Auto Update 2025/01/19 12:31:58

This commit is contained in:
motikan2010-bot 2025-01-19 21:31:58 +09:00
parent 9c1dec1ee1
commit 05915f36a9
39 changed files with 224 additions and 128 deletions

View file

@ -14,10 +14,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2025-01-18T02:52:19Z",
"updated_at": "2025-01-19T07:23:08Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2305,
"watchers_count": 2305,
"stargazers_count": 2306,
"watchers_count": 2306,
"has_discussions": false,
"forks_count": 462,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 462,
"watchers": 2305,
"watchers": 2306,
"score": 0,
"subscribers_count": 117
},

View file

@ -182,7 +182,7 @@
"fork": false,
"created_at": "2024-11-14T04:35:59Z",
"updated_at": "2025-01-05T15:26:10Z",
"pushed_at": "2025-01-18T15:32:25Z",
"pushed_at": "2025-01-19T11:50:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 34,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 32,
"watchers": 57,
"score": 0,
"subscribers_count": 6

View file

@ -19,7 +19,7 @@
"stargazers_count": 465,
"watchers_count": 465,
"has_discussions": false,
"forks_count": 185,
"forks_count": 184,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,7 +30,7 @@
"poc"
],
"visibility": "public",
"forks": 185,
"forks": 184,
"watchers": 465,
"score": 0,
"subscribers_count": 45

View file

@ -19,13 +19,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 34,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 32,
"watchers": 57,
"score": 0,
"subscribers_count": 6

View file

@ -19,13 +19,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 34,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 32,
"watchers": 57,
"score": 0,
"subscribers_count": 6

View file

@ -19,13 +19,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 34,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 32,
"watchers": 57,
"score": 0,
"subscribers_count": 6

View file

@ -132,13 +132,13 @@
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 62,
"forks_count": 63,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 62,
"forks": 63,
"watchers": 182,
"score": 0,
"subscribers_count": 13

View file

@ -45,10 +45,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2025-01-17T04:40:16Z",
"updated_at": "2025-01-19T08:43:02Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1750,
"watchers_count": 1750,
"stargazers_count": 1751,
"watchers_count": 1751,
"has_discussions": false,
"forks_count": 358,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 358,
"watchers": 1750,
"watchers": 1751,
"score": 0,
"subscribers_count": 86
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 34,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 34,
"forks": 32,
"watchers": 57,
"score": 0,
"subscribers_count": 6

View file

@ -364,7 +364,7 @@
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 20,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -385,7 +385,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 20,
"forks": 21,
"watchers": 99,
"score": 0,
"subscribers_count": 1

View file

@ -249,13 +249,13 @@
"stargazers_count": 789,
"watchers_count": 789,
"has_discussions": false,
"forks_count": 122,
"forks_count": 123,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 122,
"forks": 123,
"watchers": 789,
"score": 0,
"subscribers_count": 10

View file

@ -14,10 +14,10 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2025-01-03T19:16:15Z",
"updated_at": "2025-01-19T11:27:43Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 463,
"watchers_count": 463,
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 93,
"watchers": 463,
"watchers": 464,
"score": 0,
"subscribers_count": 14
},

View file

@ -1467,10 +1467,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2025-01-11T20:21:07Z",
"updated_at": "2025-01-19T07:23:11Z",
"pushed_at": "2022-04-07T14:47:03Z",
"stargazers_count": 853,
"watchers_count": 853,
"stargazers_count": 854,
"watchers_count": 854,
"has_discussions": false,
"forks_count": 173,
"allow_forking": true,
@ -1492,7 +1492,7 @@
],
"visibility": "public",
"forks": 173,
"watchers": 853,
"watchers": 854,
"score": 0,
"subscribers_count": 33
},
@ -3754,13 +3754,13 @@
"stargazers_count": 3408,
"watchers_count": 3408,
"has_discussions": true,
"forks_count": 739,
"forks_count": 740,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 739,
"forks": 740,
"watchers": 3408,
"score": 0,
"subscribers_count": 55
@ -6824,13 +6824,13 @@
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 43,
"score": 0,
"subscribers_count": 3

View file

@ -14,7 +14,7 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2025-01-15T02:18:02Z",
"updated_at": "2025-01-19T08:00:07Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1177,
"watchers_count": 1177,

View file

@ -805,8 +805,8 @@
"description": "Research repository tracking affected IPs from the Fortigate CVE-2022-40684 configuration leak by Belsen Group",
"fork": false,
"created_at": "2025-01-18T15:32:21Z",
"updated_at": "2025-01-19T06:07:44Z",
"pushed_at": "2025-01-19T06:07:42Z",
"updated_at": "2025-01-19T12:15:20Z",
"pushed_at": "2025-01-19T12:15:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": "Original PoC for CVE-2023-32784",
"fork": false,
"created_at": "2023-05-01T17:08:55Z",
"updated_at": "2025-01-12T11:49:13Z",
"updated_at": "2025-01-19T12:20:11Z",
"pushed_at": "2023-08-17T19:26:55Z",
"stargazers_count": 632,
"watchers_count": 632,
"stargazers_count": 633,
"watchers_count": 633,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 57,
"watchers": 632,
"watchers": 633,
"score": 0,
"subscribers_count": 11
},

View file

@ -286,5 +286,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918932062,
"name": "Ivanti-Secure-Connect-Logs-Parser",
"full_name": "Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"owner": {
"login": "Hexastrike",
"id": 168469680,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168469680?v=4",
"html_url": "https:\/\/github.com\/Hexastrike",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"description": "A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.",
"fork": false,
"created_at": "2025-01-19T09:02:37Z",
"updated_at": "2025-01-19T11:33:26Z",
"pushed_at": "2025-01-19T11:33:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -14,10 +14,10 @@
"description": "LPE exploit for CVE-2024-0582 (io_uring)",
"fork": false,
"created_at": "2024-03-29T14:45:22Z",
"updated_at": "2025-01-09T08:03:23Z",
"updated_at": "2025-01-19T11:07:40Z",
"pushed_at": "2024-03-29T16:05:31Z",
"stargazers_count": 95,
"watchers_count": 95,
"stargazers_count": 96,
"watchers_count": 96,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 95,
"watchers": 96,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-11477 7Zip Code Execution Writeup and Analysis",
"fork": false,
"created_at": "2024-11-29T06:13:36Z",
"updated_at": "2025-01-10T12:44:00Z",
"updated_at": "2025-01-19T10:20:08Z",
"pushed_at": "2024-12-04T01:01:28Z",
"stargazers_count": 49,
"watchers_count": 49,
"stargazers_count": 51,
"watchers_count": 51,
"has_discussions": false,
"forks_count": 11,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 49,
"forks": 12,
"watchers": 51,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-13375 Unverified Password Change",
"fork": false,
"created_at": "2025-01-18T10:35:47Z",
"updated_at": "2025-01-18T14:00:19Z",
"updated_at": "2025-01-19T10:00:43Z",
"pushed_at": "2025-01-18T10:48:52Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-03-08T02:31:41Z",
"updated_at": "2024-12-12T13:01:40Z",
"updated_at": "2025-01-19T11:33:01Z",
"pushed_at": "2024-03-12T13:33:58Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 1
}

View file

@ -45,10 +45,10 @@
"description": "Microsoft-Outlook-Remote-Code-Execution-Vulnerability",
"fork": false,
"created_at": "2024-02-16T15:17:59Z",
"updated_at": "2025-01-13T20:14:32Z",
"updated_at": "2025-01-19T07:52:59Z",
"pushed_at": "2024-02-19T20:00:35Z",
"stargazers_count": 708,
"watchers_count": 708,
"stargazers_count": 709,
"watchers_count": 709,
"has_discussions": false,
"forks_count": 155,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 155,
"watchers": 708,
"watchers": 709,
"score": 0,
"subscribers_count": 10
},

View file

@ -246,5 +246,36 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 918932062,
"name": "Ivanti-Secure-Connect-Logs-Parser",
"full_name": "Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"owner": {
"login": "Hexastrike",
"id": 168469680,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168469680?v=4",
"html_url": "https:\/\/github.com\/Hexastrike",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"description": "A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.",
"fork": false,
"created_at": "2025-01-19T09:02:37Z",
"updated_at": "2025-01-19T11:33:26Z",
"pushed_at": "2025-01-19T11:33:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -76,10 +76,10 @@
"description": "CVE-2024-23897",
"fork": false,
"created_at": "2024-01-26T09:44:32Z",
"updated_at": "2024-12-27T15:16:52Z",
"updated_at": "2025-01-19T07:54:37Z",
"pushed_at": "2024-01-28T06:47:28Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 198,
"watchers_count": 198,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 197,
"watchers": 198,
"score": 0,
"subscribers_count": 2
},

View file

@ -293,10 +293,10 @@
"description": "CVE-2024-3400 Palo Alto OS Command Injection",
"fork": false,
"created_at": "2024-04-16T14:18:08Z",
"updated_at": "2025-01-08T03:40:00Z",
"updated_at": "2025-01-19T11:59:57Z",
"pushed_at": "2024-04-16T22:35:43Z",
"stargazers_count": 152,
"watchers_count": 152,
"stargazers_count": 153,
"watchers_count": 153,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -305,7 +305,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 152,
"watchers": 153,
"score": 0,
"subscribers_count": 1
},

View file

@ -525,8 +525,8 @@
"description": "Magento 2 patch for CVE-2024-34102(aka CosmicSting). Another way(as an extension) to hotfix the security hole if you cannot apply the official patch or cannot upgrade Magento.",
"fork": false,
"created_at": "2024-08-08T07:47:24Z",
"updated_at": "2024-10-25T10:44:59Z",
"pushed_at": "2024-08-08T08:31:17Z",
"updated_at": "2025-01-19T10:50:52Z",
"pushed_at": "2025-01-19T11:03:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -265,10 +265,10 @@
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
"fork": false,
"created_at": "2024-08-24T18:25:46Z",
"updated_at": "2025-01-18T21:21:39Z",
"updated_at": "2025-01-19T07:54:18Z",
"pushed_at": "2024-08-27T12:22:39Z",
"stargazers_count": 644,
"watchers_count": 644,
"stargazers_count": 645,
"watchers_count": 645,
"has_discussions": false,
"forks_count": 116,
"allow_forking": true,
@ -277,7 +277,7 @@
"topics": [],
"visibility": "public",
"forks": 116,
"watchers": 644,
"watchers": 645,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-08-09T01:24:59Z",
"updated_at": "2024-12-15T09:56:35Z",
"updated_at": "2025-01-19T07:53:54Z",
"pushed_at": "2024-08-09T01:19:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 223,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 223,
"watchers": 7,
"watchers": 8,
"score": 0,
"subscribers_count": 0
},
@ -45,10 +45,10 @@
"description": "RDL的堆溢出导致的RCE",
"fork": false,
"created_at": "2024-08-09T05:00:44Z",
"updated_at": "2024-12-11T02:09:40Z",
"updated_at": "2025-01-19T07:54:04Z",
"pushed_at": "2024-08-14T04:43:05Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 210,
"watchers": 211,
"score": 0,
"subscribers_count": 5
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-41570: Havoc C2 0.7 Teamserver SSRF exploit",
"fork": false,
"created_at": "2024-07-13T19:54:27Z",
"updated_at": "2025-01-19T02:19:25Z",
"updated_at": "2025-01-19T07:06:11Z",
"pushed_at": "2024-09-11T20:00:46Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 39,
"watchers": 40,
"score": 0,
"subscribers_count": 1
}

View file

@ -169,19 +169,19 @@
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
"fork": false,
"created_at": "2024-06-07T09:52:54Z",
"updated_at": "2025-01-08T00:45:04Z",
"updated_at": "2025-01-19T07:54:45Z",
"pushed_at": "2024-06-22T15:13:52Z",
"stargazers_count": 244,
"watchers_count": 244,
"stargazers_count": 246,
"watchers_count": 246,
"has_discussions": false,
"forks_count": 53,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 244,
"forks": 54,
"watchers": 246,
"score": 0,
"subscribers_count": 4
},

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-18T21:45:13Z",
"updated_at": "2025-01-19T10:46:14Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 450,
"watchers_count": 450,
"stargazers_count": 452,
"watchers_count": 452,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 450,
"watchers": 452,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-01-18T21:47:05Z",
"updated_at": "2025-01-19T10:23:08Z",
"pushed_at": "2025-01-18T11:08:28Z",
"stargazers_count": 153,
"watchers_count": 153,
"stargazers_count": 156,
"watchers_count": 156,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 153,
"watchers": 156,
"score": 0,
"subscribers_count": 2
}

View file

@ -45,8 +45,8 @@
"description": "Checks for authentication bypass vulnerability inFortinet's FortiOS, potentially exploited by remote attackers.",
"fork": false,
"created_at": "2025-01-18T15:17:07Z",
"updated_at": "2025-01-19T06:24:49Z",
"pushed_at": "2025-01-19T06:24:46Z",
"updated_at": "2025-01-19T12:31:53Z",
"pushed_at": "2025-01-19T12:31:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-11-25T08:16:38Z",
"updated_at": "2025-01-13T10:10:25Z",
"updated_at": "2025-01-19T11:31:41Z",
"pushed_at": "2024-12-21T21:09:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}

View file

@ -269,10 +269,10 @@
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2025-01-13T14:14:28Z",
"updated_at": "2025-01-19T07:54:29Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 464,
"watchers_count": 464,
"stargazers_count": 465,
"watchers_count": 465,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
@ -287,7 +287,7 @@
],
"visibility": "public",
"forks": 90,
"watchers": 464,
"watchers": 465,
"score": 0,
"subscribers_count": 7
},
@ -1324,10 +1324,10 @@
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2025-01-15T11:09:53Z",
"updated_at": "2025-01-19T11:31:52Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -1345,7 +1345,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 76,
"watchers": 77,
"score": 0,
"subscribers_count": 3
},

View file

@ -107,10 +107,10 @@
"description": "Ivanti Connect Secure IFT TLS Stack Overflow pre-auth RCE (CVE-2025-0282)",
"fork": false,
"created_at": "2025-01-15T18:27:12Z",
"updated_at": "2025-01-18T16:59:09Z",
"updated_at": "2025-01-19T11:57:09Z",
"pushed_at": "2025-01-18T16:59:07Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 13,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},
@ -153,5 +153,36 @@
"watchers": 18,
"score": 0,
"subscribers_count": 0
},
{
"id": 918932062,
"name": "Ivanti-Secure-Connect-Logs-Parser",
"full_name": "Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"owner": {
"login": "Hexastrike",
"id": 168469680,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168469680?v=4",
"html_url": "https:\/\/github.com\/Hexastrike",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Hexastrike\/Ivanti-Secure-Connect-Logs-Parser",
"description": "A Python script for examining Ivanti Secure Connect (ICS) event logs, designed to support investigations into vulnerabilities CVE-2025-0282, CVE-2023-46805, and CVE-2024-21887.",
"fork": false,
"created_at": "2025-01-19T09:02:37Z",
"updated_at": "2025-01-19T11:33:26Z",
"pushed_at": "2025-01-19T11:33:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -11,6 +11,7 @@
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
- [watchtowrlabs/CVE-2025-0282](https://github.com/watchtowrlabs/CVE-2025-0282)
- [sfewer-r7/CVE-2025-0282](https://github.com/sfewer-r7/CVE-2025-0282)
- [Hexastrike/Ivanti-Secure-Connect-Logs-Parser](https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser)
### CVE-2025-510
- [g0v3lla/CVE-2025-510T](https://github.com/g0v3lla/CVE-2025-510T)
@ -3055,6 +3056,7 @@
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [tucommenceapousser/CVE-2024-21887](https://github.com/tucommenceapousser/CVE-2024-21887)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
- [Hexastrike/Ivanti-Secure-Connect-Logs-Parser](https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser)
### CVE-2024-21893 (2024-01-31)
@ -16000,6 +16002,7 @@
- [mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped](https://github.com/mickdec/CVE-2023-46805_CVE-2024-21887_scan_grouped)
- [w2xim3/CVE-2023-46805](https://github.com/w2xim3/CVE-2023-46805)
- [rxwx/pulse-meter](https://github.com/rxwx/pulse-meter)
- [Hexastrike/Ivanti-Secure-Connect-Logs-Parser](https://github.com/Hexastrike/Ivanti-Secure-Connect-Logs-Parser)
### CVE-2023-46813 (2023-10-27)