mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/12/25 12:31:49
This commit is contained in:
parent
30a8fe023e
commit
07fbf7908c
39 changed files with 134 additions and 134 deletions
|
@ -97,10 +97,10 @@
|
|||
"description": "CVE-2014-4210 SSRF PORTSCANNER PoC",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T03:45:30Z",
|
||||
"updated_at": "2024-12-20T03:30:57Z",
|
||||
"updated_at": "2024-12-25T10:17:06Z",
|
||||
"pushed_at": "2020-07-21T03:46:09Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -109,7 +109,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
@ -128,10 +128,10 @@
|
|||
"description": "Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-19T16:06:57Z",
|
||||
"updated_at": "2024-12-20T03:30:45Z",
|
||||
"updated_at": "2024-12-25T10:17:14Z",
|
||||
"pushed_at": "2020-11-20T05:55:15Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -140,7 +140,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 8,
|
||||
"watchers": 9,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -417,10 +417,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-20T07:25:44Z",
|
||||
"updated_at": "2024-12-25T08:49:58Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -437,7 +437,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -33,15 +33,15 @@
|
|||
{
|
||||
"id": 80717942,
|
||||
"name": "extra_recipe",
|
||||
"full_name": "JackBro\/extra_recipe",
|
||||
"full_name": "ldebug\/extra_recipe",
|
||||
"owner": {
|
||||
"login": "JackBro",
|
||||
"login": "ldebug",
|
||||
"id": 21210712,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21210712?v=4",
|
||||
"html_url": "https:\/\/github.com\/JackBro",
|
||||
"html_url": "https:\/\/github.com\/ldebug",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JackBro\/extra_recipe",
|
||||
"html_url": "https:\/\/github.com\/ldebug\/extra_recipe",
|
||||
"description": "Ian Beer's exploit for CVE-2017-2370 (kernel memory r\/w on iOS 10.2)",
|
||||
"fork": false,
|
||||
"created_at": "2017-02-02T11:16:38Z",
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-02T02:21:28Z",
|
||||
"updated_at": "2024-08-26T18:38:39Z",
|
||||
"updated_at": "2024-12-25T07:36:03Z",
|
||||
"pushed_at": "2019-05-09T07:07:25Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -3024,10 +3024,10 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2024-08-12T19:55:32Z",
|
||||
"updated_at": "2024-12-25T11:28:16Z",
|
||||
"pushed_at": "2020-07-07T15:28:13Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
|
@ -3036,7 +3036,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 106,
|
||||
"watchers": 105,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2024-11-18T08:00:32Z",
|
||||
"updated_at": "2024-12-25T09:28:14Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -981,10 +981,10 @@
|
|||
"description": "tomcat自动化漏洞扫描利用工具,支持批量弱口令检测、后台部署war包getshell、CVE-2017-12615 文件上传、CVE-2020-1938\/CNVD-2020-10487 文件包含",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-29T06:38:16Z",
|
||||
"updated_at": "2024-12-20T07:25:44Z",
|
||||
"updated_at": "2024-12-25T08:49:58Z",
|
||||
"pushed_at": "2024-11-13T03:12:58Z",
|
||||
"stargazers_count": 163,
|
||||
"watchers_count": 163,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
@ -1001,7 +1001,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 163,
|
||||
"watchers": 164,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -93,10 +93,10 @@
|
|||
"description": "CVE-2021-21972 Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-24T11:14:58Z",
|
||||
"updated_at": "2024-12-22T13:59:45Z",
|
||||
"updated_at": "2024-12-25T11:43:15Z",
|
||||
"pushed_at": "2023-06-08T04:01:33Z",
|
||||
"stargazers_count": 487,
|
||||
"watchers_count": 487,
|
||||
"stargazers_count": 488,
|
||||
"watchers_count": 488,
|
||||
"has_discussions": false,
|
||||
"forks_count": 148,
|
||||
"allow_forking": true,
|
||||
|
@ -107,7 +107,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 148,
|
||||
"watchers": 487,
|
||||
"watchers": 488,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -848,10 +848,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-25T02:14:55Z",
|
||||
"updated_at": "2024-12-25T09:32:14Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1348,
|
||||
"watchers_count": 1348,
|
||||
"stargazers_count": 1349,
|
||||
"watchers_count": 1349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -867,7 +867,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 1348,
|
||||
"watchers": 1349,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "漏洞POC、EXP合集,持续更新。Apache Druid-任意文件读取(CVE-2021-36749)、ConfluenceRCE(CVE-2021-26084)、ZeroShell防火墙RCE(CVE-2019-12725)、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-22T05:06:33Z",
|
||||
"updated_at": "2024-11-18T08:00:32Z",
|
||||
"updated_at": "2024-12-25T09:28:14Z",
|
||||
"pushed_at": "2021-11-21T10:34:06Z",
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"has_discussions": false,
|
||||
"forks_count": 38,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"watchers": 169,
|
||||
"watchers": 170,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -7264,7 +7264,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-15T21:09:00Z",
|
||||
"updated_at": "2023-06-22T04:46:02Z",
|
||||
"pushed_at": "2024-11-25T05:57:14Z",
|
||||
"pushed_at": "2024-12-25T06:55:32Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -1871,10 +1871,10 @@
|
|||
"description": "CVE-2022-0847 used to achieve container escape 利用CVE-2022-0847 (Dirty Pipe) 实现容器逃逸",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-04T08:31:32Z",
|
||||
"updated_at": "2024-08-17T10:29:15Z",
|
||||
"updated_at": "2024-12-25T08:00:52Z",
|
||||
"pushed_at": "2022-06-16T17:14:10Z",
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
@ -1891,7 +1891,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 30,
|
||||
"watchers": 31,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T19:37:35Z",
|
||||
"updated_at": "2024-11-27T09:45:32Z",
|
||||
"updated_at": "2024-12-25T09:16:05Z",
|
||||
"pushed_at": "2022-04-22T17:55:37Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -45,10 +45,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-03-12T04:47:02Z",
|
||||
"updated_at": "2024-12-16T06:53:25Z",
|
||||
"updated_at": "2024-12-25T09:52:56Z",
|
||||
"pushed_at": "2024-03-18T07:32:24Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -57,7 +57,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -792,10 +792,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-12-25T02:14:55Z",
|
||||
"updated_at": "2024-12-25T09:32:14Z",
|
||||
"pushed_at": "2024-04-25T06:09:38Z",
|
||||
"stargazers_count": 1348,
|
||||
"watchers_count": 1348,
|
||||
"stargazers_count": 1349,
|
||||
"watchers_count": 1349,
|
||||
"has_discussions": false,
|
||||
"forks_count": 166,
|
||||
"allow_forking": true,
|
||||
|
@ -811,7 +811,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 166,
|
||||
"watchers": 1348,
|
||||
"watchers": 1349,
|
||||
"score": 0,
|
||||
"subscribers_count": 15
|
||||
}
|
||||
|
|
|
@ -14,19 +14,19 @@
|
|||
"description": "Exploit for CVE-2022-29582 targeting Google's Kernel CTF",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T15:29:04Z",
|
||||
"updated_at": "2024-12-02T23:35:27Z",
|
||||
"updated_at": "2024-12-25T09:00:31Z",
|
||||
"pushed_at": "2022-08-08T04:13:33Z",
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 71,
|
||||
"forks": 11,
|
||||
"watchers": 72,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2023-22527 - RCE (Remote Code Execution) Vulnerability In Confluence Data Center and Confluence Server PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T08:46:21Z",
|
||||
"updated_at": "2024-09-02T04:23:53Z",
|
||||
"updated_at": "2024-12-25T07:14:03Z",
|
||||
"pushed_at": "2024-01-23T09:57:31Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -265,8 +265,8 @@
|
|||
"description": "Cái này dựng lên với mục đích cho ae tham khảo, chê thì đừng có xem. :))))",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-11T07:38:22Z",
|
||||
"updated_at": "2024-12-23T10:26:36Z",
|
||||
"pushed_at": "2024-12-23T10:26:32Z",
|
||||
"updated_at": "2024-12-25T12:05:52Z",
|
||||
"pushed_at": "2024-12-25T12:05:48Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T19:36:50Z",
|
||||
"updated_at": "2024-05-17T14:24:09Z",
|
||||
"updated_at": "2024-12-25T09:16:44Z",
|
||||
"pushed_at": "2024-02-16T19:39:12Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-20T21:16:41Z",
|
||||
"updated_at": "2024-12-24T20:51:19Z",
|
||||
"updated_at": "2024-12-25T11:49:55Z",
|
||||
"pushed_at": "2024-04-17T16:09:54Z",
|
||||
"stargazers_count": 2309,
|
||||
"watchers_count": 2309,
|
||||
"stargazers_count": 2310,
|
||||
"watchers_count": 2310,
|
||||
"has_discussions": false,
|
||||
"forks_count": 299,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 299,
|
||||
"watchers": 2309,
|
||||
"watchers": 2310,
|
||||
"score": 0,
|
||||
"subscribers_count": 26
|
||||
},
|
||||
|
|
|
@ -326,6 +326,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -59,6 +59,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -28,6 +28,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a proof of concept for CVE-2024-20356, a Command Injection vulnerability in Cisco's CIMC.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-12T15:07:42Z",
|
||||
"updated_at": "2024-12-10T03:08:06Z",
|
||||
"updated_at": "2024-12-25T07:57:40Z",
|
||||
"pushed_at": "2024-04-18T14:31:34Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 55,
|
||||
"watchers": 56,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -138,10 +138,10 @@
|
|||
"description": "The PoC demonstrates the potential for remote code execution by exploiting the identified security flaw.",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-17T09:15:22Z",
|
||||
"updated_at": "2024-10-29T16:36:33Z",
|
||||
"updated_at": "2024-12-25T11:30:36Z",
|
||||
"pushed_at": "2024-03-17T09:20:35Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
@ -150,7 +150,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Unauthenticated Remote Code Execution – Bricks <= 1.9.6",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-20T20:16:09Z",
|
||||
"updated_at": "2024-12-15T22:44:06Z",
|
||||
"updated_at": "2024-12-25T07:47:07Z",
|
||||
"pushed_at": "2024-02-25T21:50:09Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"stargazers_count": 154,
|
||||
"watchers_count": 154,
|
||||
"has_discussions": false,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 153,
|
||||
"watchers": 154,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -152,7 +152,7 @@
|
|||
"forks": 7,
|
||||
"watchers": 35,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
},
|
||||
{
|
||||
"id": 871953279,
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Ivanti EPM SQL Injection Remote Code Execution Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-12T13:53:32Z",
|
||||
"updated_at": "2024-12-07T00:01:48Z",
|
||||
"updated_at": "2024-12-25T11:31:21Z",
|
||||
"pushed_at": "2024-06-12T14:04:39Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -121,7 +121,7 @@
|
|||
"forks": 31,
|
||||
"watchers": 430,
|
||||
"score": 0,
|
||||
"subscribers_count": 20
|
||||
"subscribers_count": 21
|
||||
},
|
||||
{
|
||||
"id": 834461917,
|
||||
|
|
|
@ -76,10 +76,10 @@
|
|||
"description": "Exploit PoC for CVE-2024-32002",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-17T19:33:08Z",
|
||||
"updated_at": "2024-12-22T02:46:53Z",
|
||||
"updated_at": "2024-12-25T08:56:18Z",
|
||||
"pushed_at": "2024-05-19T07:12:00Z",
|
||||
"stargazers_count": 519,
|
||||
"watchers_count": 519,
|
||||
"stargazers_count": 520,
|
||||
"watchers_count": 520,
|
||||
"has_discussions": false,
|
||||
"forks_count": 144,
|
||||
"allow_forking": true,
|
||||
|
@ -93,7 +93,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"watchers": 519,
|
||||
"watchers": 520,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -131,6 +131,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -265,10 +265,10 @@
|
|||
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-24T18:25:46Z",
|
||||
"updated_at": "2024-12-24T15:47:54Z",
|
||||
"updated_at": "2024-12-25T08:57:08Z",
|
||||
"pushed_at": "2024-08-27T12:22:39Z",
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"stargazers_count": 641,
|
||||
"watchers_count": 641,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -277,7 +277,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 640,
|
||||
"watchers": 641,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-12-03T08:56:59Z",
|
||||
"updated_at": "2024-12-21T07:19:27Z",
|
||||
"updated_at": "2024-12-25T10:13:21Z",
|
||||
"pushed_at": "2024-11-18T23:48:31Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"has_discussions": false,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -26,7 +26,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
@ -19,13 +19,13 @@
|
|||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"has_discussions": false,
|
||||
"forks_count": 17,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"forks": 18,
|
||||
"watchers": 91,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -28,7 +28,7 @@
|
|||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 908053971,
|
||||
|
|
|
@ -200,10 +200,10 @@
|
|||
"description": "tomcat CVE-2024-50379\/CVE-2024-56337 条件竞争文件上传exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-23T07:20:47Z",
|
||||
"updated_at": "2024-12-25T03:57:03Z",
|
||||
"updated_at": "2024-12-25T10:03:11Z",
|
||||
"pushed_at": "2024-12-23T07:30:27Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
|
@ -212,7 +212,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 27,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -262,8 +262,8 @@
|
|||
"description": "CVE-2024-50379-exp",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-25T02:41:31Z",
|
||||
"updated_at": "2024-12-25T02:43:51Z",
|
||||
"pushed_at": "2024-12-25T02:43:47Z",
|
||||
"updated_at": "2024-12-25T07:54:45Z",
|
||||
"pushed_at": "2024-12-25T07:54:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -50,7 +50,7 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -62,7 +62,7 @@
|
|||
"rce-exploit"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
|
|
@ -45,19 +45,19 @@
|
|||
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
|
||||
"fork": false,
|
||||
"created_at": "2024-12-13T17:42:55Z",
|
||||
"updated_at": "2024-12-24T04:05:37Z",
|
||||
"updated_at": "2024-12-25T09:09:58Z",
|
||||
"pushed_at": "2024-12-20T10:05:15Z",
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"stargazers_count": 71,
|
||||
"watchers_count": 71,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 70,
|
||||
"forks": 29,
|
||||
"watchers": 71,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -42883,7 +42883,7 @@
|
|||
</code>
|
||||
|
||||
- [maximehip/extra_recipe](https://github.com/maximehip/extra_recipe)
|
||||
- [JackBro/extra_recipe](https://github.com/JackBro/extra_recipe)
|
||||
- [ldebug/extra_recipe](https://github.com/ldebug/extra_recipe)
|
||||
- [Rootkitsmm-zz/extra_recipe-iOS-10.2](https://github.com/Rootkitsmm-zz/extra_recipe-iOS-10.2)
|
||||
- [Peterpan0927/CVE-2017-2370](https://github.com/Peterpan0927/CVE-2017-2370)
|
||||
|
||||
|
|
Loading…
Reference in a new issue