Auto Update 2022/08/12 12:17:59

This commit is contained in:
motikan2010-bot 2022-08-12 21:17:59 +09:00
parent eb136b9d3d
commit 00839e69da
43 changed files with 198 additions and 198 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2022-06-14T15:30:41Z",
"updated_at": "2022-08-12T10:12:07Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 329,
"watchers_count": 329,
"stargazers_count": 330,
"watchers_count": 330,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 329,
"watchers": 330,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-07-27T16:14:53Z",
"updated_at": "2022-08-12T07:24:30Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 681,
"watchers_count": 681,
"stargazers_count": 683,
"watchers_count": 683,
"forks_count": 290,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 290,
"watchers": 681,
"watchers": 683,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -73,7 +73,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 47,
"watchers_count": 47,
"forks_count": 12,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"web-security"
],
"visibility": "public",
"forks": 12,
"forks": 11,
"watchers": 47,
"score": 0
},

View file

@ -170,14 +170,14 @@
{
"id": 130153239,
"name": "CVE-2018-2628",
"full_name": "hawk-520\/CVE-2018-2628",
"full_name": "victor0013\/CVE-2018-2628",
"owner": {
"login": "hawk-520",
"login": "victor0013",
"id": 37926610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4",
"html_url": "https:\/\/github.com\/hawk-520"
"html_url": "https:\/\/github.com\/victor0013"
},
"html_url": "https:\/\/github.com\/hawk-520\/CVE-2018-2628",
"html_url": "https:\/\/github.com\/victor0013\/CVE-2018-2628",
"description": "CVE-2018-2628",
"fork": false,
"created_at": "2018-04-19T03:19:15Z",
@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -581,7 +581,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
"fork": false,
"created_at": "2018-05-10T20:46:30Z",
"updated_at": "2021-10-11T12:09:19Z",
"updated_at": "2022-08-12T08:53:08Z",
"pushed_at": "2018-05-10T20:47:59Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 74,
"watchers": 75,
"score": 0
},
{
@ -97,10 +97,10 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
"fork": false,
"created_at": "2018-08-08T20:04:56Z",
"updated_at": "2022-07-27T07:09:48Z",
"updated_at": "2022-08-12T08:53:12Z",
"pushed_at": "2018-08-08T20:12:20Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
@ -108,7 +108,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 112,
"watchers": 113,
"score": 0
}
]

View file

@ -1252,14 +1252,14 @@
{
"id": 187946230,
"name": "CVE-2019-0708",
"full_name": "hawk-520\/CVE-2019-0708",
"full_name": "victor0013\/CVE-2019-0708",
"owner": {
"login": "hawk-520",
"login": "victor0013",
"id": 37926610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4",
"html_url": "https:\/\/github.com\/hawk-520"
"html_url": "https:\/\/github.com\/victor0013"
},
"html_url": "https:\/\/github.com\/hawk-520\/CVE-2019-0708",
"html_url": "https:\/\/github.com\/victor0013\/CVE-2019-0708",
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T02:16:28Z",

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
"fork": false,
"created_at": "2019-08-19T07:43:16Z",
"updated_at": "2022-07-11T13:37:48Z",
"updated_at": "2022-08-12T06:57:31Z",
"pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T01:42:08Z",
"updated_at": "2022-08-12T06:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3478,
"watchers_count": 3478,
"forks_count": 1023,
"stargazers_count": 3479,
"watchers_count": 3479,
"forks_count": 1025,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell"
],
"visibility": "public",
"forks": 1023,
"watchers": 3478,
"forks": 1025,
"watchers": 3479,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -213,7 +213,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
"fork": false,
"created_at": "2019-08-16T04:37:11Z",
"updated_at": "2022-06-10T10:41:04Z",
"updated_at": "2022-08-12T09:24:15Z",
"pushed_at": "2019-08-16T05:54:16Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 16,
"watchers": 17,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T01:42:08Z",
"updated_at": "2022-08-12T06:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3478,
"watchers_count": 3478,
"forks_count": 1023,
"stargazers_count": 3479,
"watchers_count": 3479,
"forks_count": 1025,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell"
],
"visibility": "public",
"forks": 1023,
"watchers": 3478,
"forks": 1025,
"watchers": 3479,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false,
"created_at": "2021-07-02T16:03:16Z",
"updated_at": "2022-07-02T02:17:56Z",
"updated_at": "2022-08-12T09:25:09Z",
"pushed_at": "2021-08-15T16:41:05Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 131,
"watchers": 132,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2022-07-20T14:31:17Z",
"updated_at": "2022-08-12T10:22:47Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 96,
"watchers_count": 96,
"stargazers_count": 97,
"watchers_count": 97,
"forks_count": 69,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 69,
"watchers": 96,
"watchers": 97,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z",
"updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469,
"watchers_count": 1469,
"stargazers_count": 1471,
"watchers_count": 1471,
"forks_count": 303,
"allow_forking": true,
"is_template": false,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 303,
"watchers": 1469,
"watchers": 1471,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2022-08-12T02:41:48Z",
"updated_at": "2022-08-12T10:46:14Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 41,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 41,
"watchers": 178,
"watchers": 179,
"score": 0
},
{

View file

@ -86,10 +86,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2022-08-10T03:05:42Z",
"updated_at": "2022-08-12T07:18:51Z",
"pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 396,
"watchers_count": 396,
"stargazers_count": 397,
"watchers_count": 397,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
@ -99,7 +99,7 @@
],
"visibility": "public",
"forks": 138,
"watchers": 396,
"watchers": 397,
"score": 0
},
{

View file

@ -181,10 +181,10 @@
"description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP",
"fork": false,
"created_at": "2022-07-10T14:48:52Z",
"updated_at": "2022-07-15T06:58:15Z",
"updated_at": "2022-08-12T06:42:15Z",
"pushed_at": "2022-07-23T15:31:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -79,13 +79,13 @@
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1629,
"watchers_count": 1629,
"forks_count": 479,
"forks_count": 478,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 479,
"forks": 478,
"watchers": 1629,
"score": 0
},
@ -159,10 +159,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-08-09T14:17:48Z",
"updated_at": "2022-08-12T11:37:52Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 898,
"watchers_count": 898,
"stargazers_count": 900,
"watchers_count": 900,
"forks_count": 291,
"allow_forking": true,
"is_template": false,
@ -174,7 +174,7 @@
],
"visibility": "public",
"forks": 291,
"watchers": 898,
"watchers": 900,
"score": 0
},
{
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false,
"created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-08-09T14:17:34Z",
"updated_at": "2022-08-12T09:17:01Z",
"pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 584,
"watchers_count": 584,
"stargazers_count": 585,
"watchers_count": 585,
"forks_count": 119,
"allow_forking": true,
"is_template": false,
@ -919,7 +919,7 @@
],
"visibility": "public",
"forks": 119,
"watchers": 584,
"watchers": 585,
"score": 0
},
{
@ -1277,10 +1277,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false,
"created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-07-16T13:46:40Z",
"updated_at": "2022-08-12T09:17:15Z",
"pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
@ -1304,7 +1304,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 51,
"watchers": 52,
"score": 0
},
{

View file

@ -469,10 +469,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-08-10T17:14:48Z",
"updated_at": "2022-08-12T11:21:24Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 838,
"watchers_count": 838,
"stargazers_count": 840,
"watchers_count": 840,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
@ -500,7 +500,7 @@
],
"visibility": "public",
"forks": 129,
"watchers": 838,
"watchers": 840,
"score": 0
},
{
@ -647,10 +647,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-08-11T13:23:06Z",
"updated_at": "2022-08-12T09:53:02Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 485,
"watchers_count": 485,
"stargazers_count": 486,
"watchers_count": 486,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
@ -663,7 +663,7 @@
],
"visibility": "public",
"forks": 96,
"watchers": 485,
"watchers": 486,
"score": 0
},
{
@ -1782,13 +1782,13 @@
"pushed_at": "2022-07-20T08:14:48Z",
"stargazers_count": 3011,
"watchers_count": 3011,
"forks_count": 725,
"forks_count": 726,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 725,
"forks": 726,
"watchers": 3011,
"score": 0
},

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 24,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 24,
"forks": 23,
"watchers": 60,
"score": 0
},

View file

@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false,
"created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-08-10T14:10:40Z",
"updated_at": "2022-08-12T08:54:46Z",
"pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 298,
"watchers_count": 298,
"stargazers_count": 297,
"watchers_count": 297,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
@ -1146,7 +1146,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 298,
"watchers": 297,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 130,
"forks_count": 132,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 130,
"forks": 132,
"watchers": 309,
"score": 0
}

View file

@ -13,11 +13,11 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false,
"created_at": "2022-08-09T15:53:48Z",
"updated_at": "2022-08-12T03:51:21Z",
"updated_at": "2022-08-12T10:50:27Z",
"pushed_at": "2022-08-10T15:34:50Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"windows-boot"
],
"visibility": "public",
"forks": 3,
"watchers": 13,
"forks": 4,
"watchers": 14,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-08-12T01:40:28Z",
"updated_at": "2022-08-12T10:03:52Z",
"pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 630,
"watchers_count": 630,
"forks_count": 128,
"stargazers_count": 631,
"watchers_count": 631,
"forks_count": 129,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -26,8 +26,8 @@
"cve-2022-22718"
],
"visibility": "public",
"forks": 128,
"watchers": 630,
"forks": 129,
"watchers": 631,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 109,
"watchers_count": 109,
"forks_count": 19,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"forks": 20,
"watchers": 109,
"score": 0
}

View file

@ -51,10 +51,10 @@
"description": "CVE-2022-22963 PoC ",
"fork": false,
"created_at": "2022-03-30T05:04:24Z",
"updated_at": "2022-08-02T07:21:43Z",
"updated_at": "2022-08-12T09:21:23Z",
"pushed_at": "2022-03-30T06:01:04Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -211,10 +211,10 @@
"description": "spring框架RCE漏洞 CVE-2022-22965",
"fork": false,
"created_at": "2022-03-31T12:41:29Z",
"updated_at": "2022-06-17T02:49:28Z",
"updated_at": "2022-08-12T11:57:26Z",
"pushed_at": "2022-04-22T07:37:16Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -222,7 +222,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 29,
"watchers": 30,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-24654",
"fork": false,
"created_at": "2022-08-11T15:06:49Z",
"updated_at": "2022-08-11T15:22:54Z",
"updated_at": "2022-08-12T07:16:48Z",
"pushed_at": "2022-08-11T15:09:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-04-16T19:41:15Z",
"updated_at": "2022-04-16T19:41:15Z",
"pushed_at": "2022-04-16T19:44:48Z",
"pushed_at": "2022-08-12T09:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-12T03:28:56Z",
"updated_at": "2022-08-12T08:53:39Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 12,
"watchers": 17,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false,
"created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-08-03T18:13:07Z",
"updated_at": "2022-08-12T07:22:18Z",
"pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 139,
"watchers_count": 139,
"stargazers_count": 140,
"watchers_count": 140,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 139,
"watchers": 140,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-12T04:32:59Z",
"updated_at": "2022-08-12T09:32:43Z",
"pushed_at": "2022-08-11T09:35:18Z",
"stargazers_count": 628,
"watchers_count": 628,
"forks_count": 117,
"stargazers_count": 633,
"watchers_count": 633,
"forks_count": 120,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"gui"
],
"visibility": "public",
"forks": 117,
"watchers": 628,
"forks": 120,
"watchers": 633,
"score": 0
},
{

View file

@ -640,10 +640,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-08-10T07:16:31Z",
"updated_at": "2022-08-12T07:43:34Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
@ -651,7 +651,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 288,
"watchers": 289,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services",
"fork": false,
"created_at": "2022-05-12T02:31:50Z",
"updated_at": "2022-06-15T13:30:30Z",
"updated_at": "2022-08-12T08:03:36Z",
"pushed_at": "2022-05-12T03:24:04Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"forks": 3,
"watchers": 6,
"score": 0
},
{
@ -41,10 +41,10 @@
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
"fork": false,
"created_at": "2022-05-14T09:27:06Z",
"updated_at": "2022-07-19T15:50:05Z",
"updated_at": "2022-08-12T09:12:16Z",
"pushed_at": "2022-05-14T20:56:39Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"watchers": 19,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false,
"created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-08-06T13:50:05Z",
"updated_at": "2022-08-12T06:36:54Z",
"pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 670,
"watchers_count": 670,
"stargazers_count": 671,
"watchers_count": 671,
"forks_count": 107,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 107,
"watchers": 670,
"watchers": 671,
"score": 0
},
{

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2022-08-11T19:33:02Z",
"updated_at": "2022-08-11T22:42:14Z",
"pushed_at": "2022-08-11T23:05:07Z",
"pushed_at": "2022-08-12T10:39:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -69,10 +69,10 @@
"description": "CVE",
"fork": false,
"created_at": "2022-08-10T03:21:19Z",
"updated_at": "2022-08-12T06:03:49Z",
"updated_at": "2022-08-12T06:49:39Z",
"pushed_at": "2022-08-10T03:25:06Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 19,
"watchers": 20,
"score": 0
}
]

View file

@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-12T03:25:42Z",
"updated_at": "2022-08-12T07:31:55Z",
"pushed_at": "2022-08-05T14:46:52Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 130,
"watchers_count": 130,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 128,
"watchers": 130,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2022-08-11T23:37:40Z",
"updated_at": "2022-08-12T12:08:21Z",
"pushed_at": "2022-08-11T19:25:11Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"webmin"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"forks": 4,
"watchers": 9,
"score": 0
}
]

View file

@ -13139,7 +13139,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [edvacco/CVE-2019-0708-POC](https://github.com/edvacco/CVE-2019-0708-POC)
- [pry0cc/BlueKeepTracker](https://github.com/pry0cc/BlueKeepTracker)
- [zjw88282740/CVE-2019-0708-win7](https://github.com/zjw88282740/CVE-2019-0708-win7)
- [hawk-520/CVE-2019-0708](https://github.com/hawk-520/CVE-2019-0708)
- [victor0013/CVE-2019-0708](https://github.com/victor0013/CVE-2019-0708)
- [herhe/CVE-2019-0708poc](https://github.com/herhe/CVE-2019-0708poc)
- [l9c/rdp0708scanner](https://github.com/l9c/rdp0708scanner)
- [major203/cve-2019-0708-scan](https://github.com/major203/cve-2019-0708-scan)
@ -17436,7 +17436,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628)
- [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect)
- [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading)
- [hawk-520/CVE-2018-2628](https://github.com/hawk-520/CVE-2018-2628)
- [victor0013/CVE-2018-2628](https://github.com/victor0013/CVE-2018-2628)
- [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628)
- [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all)
- [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628)