushed_at": "2020-03-18T08:57:36Z",
-        "stargazers_count": 9,
-        "watchers_count": 9,
+        "stargazers_count": 10,
+        "watchers_count": 10,
         "forks_count": 7,
         "forks": 7,
-        "watchers": 9,
+        "watchers": 10,
         "score": 0
     },
     {
@@ -1094,13 +1094,13 @@
         "description": "CVE-2020-0796 Remote Code Execution POC",
         "fork": false,
         "created_at": "2020-04-20T14:35:48Z",
-        "updated_at": "2020-09-28T02:44:36Z",
+        "updated_at": "2020-09-28T13:32:37Z",
         "pushed_at": "2020-06-09T20:46:45Z",
-        "stargazers_count": 320,
-        "watchers_count": 320,
+        "stargazers_count": 321,
+        "watchers_count": 321,
         "forks_count": 103,
         "forks": 103,
-        "watchers": 320,
+        "watchers": 321,
         "score": 0
     },
     {
@@ -1264,29 +1264,6 @@
         "watchers": 0,
         "score": 0
     },
-    {
-        "id": 268985001,
-        "name": "SMBGhost",
-        "full_name": "fdbao\/SMBGhost",
-        "owner": {
-            "login": "fdbao",
-            "id": 38367799,
-            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38367799?v=4",
-            "html_url": "https:\/\/github.com\/fdbao"
-        },
-        "html_url": "https:\/\/github.com\/fdbao\/SMBGhost",
-        "description": "批量测试CVE-2020-0796 - SMBv3 RCE",
-        "fork": false,
-        "created_at": "2020-06-03T03:59:49Z",
-        "updated_at": "2020-07-14T08:05:05Z",
-        "pushed_at": "2020-06-03T04:01:29Z",
-        "stargazers_count": 2,
-        "watchers_count": 2,
-        "forks_count": 2,
-        "forks": 2,
-        "watchers": 2,
-        "score": 0
-    },
     {
         "id": 270919583,
         "name": "CVE-2020-0796",
@@ -1333,6 +1310,29 @@
         "watchers": 63,
         "score": 0
     },
+    {
+        "id": 271468541,
+        "name": "SMBGhost",
+        "full_name": "1060275195\/SMBGhost",
+        "owner": {
+            "login": "1060275195",
+            "id": 37568190,
+            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37568190?v=4",
+            "html_url": "https:\/\/github.com\/1060275195"
+        },
+        "html_url": "https:\/\/github.com\/1060275195\/SMBGhost",
+        "description": "批量测试CVE-2020-0796 - SMBv3 RCE",
+        "fork": false,
+        "created_at": "2020-06-11T06:24:30Z",
+        "updated_at": "2020-09-28T13:21:59Z",
+        "pushed_at": "2020-06-03T04:01:29Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
+    },
     {
         "id": 273582266,
         "name": "SMBGhost-LPE-Metasploit-Module",
diff --git a/2020/CVE-2020-1283.json b/2020/CVE-2020-1283.json
index 0f887c1d6d..39263bc548 100644
--- a/2020/CVE-2020-1283.json
+++ b/2020/CVE-2020-1283.json
@@ -13,13 +13,13 @@
         "description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability",
         "fork": false,
         "created_at": "2020-04-17T09:21:36Z",
-        "updated_at": "2020-09-23T13:46:00Z",
+        "updated_at": "2020-09-28T13:42:30Z",
         "pushed_at": "2020-06-16T08:08:46Z",
-        "stargazers_count": 4,
-        "watchers_count": 4,
-        "forks_count": 2,
-        "forks": 2,
-        "watchers": 4,
+        "stargazers_count": 5,
+        "watchers_count": 5,
+        "forks_count": 4,
+        "forks": 4,
+        "watchers": 5,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1350.json b/2020/CVE-2020-1350.json
index a62ba617ac..56337eed3b 100644
--- a/2020/CVE-2020-1350.json
+++ b/2020/CVE-2020-1350.json
@@ -17,8 +17,8 @@
         "pushed_at": "2020-08-17T16:49:35Z",
         "stargazers_count": 34,
         "watchers_count": 34,
-        "forks_count": 10,
-        "forks": 10,
+        "forks_count": 11,
+        "forks": 11,
         "watchers": 34,
         "score": 0
     },
diff --git a/2020/CVE-2020-14294.json b/2020/CVE-2020-14294.json
index 9292b416ee..4c8ee6f6a5 100644
--- a/2020/CVE-2020-14294.json
+++ b/2020/CVE-2020-14294.json
@@ -13,8 +13,8 @@
         "description": "This repository holds the advisory of the CVE-2020-14294",
         "fork": false,
         "created_at": "2020-09-24T08:49:05Z",
-        "updated_at": "2020-09-24T09:55:20Z",
-        "pushed_at": "2020-09-24T09:54:51Z",
+        "updated_at": "2020-09-28T13:11:18Z",
+        "pushed_at": "2020-09-28T13:11:15Z",
         "stargazers_count": 0,
         "watchers_count": 0,
         "forks_count": 0,
diff --git a/2020/CVE-2020-1472.json b/2020/CVE-2020-1472.json
index d9e5911110..db91f32816 100644
--- a/2020/CVE-2020-1472.json
+++ b/2020/CVE-2020-1472.json
@@ -36,13 +36,13 @@
         "description": "Test tool for CVE-2020-1472",
         "fork": false,
         "created_at": "2020-09-08T08:58:37Z",
-        "updated_at": "2020-09-28T06:46:05Z",
+        "updated_at": "2020-09-28T14:37:53Z",
         "pushed_at": "2020-09-23T07:04:58Z",
-        "stargazers_count": 1068,
-        "watchers_count": 1068,
-        "forks_count": 223,
-        "forks": 223,
-        "watchers": 1068,
+        "stargazers_count": 1072,
+        "watchers_count": 1072,
+        "forks_count": 224,
+        "forks": 224,
+        "watchers": 1072,
         "score": 0
     },
     {
@@ -59,13 +59,13 @@
         "description": null,
         "fork": false,
         "created_at": "2020-09-14T16:52:37Z",
-        "updated_at": "2020-09-23T15:58:50Z",
+        "updated_at": "2020-09-28T12:25:26Z",
         "pushed_at": "2020-09-14T16:53:07Z",
-        "stargazers_count": 27,
-        "watchers_count": 27,
+        "stargazers_count": 28,
+        "watchers_count": 28,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 27,
+        "watchers": 28,
         "score": 0
     },
     {
@@ -82,13 +82,13 @@
         "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
         "fork": false,
         "created_at": "2020-09-14T16:56:51Z",
-        "updated_at": "2020-09-28T06:19:59Z",
+        "updated_at": "2020-09-28T13:08:59Z",
         "pushed_at": "2020-09-25T15:32:01Z",
-        "stargazers_count": 619,
-        "watchers_count": 619,
-        "forks_count": 178,
-        "forks": 178,
-        "watchers": 619,
+        "stargazers_count": 621,
+        "watchers_count": 621,
+        "forks_count": 179,
+        "forks": 179,
+        "watchers": 621,
         "score": 0
     },
     {
@@ -128,13 +128,13 @@
         "description": "Exploit for zerologon cve-2020-1472",
         "fork": false,
         "created_at": "2020-09-14T19:19:07Z",
-        "updated_at": "2020-09-28T08:18:20Z",
+        "updated_at": "2020-09-28T13:38:08Z",
         "pushed_at": "2020-09-17T18:06:57Z",
-        "stargazers_count": 145,
-        "watchers_count": 145,
-        "forks_count": 50,
-        "forks": 50,
-        "watchers": 145,
+        "stargazers_count": 146,
+        "watchers_count": 146,
+        "forks_count": 51,
+        "forks": 51,
+        "watchers": 146,
         "score": 0
     },
     {
@@ -151,13 +151,13 @@
         "description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
         "fork": false,
         "created_at": "2020-09-14T19:27:14Z",
-        "updated_at": "2020-09-28T01:47:51Z",
+        "updated_at": "2020-09-28T09:55:52Z",
         "pushed_at": "2020-09-16T14:05:27Z",
-        "stargazers_count": 104,
-        "watchers_count": 104,
+        "stargazers_count": 105,
+        "watchers_count": 105,
         "forks_count": 26,
         "forks": 26,
-        "watchers": 104,
+        "watchers": 105,
         "score": 0
     },
     {
@@ -335,13 +335,13 @@
         "description": "cve-2020-1472  复现利用及其exp",
         "fork": false,
         "created_at": "2020-09-16T03:40:47Z",
-        "updated_at": "2020-09-27T02:03:32Z",
+        "updated_at": "2020-09-28T14:06:18Z",
         "pushed_at": "2020-09-16T15:03:32Z",
-        "stargazers_count": 28,
-        "watchers_count": 28,
+        "stargazers_count": 29,
+        "watchers_count": 29,
         "forks_count": 5,
         "forks": 5,
-        "watchers": 28,
+        "watchers": 29,
         "score": 0
     },
     {
@@ -574,29 +574,6 @@
         "watchers": 0,
         "score": 0
     },
-    {
-        "id": 296960827,
-        "name": "Zerologon",
-        "full_name": "batmanli61\/Zerologon",
-        "owner": {
-            "login": "batmanli61",
-            "id": 19485801,
-            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19485801?v=4",
-            "html_url": "https:\/\/github.com\/batmanli61"
-        },
-        "html_url": "https:\/\/github.com\/batmanli61\/Zerologon",
-        "description": "Zerologon Exploit | CVE-2020-1472",
-        "fork": false,
-        "created_at": "2020-09-19T22:21:24Z",
-        "updated_at": "2020-09-19T22:31:15Z",
-        "pushed_at": "2020-09-19T22:31:13Z",
-        "stargazers_count": 0,
-        "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
-        "watchers": 0,
-        "score": 0
-    },
     {
         "id": 296966855,
         "name": "CVE-2020-1472",
@@ -734,5 +711,28 @@
         "forks": 0,
         "watchers": 0,
         "score": 0
+    },
+    {
+        "id": 299264416,
+        "name": "CVE-2020-1472",
+        "full_name": "Whippet0\/CVE-2020-1472",
+        "owner": {
+            "login": "Whippet0",
+            "id": 46486374,
+            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46486374?v=4",
+            "html_url": "https:\/\/github.com\/Whippet0"
+        },
+        "html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472",
+        "description": "CVE-2020-1472",
+        "fork": false,
+        "created_at": "2020-09-28T09:54:31Z",
+        "updated_at": "2020-09-28T10:00:34Z",
+        "pushed_at": "2020-09-28T10:00:30Z",
+        "stargazers_count": 0,
+        "watchers_count": 0,
+        "forks_count": 0,
+        "forks": 0,
+        "watchers": 0,
+        "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-17382.json b/2020/CVE-2020-17382.json
index a6c3beca7d..ff16f9da38 100644
--- a/2020/CVE-2020-17382.json
+++ b/2020/CVE-2020-17382.json
@@ -13,13 +13,13 @@
         "description": "PoC exploits for CVE-2020-17382",
         "fork": false,
         "created_at": "2020-09-17T18:26:32Z",
-        "updated_at": "2020-09-28T09:09:55Z",
+        "updated_at": "2020-09-28T11:54:35Z",
         "pushed_at": "2020-09-26T15:17:50Z",
-        "stargazers_count": 59,
-        "watchers_count": 59,
-        "forks_count": 9,
-        "forks": 9,
-        "watchers": 59,
+        "stargazers_count": 60,
+        "watchers_count": 60,
+        "forks_count": 10,
+        "forks": 10,
+        "watchers": 60,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-1938.json b/2020/CVE-2020-1938.json
index d146904bb6..c9450078c2 100644
--- a/2020/CVE-2020-1938.json
+++ b/2020/CVE-2020-1938.json
@@ -316,8 +316,8 @@
         "pushed_at": "2020-03-09T14:51:43Z",
         "stargazers_count": 135,
         "watchers_count": 135,
-        "forks_count": 51,
-        "forks": 51,
+        "forks_count": 50,
+        "forks": 50,
         "watchers": 135,
         "score": 0
     },
diff --git a/2020/CVE-2020-3452.json b/2020/CVE-2020-3452.json
index 18741d2ec0..56acd3b65c 100644
--- a/2020/CVE-2020-3452.json
+++ b/2020/CVE-2020-3452.json
@@ -247,8 +247,8 @@
         "pushed_at": "2020-09-28T05:08:44Z",
         "stargazers_count": 0,
         "watchers_count": 0,
-        "forks_count": 0,
-        "forks": 0,
+        "forks_count": 1,
+        "forks": 1,
         "watchers": 0,
         "score": 0
     }
diff --git a/2020/CVE-2020-5837.json b/2020/CVE-2020-5837.json
index 4ea4d020bd..8687b5ea1a 100644
--- a/2020/CVE-2020-5837.json
+++ b/2020/CVE-2020-5837.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-5837 exploit",
         "fork": false,
         "created_at": "2020-04-16T08:15:18Z",
-        "updated_at": "2020-09-23T13:45:34Z",
+        "updated_at": "2020-09-28T13:42:11Z",
         "pushed_at": "2020-05-13T09:45:12Z",
-        "stargazers_count": 30,
-        "watchers_count": 30,
-        "forks_count": 11,
-        "forks": 11,
-        "watchers": 30,
+        "stargazers_count": 31,
+        "watchers_count": 31,
+        "forks_count": 12,
+        "forks": 12,
+        "watchers": 31,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-7283.json b/2020/CVE-2020-7283.json
index d6ea5acdb0..2b0afa8fb6 100644
--- a/2020/CVE-2020-7283.json
+++ b/2020/CVE-2020-7283.json
@@ -13,7 +13,7 @@
         "description": null,
         "fork": false,
         "created_at": "2020-04-07T11:17:27Z",
-        "updated_at": "2020-09-23T13:45:46Z",
+        "updated_at": "2020-09-28T13:42:23Z",
         "pushed_at": "2020-07-14T06:39:31Z",
         "stargazers_count": 11,
         "watchers_count": 11,
diff --git a/2020/CVE-2020-7931.json b/2020/CVE-2020-7931.json
index 1c8f81e11b..ab5d4da136 100644
--- a/2020/CVE-2020-7931.json
+++ b/2020/CVE-2020-7931.json
@@ -13,13 +13,13 @@
         "description": "Hacking Artifactory with server side template injection",
         "fork": false,
         "created_at": "2020-03-11T13:56:43Z",
-        "updated_at": "2020-09-28T09:00:39Z",
+        "updated_at": "2020-09-28T12:55:50Z",
         "pushed_at": "2020-03-12T06:55:39Z",
-        "stargazers_count": 21,
-        "watchers_count": 21,
+        "stargazers_count": 22,
+        "watchers_count": 22,
         "forks_count": 7,
         "forks": 7,
-        "watchers": 21,
+        "watchers": 22,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/2020/CVE-2020-8103.json b/2020/CVE-2020-8103.json
index da46a6c799..efc9e1bcf1 100644
--- a/2020/CVE-2020-8103.json
+++ b/2020/CVE-2020-8103.json
@@ -13,13 +13,13 @@
         "description": "CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free",
         "fork": false,
         "created_at": "2020-04-03T07:57:53Z",
-        "updated_at": "2020-09-23T13:45:37Z",
+        "updated_at": "2020-09-28T13:42:18Z",
         "pushed_at": "2020-06-08T20:23:53Z",
-        "stargazers_count": 11,
-        "watchers_count": 11,
-        "forks_count": 3,
-        "forks": 3,
-        "watchers": 11,
+        "stargazers_count": 12,
+        "watchers_count": 12,
+        "forks_count": 4,
+        "forks": 4,
+        "watchers": 12,
         "score": 0
     }
 ]
\ No newline at end of file
diff --git a/README.md b/README.md
index f717da131e..6065ccb062 100644
--- a/README.md
+++ b/README.md
@@ -310,9 +310,9 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
 - [halsten/CVE-2020-0796](https://github.com/halsten/CVE-2020-0796)
 - [ysyyrps123/CVE-2020-0796](https://github.com/ysyyrps123/CVE-2020-0796)
 - [ysyyrps123/CVE-2020-0796-exp](https://github.com/ysyyrps123/CVE-2020-0796-exp)
-- [fdbao/SMBGhost](https://github.com/fdbao/SMBGhost)
 - [exp-sky/CVE-2020-0796](https://github.com/exp-sky/CVE-2020-0796)
 - [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation)
+- [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost)
 - [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module)
 - [ZecOps/SMBGhost-SMBleed-scanner](https://github.com/ZecOps/SMBGhost-SMBleed-scanner)
 - [getdrive/smbghost](https://github.com/getdrive/smbghost)
@@ -521,13 +521,13 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
 - [zeronetworks/zerologon](https://github.com/zeronetworks/zerologon)
 - [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472)
 - [midpipps/CVE-2020-1472-Easy](https://github.com/midpipps/CVE-2020-1472-Easy)
-- [batmanli61/Zerologon](https://github.com/batmanli61/Zerologon)
 - [hectorgie/CVE-2020-1472](https://github.com/hectorgie/CVE-2020-1472)
 - [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes)
 - [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472)
 - [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472)
 - [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472)
 - [Fa1c0n35/CVE-2020-1472-02-](https://github.com/Fa1c0n35/CVE-2020-1472-02-)
+- [Whippet0/CVE-2020-1472](https://github.com/Whippet0/CVE-2020-1472)
 
 ### CVE-2020-1493
 
@@ -2554,7 +2554,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
 - [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708)
 - [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE)
 - [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF)
-- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep)
+- [upknboy/CVE-2019-0708-BlueKeep](https://github.com/upknboy/CVE-2019-0708-BlueKeep)
 - [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708)
 - [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-)
 - [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)