Auto Update 2022/08/12 12:17:59

This commit is contained in:
motikan2010-bot 2022-08-12 21:17:59 +09:00
parent eb136b9d3d
commit 00839e69da
43 changed files with 198 additions and 198 deletions

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -73,7 +73,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)", "description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false, "fork": false,
"created_at": "2016-02-09T21:30:34Z", "created_at": "2016-02-09T21:30:34Z",
"updated_at": "2022-06-14T15:30:41Z", "updated_at": "2022-08-12T10:12:07Z",
"pushed_at": "2016-05-09T17:53:48Z", "pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 329, "stargazers_count": 330,
"watchers_count": 329, "watchers_count": 330,
"forks_count": 151, "forks_count": 151,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 151, "forks": 151,
"watchers": 329, "watchers": 330,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
}, },
{ {

View file

@ -69,10 +69,10 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false, "fork": false,
"created_at": "2017-04-17T08:10:07Z", "created_at": "2017-04-17T08:10:07Z",
"updated_at": "2022-07-27T16:14:53Z", "updated_at": "2022-08-12T07:24:30Z",
"pushed_at": "2017-11-19T11:01:16Z", "pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 681, "stargazers_count": 683,
"watchers_count": 681, "watchers_count": 683,
"forks_count": 290, "forks_count": 290,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -80,7 +80,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 290, "forks": 290,
"watchers": 681, "watchers": 683,
"score": 0 "score": 0
}, },
{ {

View file

@ -41,10 +41,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -73,7 +73,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-01-06T01:11:32Z", "pushed_at": "2021-01-06T01:11:32Z",
"stargazers_count": 47, "stargazers_count": 47,
"watchers_count": 47, "watchers_count": 47,
"forks_count": 12, "forks_count": 11,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -29,7 +29,7 @@
"web-security" "web-security"
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 11,
"watchers": 47, "watchers": 47,
"score": 0 "score": 0
}, },

View file

@ -170,14 +170,14 @@
{ {
"id": 130153239, "id": 130153239,
"name": "CVE-2018-2628", "name": "CVE-2018-2628",
"full_name": "hawk-520\/CVE-2018-2628", "full_name": "victor0013\/CVE-2018-2628",
"owner": { "owner": {
"login": "hawk-520", "login": "victor0013",
"id": 37926610, "id": 37926610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4",
"html_url": "https:\/\/github.com\/hawk-520" "html_url": "https:\/\/github.com\/victor0013"
}, },
"html_url": "https:\/\/github.com\/hawk-520\/CVE-2018-2628", "html_url": "https:\/\/github.com\/victor0013\/CVE-2018-2628",
"description": "CVE-2018-2628", "description": "CVE-2018-2628",
"fork": false, "fork": false,
"created_at": "2018-04-19T03:19:15Z", "created_at": "2018-04-19T03:19:15Z",
@ -549,10 +549,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -581,7 +581,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ", "description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
"fork": false, "fork": false,
"created_at": "2018-05-10T20:46:30Z", "created_at": "2018-05-10T20:46:30Z",
"updated_at": "2021-10-11T12:09:19Z", "updated_at": "2022-08-12T08:53:08Z",
"pushed_at": "2018-05-10T20:47:59Z", "pushed_at": "2018-05-10T20:47:59Z",
"stargazers_count": 74, "stargazers_count": 75,
"watchers_count": 74, "watchers_count": 75,
"forks_count": 27, "forks_count": 27,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 27, "forks": 27,
"watchers": 74, "watchers": 75,
"score": 0 "score": 0
}, },
{ {
@ -97,10 +97,10 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).", "description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by leveraging SYSCALL to perform a local privilege escalation (LPE).",
"fork": false, "fork": false,
"created_at": "2018-08-08T20:04:56Z", "created_at": "2018-08-08T20:04:56Z",
"updated_at": "2022-07-27T07:09:48Z", "updated_at": "2022-08-12T08:53:12Z",
"pushed_at": "2018-08-08T20:12:20Z", "pushed_at": "2018-08-08T20:12:20Z",
"stargazers_count": 112, "stargazers_count": 113,
"watchers_count": 112, "watchers_count": 113,
"forks_count": 25, "forks_count": 25,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -108,7 +108,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 25, "forks": 25,
"watchers": 112, "watchers": 113,
"score": 0 "score": 0
} }
] ]

View file

@ -1252,14 +1252,14 @@
{ {
"id": 187946230, "id": 187946230,
"name": "CVE-2019-0708", "name": "CVE-2019-0708",
"full_name": "hawk-520\/CVE-2019-0708", "full_name": "victor0013\/CVE-2019-0708",
"owner": { "owner": {
"login": "hawk-520", "login": "victor0013",
"id": 37926610, "id": 37926610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4", "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37926610?v=4",
"html_url": "https:\/\/github.com\/hawk-520" "html_url": "https:\/\/github.com\/victor0013"
}, },
"html_url": "https:\/\/github.com\/hawk-520\/CVE-2019-0708", "html_url": "https:\/\/github.com\/victor0013\/CVE-2019-0708",
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false, "fork": false,
"created_at": "2019-05-22T02:16:28Z", "created_at": "2019-05-22T02:16:28Z",

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-15107 Webmin RCE (unauthorized)", "description": "CVE-2019-15107 Webmin RCE (unauthorized)",
"fork": false, "fork": false,
"created_at": "2019-08-19T07:43:16Z", "created_at": "2019-08-19T07:43:16Z",
"updated_at": "2022-07-11T13:37:48Z", "updated_at": "2022-08-12T06:57:31Z",
"pushed_at": "2019-09-02T16:06:19Z", "pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 51, "stargazers_count": 52,
"watchers_count": 51, "watchers_count": 52,
"forks_count": 19, "forks_count": 19,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 19,
"watchers": 51, "watchers": 52,
"score": 0 "score": 0
}, },
{ {

View file

@ -41,11 +41,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T01:42:08Z", "updated_at": "2022-08-12T06:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3478, "stargazers_count": 3479,
"watchers_count": 3478, "watchers_count": 3479,
"forks_count": 1023, "forks_count": 1025,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -71,8 +71,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 1023, "forks": 1025,
"watchers": 3478, "watchers": 3479,
"score": 0 "score": 0
}, },
{ {

View file

@ -181,10 +181,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -213,7 +213,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF", "description": "Zimbra RCE PoC - CVE-2019-9670 XXE\/SSRF",
"fork": false, "fork": false,
"created_at": "2019-08-16T04:37:11Z", "created_at": "2019-08-16T04:37:11Z",
"updated_at": "2022-06-10T10:41:04Z", "updated_at": "2022-08-12T09:24:15Z",
"pushed_at": "2019-08-16T05:54:16Z", "pushed_at": "2019-08-16T05:54:16Z",
"stargazers_count": 16, "stargazers_count": 17,
"watchers_count": 16, "watchers_count": 17,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 16, "watchers": 17,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T01:42:08Z", "updated_at": "2022-08-12T06:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3478, "stargazers_count": 3479,
"watchers_count": 3478, "watchers_count": 3479,
"forks_count": 1023, "forks_count": 1025,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"webshell" "webshell"
], ],
"visibility": "public", "visibility": "public",
"forks": 1023, "forks": 1025,
"watchers": 3478, "watchers": 3479,
"score": 0 "score": 0
}, },
{ {

View file

@ -69,10 +69,10 @@
"description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow", "description": "Techniques based on named pipes for pool overflow exploitation targeting the most recent (and oldest) Windows versions demonstrated on CVE-2020-17087 and an off-by-one overflow",
"fork": false, "fork": false,
"created_at": "2021-07-02T16:03:16Z", "created_at": "2021-07-02T16:03:16Z",
"updated_at": "2022-07-02T02:17:56Z", "updated_at": "2022-08-12T09:25:09Z",
"pushed_at": "2021-08-15T16:41:05Z", "pushed_at": "2021-08-15T16:41:05Z",
"stargazers_count": 131, "stargazers_count": 132,
"watchers_count": 131, "watchers_count": 132,
"forks_count": 39, "forks_count": 39,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -80,7 +80,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 39, "forks": 39,
"watchers": 131, "watchers": 132,
"score": 0 "score": 0
} }
] ]

View file

@ -69,10 +69,10 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc", "description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false, "fork": false,
"created_at": "2020-02-20T17:57:54Z", "created_at": "2020-02-20T17:57:54Z",
"updated_at": "2022-07-20T14:31:17Z", "updated_at": "2022-08-12T10:22:47Z",
"pushed_at": "2020-02-23T17:06:06Z", "pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 96, "stargazers_count": 97,
"watchers_count": 96, "watchers_count": 97,
"forks_count": 69, "forks_count": 69,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -80,7 +80,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 69, "forks": 69,
"watchers": 96, "watchers": 97,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-08-12T03:21:58Z", "updated_at": "2022-08-12T07:28:34Z",
"pushed_at": "2022-07-17T12:41:46Z", "pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1469, "stargazers_count": 1471,
"watchers_count": 1469, "watchers_count": 1471,
"forks_count": 303, "forks_count": 303,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -45,7 +45,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 303, "forks": 303,
"watchers": 1469, "watchers": 1471,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Weblogic coherence.jar RCE", "description": "Weblogic coherence.jar RCE",
"fork": false, "fork": false,
"created_at": "2020-05-10T09:04:43Z", "created_at": "2020-05-10T09:04:43Z",
"updated_at": "2022-08-12T02:41:48Z", "updated_at": "2022-08-12T10:46:14Z",
"pushed_at": "2020-05-10T09:29:36Z", "pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 178, "stargazers_count": 179,
"watchers_count": 178, "watchers_count": 179,
"forks_count": 41, "forks_count": 41,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -29,7 +29,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 41, "forks": 41,
"watchers": 178, "watchers": 179,
"score": 0 "score": 0
}, },
{ {

View file

@ -86,10 +86,10 @@
"description": "CVE-2021-21972 Exploit", "description": "CVE-2021-21972 Exploit",
"fork": false, "fork": false,
"created_at": "2021-02-24T11:14:58Z", "created_at": "2021-02-24T11:14:58Z",
"updated_at": "2022-08-10T03:05:42Z", "updated_at": "2022-08-12T07:18:51Z",
"pushed_at": "2021-12-30T12:26:11Z", "pushed_at": "2021-12-30T12:26:11Z",
"stargazers_count": 396, "stargazers_count": 397,
"watchers_count": 396, "watchers_count": 397,
"forks_count": 138, "forks_count": 138,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -99,7 +99,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 138, "forks": 138,
"watchers": 396, "watchers": 397,
"score": 0 "score": 0
}, },
{ {

View file

@ -181,10 +181,10 @@
"description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP", "description": "S2-061\/S2-062 Struts2 远程命令执行漏洞 POC&EXP",
"fork": false, "fork": false,
"created_at": "2022-07-10T14:48:52Z", "created_at": "2022-07-10T14:48:52Z",
"updated_at": "2022-07-15T06:58:15Z", "updated_at": "2022-08-12T06:42:15Z",
"pushed_at": "2022-07-23T15:31:30Z", "pushed_at": "2022-07-23T15:31:30Z",
"stargazers_count": 1, "stargazers_count": 2,
"watchers_count": 1, "watchers_count": 2,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -192,7 +192,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 1, "watchers": 2,
"score": 0 "score": 0
} }
] ]

View file

@ -79,13 +79,13 @@
"pushed_at": "2022-06-08T04:00:28Z", "pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1629, "stargazers_count": 1629,
"watchers_count": 1629, "watchers_count": 1629,
"forks_count": 479, "forks_count": 478,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 479, "forks": 478,
"watchers": 1629, "watchers": 1629,
"score": 0 "score": 0
}, },
@ -159,10 +159,10 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)", "description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false, "fork": false,
"created_at": "2022-01-26T00:56:36Z", "created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-08-09T14:17:48Z", "updated_at": "2022-08-12T11:37:52Z",
"pushed_at": "2022-02-12T05:22:58Z", "pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 898, "stargazers_count": 900,
"watchers_count": 898, "watchers_count": 900,
"forks_count": 291, "forks_count": 291,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -174,7 +174,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 291, "forks": 291,
"watchers": 898, "watchers": 900,
"score": 0 "score": 0
}, },
{ {
@ -906,10 +906,10 @@
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation", "description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
"fork": false, "fork": false,
"created_at": "2022-01-26T14:26:10Z", "created_at": "2022-01-26T14:26:10Z",
"updated_at": "2022-08-09T14:17:34Z", "updated_at": "2022-08-12T09:17:01Z",
"pushed_at": "2022-06-21T14:52:05Z", "pushed_at": "2022-06-21T14:52:05Z",
"stargazers_count": 584, "stargazers_count": 585,
"watchers_count": 584, "watchers_count": 585,
"forks_count": 119, "forks_count": 119,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -919,7 +919,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 119, "forks": 119,
"watchers": 584, "watchers": 585,
"score": 0 "score": 0
}, },
{ {
@ -1277,10 +1277,10 @@
"description": "Proof of Concept (PoC) CVE-2021-4034 ", "description": "Proof of Concept (PoC) CVE-2021-4034 ",
"fork": false, "fork": false,
"created_at": "2022-01-26T18:01:26Z", "created_at": "2022-01-26T18:01:26Z",
"updated_at": "2022-07-16T13:46:40Z", "updated_at": "2022-08-12T09:17:15Z",
"pushed_at": "2022-02-07T15:42:00Z", "pushed_at": "2022-02-07T15:42:00Z",
"stargazers_count": 51, "stargazers_count": 52,
"watchers_count": 51, "watchers_count": 52,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1304,7 +1304,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 51, "watchers": 52,
"score": 0 "score": 0
}, },
{ {

View file

@ -469,10 +469,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-08-10T17:14:48Z", "updated_at": "2022-08-12T11:21:24Z",
"pushed_at": "2022-01-15T16:18:44Z", "pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 838, "stargazers_count": 840,
"watchers_count": 838, "watchers_count": 840,
"forks_count": 129, "forks_count": 129,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -500,7 +500,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 129, "forks": 129,
"watchers": 838, "watchers": 840,
"score": 0 "score": 0
}, },
{ {
@ -647,10 +647,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks", "description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false, "fork": false,
"created_at": "2021-12-11T07:19:11Z", "created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-08-11T13:23:06Z", "updated_at": "2022-08-12T09:53:02Z",
"pushed_at": "2022-06-02T02:16:13Z", "pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 485, "stargazers_count": 486,
"watchers_count": 485, "watchers_count": 486,
"forks_count": 96, "forks_count": 96,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -663,7 +663,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 96, "forks": 96,
"watchers": 485, "watchers": 486,
"score": 0 "score": 0
}, },
{ {
@ -1782,13 +1782,13 @@
"pushed_at": "2022-07-20T08:14:48Z", "pushed_at": "2022-07-20T08:14:48Z",
"stargazers_count": 3011, "stargazers_count": 3011,
"watchers_count": 3011, "watchers_count": 3011,
"forks_count": 725, "forks_count": 726,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 725, "forks": 726,
"watchers": 3011, "watchers": 3011,
"score": 0 "score": 0
}, },

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-07-23T23:14:02Z", "pushed_at": "2022-07-23T23:14:02Z",
"stargazers_count": 60, "stargazers_count": 60,
"watchers_count": 60, "watchers_count": 60,
"forks_count": 24, "forks_count": 23,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 24, "forks": 23,
"watchers": 60, "watchers": 60,
"score": 0 "score": 0
}, },

View file

@ -1135,10 +1135,10 @@
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.", "description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
"fork": false, "fork": false,
"created_at": "2022-03-12T20:57:24Z", "created_at": "2022-03-12T20:57:24Z",
"updated_at": "2022-08-10T14:10:40Z", "updated_at": "2022-08-12T08:54:46Z",
"pushed_at": "2022-06-13T19:33:08Z", "pushed_at": "2022-06-13T19:33:08Z",
"stargazers_count": 298, "stargazers_count": 297,
"watchers_count": 298, "watchers_count": 297,
"forks_count": 83, "forks_count": 83,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1146,7 +1146,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 83, "forks": 83,
"watchers": 298, "watchers": 297,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-03T08:39:29Z", "pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 309, "stargazers_count": 309,
"watchers_count": 309, "watchers_count": 309,
"forks_count": 130, "forks_count": 132,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 130, "forks": 132,
"watchers": 309, "watchers": 309,
"score": 0 "score": 0
} }

View file

@ -13,11 +13,11 @@
"description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability", "description": "baton drop (CVE-2022-21894): Secure Boot Security Feature Bypass Vulnerability",
"fork": false, "fork": false,
"created_at": "2022-08-09T15:53:48Z", "created_at": "2022-08-09T15:53:48Z",
"updated_at": "2022-08-12T03:51:21Z", "updated_at": "2022-08-12T10:50:27Z",
"pushed_at": "2022-08-10T15:34:50Z", "pushed_at": "2022-08-10T15:34:50Z",
"stargazers_count": 13, "stargazers_count": 14,
"watchers_count": 13, "watchers_count": 14,
"forks_count": 3, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -29,8 +29,8 @@
"windows-boot" "windows-boot"
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 4,
"watchers": 13, "watchers": 14,
"score": 0 "score": 0
} }
] ]

View file

@ -13,11 +13,11 @@
"description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)", "description": "Exploit for CVE-2022-21999 - Windows Print Spooler Elevation of Privilege Vulnerability (LPE)",
"fork": false, "fork": false,
"created_at": "2022-02-08T17:25:44Z", "created_at": "2022-02-08T17:25:44Z",
"updated_at": "2022-08-12T01:40:28Z", "updated_at": "2022-08-12T10:03:52Z",
"pushed_at": "2022-02-09T16:54:09Z", "pushed_at": "2022-02-09T16:54:09Z",
"stargazers_count": 630, "stargazers_count": 631,
"watchers_count": 630, "watchers_count": 631,
"forks_count": 128, "forks_count": 129,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -26,8 +26,8 @@
"cve-2022-22718" "cve-2022-22718"
], ],
"visibility": "public", "visibility": "public",
"forks": 128, "forks": 129,
"watchers": 630, "watchers": 631,
"score": 0 "score": 0
} }
] ]

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-04-05T05:11:29Z", "pushed_at": "2022-04-05T05:11:29Z",
"stargazers_count": 109, "stargazers_count": 109,
"watchers_count": 109, "watchers_count": 109,
"forks_count": 19, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 19, "forks": 20,
"watchers": 109, "watchers": 109,
"score": 0 "score": 0
} }

View file

@ -51,10 +51,10 @@
"description": "CVE-2022-22963 PoC ", "description": "CVE-2022-22963 PoC ",
"fork": false, "fork": false,
"created_at": "2022-03-30T05:04:24Z", "created_at": "2022-03-30T05:04:24Z",
"updated_at": "2022-08-02T07:21:43Z", "updated_at": "2022-08-12T09:21:23Z",
"pushed_at": "2022-03-30T06:01:04Z", "pushed_at": "2022-03-30T06:01:04Z",
"stargazers_count": 99, "stargazers_count": 100,
"watchers_count": 99, "watchers_count": 100,
"forks_count": 36, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -62,7 +62,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 36,
"watchers": 99, "watchers": 100,
"score": 0 "score": 0
}, },
{ {

View file

@ -211,10 +211,10 @@
"description": "spring框架RCE漏洞 CVE-2022-22965", "description": "spring框架RCE漏洞 CVE-2022-22965",
"fork": false, "fork": false,
"created_at": "2022-03-31T12:41:29Z", "created_at": "2022-03-31T12:41:29Z",
"updated_at": "2022-06-17T02:49:28Z", "updated_at": "2022-08-12T11:57:26Z",
"pushed_at": "2022-04-22T07:37:16Z", "pushed_at": "2022-04-22T07:37:16Z",
"stargazers_count": 29, "stargazers_count": 30,
"watchers_count": 29, "watchers_count": 30,
"forks_count": 8, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -222,7 +222,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 8, "forks": 8,
"watchers": 29, "watchers": 30,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2022-24654", "description": "PoC for CVE-2022-24654",
"fork": false, "fork": false,
"created_at": "2022-08-11T15:06:49Z", "created_at": "2022-08-11T15:06:49Z",
"updated_at": "2022-08-11T15:22:54Z", "updated_at": "2022-08-12T07:16:48Z",
"pushed_at": "2022-08-11T15:09:47Z", "pushed_at": "2022-08-11T15:09:47Z",
"stargazers_count": 0, "stargazers_count": 1,
"watchers_count": 0, "watchers_count": 1,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 0, "watchers": 1,
"score": 0 "score": 0
} }
] ]

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2022-04-16T19:41:15Z", "created_at": "2022-04-16T19:41:15Z",
"updated_at": "2022-04-16T19:41:15Z", "updated_at": "2022-04-16T19:41:15Z",
"pushed_at": "2022-04-16T19:44:48Z", "pushed_at": "2022-08-12T09:05:20Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588", "description": "exploit for CVE-2022-2588",
"fork": false, "fork": false,
"created_at": "2022-08-11T06:01:24Z", "created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-12T03:28:56Z", "updated_at": "2022-08-12T08:53:39Z",
"pushed_at": "2022-08-11T06:04:18Z", "pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 12, "stargazers_count": 17,
"watchers_count": 12, "watchers_count": 17,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 12, "watchers": 17,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.", "description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification.",
"fork": false, "fork": false,
"created_at": "2022-05-09T12:07:51Z", "created_at": "2022-05-09T12:07:51Z",
"updated_at": "2022-08-03T18:13:07Z", "updated_at": "2022-08-12T07:22:18Z",
"pushed_at": "2022-05-11T02:02:59Z", "pushed_at": "2022-05-11T02:02:59Z",
"stargazers_count": 139, "stargazers_count": 140,
"watchers_count": 139, "watchers_count": 140,
"forks_count": 36, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -26,7 +26,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 36, "forks": 36,
"watchers": 139, "watchers": 140,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。", "description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false, "fork": false,
"created_at": "2022-05-31T07:44:01Z", "created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-12T04:32:59Z", "updated_at": "2022-08-12T09:32:43Z",
"pushed_at": "2022-08-11T09:35:18Z", "pushed_at": "2022-08-11T09:35:18Z",
"stargazers_count": 628, "stargazers_count": 633,
"watchers_count": 628, "watchers_count": 633,
"forks_count": 117, "forks_count": 120,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -43,8 +43,8 @@
"gui" "gui"
], ],
"visibility": "public", "visibility": "public",
"forks": 117, "forks": 120,
"watchers": 628, "watchers": 633,
"score": 0 "score": 0
}, },
{ {

View file

@ -640,10 +640,10 @@
"description": "警惕 一种针对红队的新型溯源手段!", "description": "警惕 一种针对红队的新型溯源手段!",
"fork": false, "fork": false,
"created_at": "2022-07-27T15:48:19Z", "created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-08-10T07:16:31Z", "updated_at": "2022-08-12T07:43:34Z",
"pushed_at": "2022-07-27T15:55:01Z", "pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 288, "stargazers_count": 289,
"watchers_count": 288, "watchers_count": 289,
"forks_count": 64, "forks_count": 64,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -651,7 +651,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 64, "forks": 64,
"watchers": 288, "watchers": 289,
"score": 0 "score": 0
} }
] ]

View file

@ -13,18 +13,18 @@
"description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services", "description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services",
"fork": false, "fork": false,
"created_at": "2022-05-12T02:31:50Z", "created_at": "2022-05-12T02:31:50Z",
"updated_at": "2022-06-15T13:30:30Z", "updated_at": "2022-08-12T08:03:36Z",
"pushed_at": "2022-05-12T03:24:04Z", "pushed_at": "2022-05-12T03:24:04Z",
"stargazers_count": 5, "stargazers_count": 6,
"watchers_count": 5, "watchers_count": 6,
"forks_count": 2, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 2, "forks": 3,
"watchers": 5, "watchers": 6,
"score": 0 "score": 0
}, },
{ {
@ -41,10 +41,10 @@
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.", "description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
"fork": false, "fork": false,
"created_at": "2022-05-14T09:27:06Z", "created_at": "2022-05-14T09:27:06Z",
"updated_at": "2022-07-19T15:50:05Z", "updated_at": "2022-08-12T09:12:16Z",
"pushed_at": "2022-05-14T20:56:39Z", "pushed_at": "2022-05-14T20:56:39Z",
"stargazers_count": 17, "stargazers_count": 19,
"watchers_count": 17, "watchers_count": 19,
"forks_count": 6, "forks_count": 6,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -52,7 +52,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 6,
"watchers": 17, "watchers": 19,
"score": 0 "score": 0
} }
] ]

View file

@ -13,10 +13,10 @@
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.", "description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
"fork": false, "fork": false,
"created_at": "2022-04-15T22:59:03Z", "created_at": "2022-04-15T22:59:03Z",
"updated_at": "2022-08-06T13:50:05Z", "updated_at": "2022-08-12T06:36:54Z",
"pushed_at": "2022-04-22T11:26:31Z", "pushed_at": "2022-04-22T11:26:31Z",
"stargazers_count": 670, "stargazers_count": 671,
"watchers_count": 670, "watchers_count": 671,
"forks_count": 107, "forks_count": 107,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -24,7 +24,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 107, "forks": 107,
"watchers": 670, "watchers": 671,
"score": 0 "score": 0
}, },
{ {

View file

@ -14,7 +14,7 @@
"fork": false, "fork": false,
"created_at": "2022-08-11T19:33:02Z", "created_at": "2022-08-11T19:33:02Z",
"updated_at": "2022-08-11T22:42:14Z", "updated_at": "2022-08-11T22:42:14Z",
"pushed_at": "2022-08-11T23:05:07Z", "pushed_at": "2022-08-12T10:39:48Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -69,10 +69,10 @@
"description": "CVE", "description": "CVE",
"fork": false, "fork": false,
"created_at": "2022-08-10T03:21:19Z", "created_at": "2022-08-10T03:21:19Z",
"updated_at": "2022-08-12T06:03:49Z", "updated_at": "2022-08-12T06:49:39Z",
"pushed_at": "2022-08-10T03:25:06Z", "pushed_at": "2022-08-10T03:25:06Z",
"stargazers_count": 19, "stargazers_count": 20,
"watchers_count": 19, "watchers_count": 20,
"forks_count": 5, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -80,7 +80,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 5, "forks": 5,
"watchers": 19, "watchers": 20,
"score": 0 "score": 0
} }
] ]

View file

@ -153,10 +153,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC", "description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false, "fork": false,
"created_at": "2022-08-02T09:52:02Z", "created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-12T03:25:42Z", "updated_at": "2022-08-12T07:31:55Z",
"pushed_at": "2022-08-05T14:46:52Z", "pushed_at": "2022-08-05T14:46:52Z",
"stargazers_count": 128, "stargazers_count": 130,
"watchers_count": 128, "watchers_count": 130,
"forks_count": 22, "forks_count": 22,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -164,7 +164,7 @@
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 22, "forks": 22,
"watchers": 128, "watchers": 130,
"score": 0 "score": 0
} }
] ]

View file

@ -13,11 +13,11 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.", "description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false, "fork": false,
"created_at": "2022-08-11T11:47:17Z", "created_at": "2022-08-11T11:47:17Z",
"updated_at": "2022-08-11T23:37:40Z", "updated_at": "2022-08-12T12:08:21Z",
"pushed_at": "2022-08-11T19:25:11Z", "pushed_at": "2022-08-11T19:25:11Z",
"stargazers_count": 5, "stargazers_count": 9,
"watchers_count": 5, "watchers_count": 9,
"forks_count": 0, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"web_commit_signoff_required": false, "web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"webmin" "webmin"
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 4,
"watchers": 5, "watchers": 9,
"score": 0 "score": 0
} }
] ]

View file

@ -13139,7 +13139,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [edvacco/CVE-2019-0708-POC](https://github.com/edvacco/CVE-2019-0708-POC) - [edvacco/CVE-2019-0708-POC](https://github.com/edvacco/CVE-2019-0708-POC)
- [pry0cc/BlueKeepTracker](https://github.com/pry0cc/BlueKeepTracker) - [pry0cc/BlueKeepTracker](https://github.com/pry0cc/BlueKeepTracker)
- [zjw88282740/CVE-2019-0708-win7](https://github.com/zjw88282740/CVE-2019-0708-win7) - [zjw88282740/CVE-2019-0708-win7](https://github.com/zjw88282740/CVE-2019-0708-win7)
- [hawk-520/CVE-2019-0708](https://github.com/hawk-520/CVE-2019-0708) - [victor0013/CVE-2019-0708](https://github.com/victor0013/CVE-2019-0708)
- [herhe/CVE-2019-0708poc](https://github.com/herhe/CVE-2019-0708poc) - [herhe/CVE-2019-0708poc](https://github.com/herhe/CVE-2019-0708poc)
- [l9c/rdp0708scanner](https://github.com/l9c/rdp0708scanner) - [l9c/rdp0708scanner](https://github.com/l9c/rdp0708scanner)
- [major203/cve-2019-0708-scan](https://github.com/major203/cve-2019-0708-scan) - [major203/cve-2019-0708-scan](https://github.com/major203/cve-2019-0708-scan)
@ -17436,7 +17436,7 @@ Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middlewar
- [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628) - [jiansiting/weblogic-cve-2018-2628](https://github.com/jiansiting/weblogic-cve-2018-2628)
- [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect) - [zjxzjx/CVE-2018-2628-detect](https://github.com/zjxzjx/CVE-2018-2628-detect)
- [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading) - [aedoo/CVE-2018-2628-MultiThreading](https://github.com/aedoo/CVE-2018-2628-MultiThreading)
- [hawk-520/CVE-2018-2628](https://github.com/hawk-520/CVE-2018-2628) - [victor0013/CVE-2018-2628](https://github.com/victor0013/CVE-2018-2628)
- [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628) - [9uest/CVE-2018-2628](https://github.com/9uest/CVE-2018-2628)
- [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all) - [Shadowshusky/CVE-2018-2628all](https://github.com/Shadowshusky/CVE-2018-2628all)
- [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628) - [shaoshore/CVE-2018-2628](https://github.com/shaoshore/CVE-2018-2628)