mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2024/03/03 06:26:20
This commit is contained in:
parent
5d2e55ed20
commit
085d4f4bf8
20 changed files with 67 additions and 67 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2017-5721 Proof-of-Concept",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-23T11:00:18Z",
|
||||
"updated_at": "2023-08-17T06:16:19Z",
|
||||
"updated_at": "2024-03-03T03:35:56Z",
|
||||
"pushed_at": "2017-10-23T12:41:22Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -30,7 +30,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -53,10 +53,10 @@
|
|||
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-04T23:51:12Z",
|
||||
"updated_at": "2024-02-29T06:53:36Z",
|
||||
"updated_at": "2024-03-03T02:25:11Z",
|
||||
"pushed_at": "2018-02-27T05:22:38Z",
|
||||
"stargazers_count": 544,
|
||||
"watchers_count": 544,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"has_discussions": false,
|
||||
"forks_count": 71,
|
||||
"allow_forking": true,
|
||||
|
@ -74,7 +74,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 71,
|
||||
"watchers": 544,
|
||||
"watchers": 543,
|
||||
"score": 0,
|
||||
"subscribers_count": 47
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2023-09-28T11:09:24Z",
|
||||
"updated_at": "2024-03-03T01:11:37Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-03-02T21:43:00Z",
|
||||
"updated_at": "2024-03-03T03:12:55Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3995,
|
||||
"watchers_count": 3995,
|
||||
"stargazers_count": 3996,
|
||||
"watchers_count": 3996,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1079,
|
||||
"allow_forking": true,
|
||||
|
@ -75,7 +75,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1079,
|
||||
"watchers": 3995,
|
||||
"watchers": 3996,
|
||||
"score": 0,
|
||||
"subscribers_count": 152
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2024-03-02T21:43:00Z",
|
||||
"updated_at": "2024-03-03T03:12:55Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3995,
|
||||
"watchers_count": 3995,
|
||||
"stargazers_count": 3996,
|
||||
"watchers_count": 3996,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1079,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1079,
|
||||
"watchers": 3995,
|
||||
"watchers": 3996,
|
||||
"score": 0,
|
||||
"subscribers_count": 152
|
||||
},
|
||||
|
|
|
@ -851,10 +851,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-02-28T09:26:07Z",
|
||||
"updated_at": "2024-03-03T03:42:40Z",
|
||||
"pushed_at": "2024-02-01T06:53:03Z",
|
||||
"stargazers_count": 1216,
|
||||
"watchers_count": 1216,
|
||||
"stargazers_count": 1217,
|
||||
"watchers_count": 1217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 154,
|
||||
"allow_forking": true,
|
||||
|
@ -870,7 +870,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 154,
|
||||
"watchers": 1216,
|
||||
"watchers": 1217,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -109,10 +109,10 @@
|
|||
"description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-03T15:15:12Z",
|
||||
"updated_at": "2024-02-23T13:13:22Z",
|
||||
"updated_at": "2024-03-03T03:15:21Z",
|
||||
"pushed_at": "2021-09-13T12:12:17Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"has_discussions": false,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
|
@ -128,7 +128,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 100,
|
||||
"watchers": 101,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -1527,7 +1527,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2023-05-28T11:06:10Z",
|
||||
"pushed_at": "2024-03-01T08:19:21Z",
|
||||
"pushed_at": "2024-03-03T03:56:05Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 491,
|
||||
"watchers_count": 491,
|
||||
"has_discussions": false,
|
||||
"forks_count": 72,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 72,
|
||||
"forks": 70,
|
||||
"watchers": 491,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
|
|
|
@ -796,10 +796,10 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2024-02-28T09:26:07Z",
|
||||
"updated_at": "2024-03-03T03:42:40Z",
|
||||
"pushed_at": "2024-02-01T06:53:03Z",
|
||||
"stargazers_count": 1216,
|
||||
"watchers_count": 1216,
|
||||
"stargazers_count": 1217,
|
||||
"watchers_count": 1217,
|
||||
"has_discussions": false,
|
||||
"forks_count": 154,
|
||||
"allow_forking": true,
|
||||
|
@ -815,7 +815,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 154,
|
||||
"watchers": 1216,
|
||||
"watchers": 1217,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-38181 POC for FireTV 2nd gen Cube (raven)",
|
||||
"fork": false,
|
||||
"created_at": "2023-04-13T13:19:04Z",
|
||||
"updated_at": "2024-01-13T18:37:05Z",
|
||||
"updated_at": "2024-03-03T06:14:54Z",
|
||||
"pushed_at": "2023-06-15T17:08:34Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2024-03-01T13:48:34Z",
|
||||
"updated_at": "2024-03-03T01:39:15Z",
|
||||
"pushed_at": "2024-02-23T14:48:26Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"has_discussions": true,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0,
|
||||
"subscribers_count": 7
|
||||
}
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -676,10 +676,10 @@
|
|||
"description": "This module exploits a vulnerability in WinRAR (CVE-2023-38831). When a user opens a crafted RAR file and its embedded document, a script is executed, leading to code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2023-09-03T21:14:05Z",
|
||||
"updated_at": "2024-02-28T09:36:52Z",
|
||||
"updated_at": "2024-03-03T05:41:26Z",
|
||||
"pushed_at": "2023-09-08T06:15:42Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -688,7 +688,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Backup Migration <= 1.3.7 - Unauthenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-13T20:26:59Z",
|
||||
"updated_at": "2024-02-09T10:29:39Z",
|
||||
"updated_at": "2024-03-03T03:57:22Z",
|
||||
"pushed_at": "2024-02-06T23:22:31Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"has_discussions": false,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
|
@ -39,7 +39,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -27,6 +27,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -96,6 +96,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -18,15 +18,15 @@
|
|||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "POC for CVE-2024-21672 Confluence Data Center and Server RCE",
|
||||
"fork": false,
|
||||
"created_at": "2024-03-01T20:42:59Z",
|
||||
"updated_at": "2024-03-03T00:27:53Z",
|
||||
"updated_at": "2024-03-03T01:25:17Z",
|
||||
"pushed_at": "2024-03-02T03:08:36Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 6,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -48,13 +48,13 @@
|
|||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
|
@ -73,10 +73,10 @@
|
|||
"description": "Safely detect whether a FortiGate SSL VPN is vulnerable to CVE-2024-21762",
|
||||
"fork": false,
|
||||
"created_at": "2024-02-28T21:16:10Z",
|
||||
"updated_at": "2024-03-02T19:15:03Z",
|
||||
"updated_at": "2024-03-03T01:34:39Z",
|
||||
"pushed_at": "2024-03-01T20:02:52Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -85,7 +85,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue