mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-05-14 18:57:08 +02:00
Auto Update 2026/04/30 12:54:54
This commit is contained in:
parent
07fbf76644
commit
0d5920305e
134 changed files with 2214 additions and 1720 deletions
|
|
@ -47,10 +47,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -82,7 +82,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
|||
|
|
@ -110,11 +110,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Catherines77\/ActiveMQ-EXPtools",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197)",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-04-29T11:52:10Z",
|
||||
"pushed_at": "2026-04-27T09:37:12Z",
|
||||
"updated_at": "2026-04-30T08:56:15Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -49,7 +49,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠️ Validate and demonstrate CVE-2016-15042 with a Dockerized lab for unauthenticated file uploads in WordPress file managers.",
|
||||
"fork": false,
|
||||
"created_at": "2023-10-23T05:54:10Z",
|
||||
"updated_at": "2026-04-30T04:28:19Z",
|
||||
"pushed_at": "2026-04-30T04:28:16Z",
|
||||
"updated_at": "2026-04-30T10:26:29Z",
|
||||
"pushed_at": "2026-04-30T10:26:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -246,11 +246,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Catherines77\/ActiveMQ-EXPtools",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197)",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-04-29T11:52:10Z",
|
||||
"pushed_at": "2026-04-27T09:37:12Z",
|
||||
"updated_at": "2026-04-30T08:56:15Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -490,10 +490,10 @@
|
|||
"description": "Dirty Cow exploit - CVE-2016-5195",
|
||||
"fork": false,
|
||||
"created_at": "2016-11-25T21:08:01Z",
|
||||
"updated_at": "2026-04-30T05:03:04Z",
|
||||
"updated_at": "2026-04-30T11:12:15Z",
|
||||
"pushed_at": "2025-07-30T11:31:24Z",
|
||||
"stargazers_count": 927,
|
||||
"watchers_count": 927,
|
||||
"stargazers_count": 928,
|
||||
"watchers_count": 928,
|
||||
"has_discussions": false,
|
||||
"forks_count": 429,
|
||||
"allow_forking": true,
|
||||
|
|
@ -508,7 +508,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 429,
|
||||
"watchers": 927,
|
||||
"watchers": 928,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -82,7 +82,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
|||
|
|
@ -612,10 +612,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -647,7 +647,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 556,
|
||||
"watchers_count": 556,
|
||||
"has_discussions": false,
|
||||
"forks_count": 204,
|
||||
"forks_count": 203,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,7 +27,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 204,
|
||||
"forks": 203,
|
||||
"watchers": 556,
|
||||
"score": 0,
|
||||
"subscribers_count": 32
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040\/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T19:56:12Z",
|
||||
"updated_at": "2026-04-30T04:01:39Z",
|
||||
"pushed_at": "2026-04-30T04:01:35Z",
|
||||
"updated_at": "2026-04-30T11:00:41Z",
|
||||
"pushed_at": "2026-04-30T11:00:38Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -47,7 +47,7 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2026-04-28T01:56:48Z",
|
||||
"updated_at": "2026-04-30T06:53:03Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4276,
|
||||
"watchers_count": 4276,
|
||||
|
|
|
|||
|
|
@ -212,10 +212,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -247,7 +247,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,21 +1,21 @@
|
|||
[
|
||||
{
|
||||
"id": 1130776076,
|
||||
"name": "CVE-2026-26720-Twenty-RCE",
|
||||
"full_name": "dillonkirsch\/CVE-2026-26720-Twenty-RCE",
|
||||
"id": 1225426324,
|
||||
"name": "av_CVE-2020-0162_A10r33",
|
||||
"full_name": "Pazhanivelmani\/av_CVE-2020-0162_A10r33",
|
||||
"owner": {
|
||||
"login": "dillonkirsch",
|
||||
"id": 1911339,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1911339?v=4",
|
||||
"html_url": "https:\/\/github.com\/dillonkirsch",
|
||||
"login": "Pazhanivelmani",
|
||||
"id": 178174306,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/178174306?v=4",
|
||||
"html_url": "https:\/\/github.com\/Pazhanivelmani",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/dillonkirsch\/CVE-2026-26720-Twenty-RCE",
|
||||
"html_url": "https:\/\/github.com\/Pazhanivelmani\/av_CVE-2020-0162_A10r33",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-01-09T02:02:33Z",
|
||||
"updated_at": "2026-02-27T22:07:49Z",
|
||||
"pushed_at": "2026-01-09T02:06:48Z",
|
||||
"created_at": "2026-04-30T09:08:14Z",
|
||||
"updated_at": "2026-04-30T09:10:10Z",
|
||||
"pushed_at": "2026-04-30T09:10:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -58,8 +58,8 @@
|
|||
"description": "🔍 Create a safe lab environment for testing CVE-2020-0610, a critical RCE vulnerability in Windows RD Gateway, with minimal disruption using DTLS techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-04T13:21:35Z",
|
||||
"updated_at": "2026-04-30T04:28:16Z",
|
||||
"pushed_at": "2026-04-30T04:28:12Z",
|
||||
"updated_at": "2026-04-30T10:26:24Z",
|
||||
"pushed_at": "2026-04-30T10:26:20Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2984,8 +2984,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-23T09:39:37Z",
|
||||
"updated_at": "2026-04-29T15:02:07Z",
|
||||
"pushed_at": "2026-04-29T14:53:46Z",
|
||||
"updated_at": "2026-04-30T12:09:49Z",
|
||||
"pushed_at": "2026-04-30T12:09:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -2383,8 +2383,8 @@
|
|||
"description": "Zerologon (CVE-2020-1472) Proof-of-Concept application - Critical Active Directory vulnerability exploitation tool.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-06T10:17:38Z",
|
||||
"updated_at": "2026-04-30T04:44:11Z",
|
||||
"pushed_at": "2026-04-30T04:44:07Z",
|
||||
"updated_at": "2026-04-30T11:11:20Z",
|
||||
"pushed_at": "2026-04-30T11:11:16Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,7 +14,7 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2026-04-28T01:56:48Z",
|
||||
"updated_at": "2026-04-30T06:53:03Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 4276,
|
||||
"watchers_count": 4276,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2026-04-30T02:18:45Z",
|
||||
"updated_at": "2026-04-30T06:37:01Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 2070,
|
||||
"watchers_count": 2070,
|
||||
"stargazers_count": 2071,
|
||||
"watchers_count": 2071,
|
||||
"has_discussions": true,
|
||||
"forks_count": 334,
|
||||
"allow_forking": true,
|
||||
|
|
@ -49,7 +49,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 334,
|
||||
"watchers": 2070,
|
||||
"watchers": 2071,
|
||||
"score": 0,
|
||||
"subscribers_count": 35
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-26T14:17:13Z",
|
||||
"updated_at": "2021-09-26T14:17:14Z",
|
||||
"updated_at": "2026-04-30T11:24:52Z",
|
||||
"pushed_at": "2021-09-15T03:22:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -146,10 +146,10 @@
|
|||
"description": "CVE-2021-22555 exploit rewritten with pipe primitive",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-05T06:35:25Z",
|
||||
"updated_at": "2026-04-28T16:29:49Z",
|
||||
"updated_at": "2026-04-30T07:59:10Z",
|
||||
"pushed_at": "2022-05-18T03:10:10Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
|
@ -160,7 +160,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
|||
|
|
@ -311,10 +311,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-03-04T19:40:47Z",
|
||||
"updated_at": "2026-03-25T11:50:50Z",
|
||||
"updated_at": "2026-04-30T08:41:42Z",
|
||||
"pushed_at": "2026-03-04T19:57:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -325,7 +325,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -722,10 +722,10 @@
|
|||
"description": "CVE-2021-26855: PoC (Not a HoneyPoC for once!)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-14T14:23:34Z",
|
||||
"updated_at": "2026-03-31T10:06:53Z",
|
||||
"updated_at": "2026-04-30T11:26:34Z",
|
||||
"pushed_at": "2025-04-26T06:48:26Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"has_discussions": false,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
|
|
@ -736,7 +736,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 15,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
},
|
||||
|
|
|
|||
|
|
@ -2141,10 +2141,10 @@
|
|||
"description": "Checker for CVE-2021-3156 with static version check",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-14T16:35:09Z",
|
||||
"updated_at": "2024-06-23T13:14:26Z",
|
||||
"updated_at": "2026-04-30T08:15:32Z",
|
||||
"pushed_at": "2024-05-14T17:04:52Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -2163,7 +2163,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -212,8 +212,8 @@
|
|||
"description": "Chrome extension that uses vulnerabilities CVE-2021-33044 and CVE-2021-33045 to log in to Dahua cameras without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-28T17:42:44Z",
|
||||
"updated_at": "2026-04-30T04:49:53Z",
|
||||
"pushed_at": "2026-04-30T04:49:50Z",
|
||||
"updated_at": "2026-04-30T11:17:40Z",
|
||||
"pushed_at": "2026-04-30T11:17:37Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -86,10 +86,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T12:10:49Z",
|
||||
"updated_at": "2026-04-08T11:35:10Z",
|
||||
"updated_at": "2026-04-30T11:01:00Z",
|
||||
"pushed_at": "2021-07-02T12:17:50Z",
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"stargazers_count": 314,
|
||||
"watchers_count": 314,
|
||||
"has_discussions": false,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
|
|
@ -100,7 +100,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 76,
|
||||
"watchers": 313,
|
||||
"watchers": 314,
|
||||
"score": 0,
|
||||
"subscribers_count": 11
|
||||
},
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2026-04-28T08:32:02Z",
|
||||
"updated_at": "2026-04-30T06:50:24Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 1148,
|
||||
"watchers_count": 1148,
|
||||
"stargazers_count": 1149,
|
||||
"watchers_count": 1149,
|
||||
"has_discussions": false,
|
||||
"forks_count": 318,
|
||||
"allow_forking": true,
|
||||
|
|
@ -65,7 +65,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 318,
|
||||
"watchers": 1148,
|
||||
"watchers": 1149,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
@ -2050,8 +2050,8 @@
|
|||
"description": "🚀 Enhance your penetration testing with PwnKit Helper, a simple tool for exploiting the CVE-2021-4034 vulnerability in pkexec for local privilege escalation.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T09:53:03Z",
|
||||
"updated_at": "2026-04-30T04:34:57Z",
|
||||
"pushed_at": "2026-04-30T04:34:54Z",
|
||||
"updated_at": "2026-04-30T10:34:42Z",
|
||||
"pushed_at": "2026-04-30T10:34:38Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -285,10 +285,10 @@
|
|||
"description": "Log4Shell(CVE-2021-45046) Sandbox Signature",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T09:02:55Z",
|
||||
"updated_at": "2021-12-26T19:51:57Z",
|
||||
"updated_at": "2026-04-30T10:05:22Z",
|
||||
"pushed_at": "2021-12-26T19:51:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -299,7 +299,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -1237,10 +1237,10 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2026-04-24T14:27:34Z",
|
||||
"updated_at": "2026-04-30T08:08:31Z",
|
||||
"pushed_at": "2023-05-20T05:55:45Z",
|
||||
"stargazers_count": 710,
|
||||
"watchers_count": 710,
|
||||
"stargazers_count": 711,
|
||||
"watchers_count": 711,
|
||||
"has_discussions": false,
|
||||
"forks_count": 161,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1251,7 +1251,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 161,
|
||||
"watchers": 710,
|
||||
"watchers": 711,
|
||||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
|
|
|
|||
|
|
@ -1299,10 +1299,10 @@
|
|||
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-05T07:04:50Z",
|
||||
"updated_at": "2024-10-03T05:16:26Z",
|
||||
"updated_at": "2026-04-30T11:12:22Z",
|
||||
"pushed_at": "2022-07-05T09:40:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -1322,7 +1322,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -31,38 +31,5 @@
|
|||
"watchers": 60,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 1224992368,
|
||||
"name": "CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"full_name": "Theori-lO\/CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"owner": {
|
||||
"login": "Theori-lO",
|
||||
"id": 280516657,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/280516657?v=4",
|
||||
"html_url": "https:\/\/github.com\/Theori-lO",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Theori-lO\/CVE-2022-26717-Safari-WebGL-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T20:50:58Z",
|
||||
"updated_at": "2026-04-29T20:51:19Z",
|
||||
"pushed_at": "2026-04-29T20:51:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -295,38 +295,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1224992588,
|
||||
"name": "CVE-2022-32250-exploit",
|
||||
"full_name": "Theori-lO\/CVE-2022-32250-exploit",
|
||||
"owner": {
|
||||
"login": "Theori-lO",
|
||||
"id": 280516657,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/280516657?v=4",
|
||||
"html_url": "https:\/\/github.com\/Theori-lO",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Theori-lO\/CVE-2022-32250-exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T20:51:18Z",
|
||||
"updated_at": "2026-04-29T20:51:37Z",
|
||||
"pushed_at": "2026-04-29T20:51:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "This is a one-time signature verification bypass. For persistent signature verification bypass, check https:\/\/github.com\/TomKing062\/CVE-2022-38691_38692",
|
||||
"fork": false,
|
||||
"created_at": "2023-06-10T08:31:26Z",
|
||||
"updated_at": "2026-04-30T03:18:08Z",
|
||||
"updated_at": "2026-04-30T10:32:19Z",
|
||||
"pushed_at": "2025-06-14T16:55:26Z",
|
||||
"stargazers_count": 544,
|
||||
"watchers_count": 544,
|
||||
"stargazers_count": 543,
|
||||
"watchers_count": 543,
|
||||
"has_discussions": true,
|
||||
"forks_count": 73,
|
||||
"allow_forking": true,
|
||||
|
|
@ -31,7 +31,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 73,
|
||||
"watchers": 544,
|
||||
"watchers": 543,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
},
|
||||
|
|
|
|||
|
|
@ -85,11 +85,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Catherines77\/ActiveMQ-EXPtools",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197)",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-04-29T11:52:10Z",
|
||||
"pushed_at": "2026-04-27T09:37:12Z",
|
||||
"updated_at": "2026-04-30T08:56:15Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -278,5 +278,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1225323354,
|
||||
"name": "CVE-2023-28121-WordPress-Privilege-Escalation",
|
||||
"full_name": "luisdevpentest\/CVE-2023-28121-WordPress-Privilege-Escalation",
|
||||
"owner": {
|
||||
"login": "luisdevpentest",
|
||||
"id": 224465669,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/224465669?v=4",
|
||||
"html_url": "https:\/\/github.com\/luisdevpentest",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/luisdevpentest\/CVE-2023-28121-WordPress-Privilege-Escalation",
|
||||
"description": "Exploração prática de vulnerabilidade crítica no WordPress usando o plugin WooCommerce Payments.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T07:02:55Z",
|
||||
"updated_at": "2026-04-30T08:17:15Z",
|
||||
"pushed_at": "2026-04-30T08:06:27Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "oob_entry tfp0 kernel exploit for armv7 iOS (iOS 3.0–10.3.4), using CVE-2023-32434. We will publish a write-up detailing the methods in the coming weeks. 🐙",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-13T09:19:29Z",
|
||||
"updated_at": "2026-04-30T04:24:42Z",
|
||||
"pushed_at": "2026-04-30T04:24:38Z",
|
||||
"updated_at": "2026-04-30T10:21:40Z",
|
||||
"pushed_at": "2026-04-30T10:21:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1902,5 +1902,38 @@
|
|||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1225359957,
|
||||
"name": "Winrar-Exploit-CVE-2023-38831",
|
||||
"full_name": "lightningspeed221\/Winrar-Exploit-CVE-2023-38831",
|
||||
"owner": {
|
||||
"login": "lightningspeed221",
|
||||
"id": 184650767,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184650767?v=4",
|
||||
"html_url": "https:\/\/github.com\/lightningspeed221",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/lightningspeed221\/Winrar-Exploit-CVE-2023-38831",
|
||||
"description": "Winrar Exploit CVE-2023-38831",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T07:43:27Z",
|
||||
"updated_at": "2026-04-30T12:05:09Z",
|
||||
"pushed_at": "2026-04-30T12:05:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🔒 Analyze the CVE-2023-39910 vulnerability in Libbitcoin Explorer to understand its impact on Bitcoin wallet security and protect your assets.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-07T14:24:08Z",
|
||||
"updated_at": "2026-04-30T05:26:51Z",
|
||||
"pushed_at": "2026-04-30T05:26:47Z",
|
||||
"updated_at": "2026-04-30T11:37:56Z",
|
||||
"pushed_at": "2026-04-30T11:37:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
||||
"fork": false,
|
||||
"created_at": "2024-01-16T06:52:02Z",
|
||||
"updated_at": "2026-04-30T03:14:51Z",
|
||||
"updated_at": "2026-04-30T09:40:04Z",
|
||||
"pushed_at": "2026-02-11T00:03:00Z",
|
||||
"stargazers_count": 1820,
|
||||
"watchers_count": 1820,
|
||||
"stargazers_count": 1821,
|
||||
"watchers_count": 1821,
|
||||
"has_discussions": false,
|
||||
"forks_count": 311,
|
||||
"forks_count": 312,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,8 +27,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1820,
|
||||
"forks": 312,
|
||||
"watchers": 1821,
|
||||
"score": 0,
|
||||
"subscribers_count": 29
|
||||
},
|
||||
|
|
|
|||
|
|
@ -1075,11 +1075,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Catherines77\/ActiveMQ-EXPtools",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197)",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-04-29T11:52:10Z",
|
||||
"pushed_at": "2026-04-27T09:37:12Z",
|
||||
"updated_at": "2026-04-30T08:56:15Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-02-16T19:36:50Z",
|
||||
"updated_at": "2025-05-14T02:42:42Z",
|
||||
"updated_at": "2026-04-30T09:21:57Z",
|
||||
"pushed_at": "2024-02-16T19:39:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -230,72 +230,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738402073,
|
||||
"name": "CVE-2023-51385",
|
||||
"full_name": "uccu99\/CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "uccu99",
|
||||
"id": 155516921,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155516921?v=4",
|
||||
"html_url": "https:\/\/github.com\/uccu99",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/uccu99\/CVE-2023-51385",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T06:28:34Z",
|
||||
"updated_at": "2024-01-03T06:28:35Z",
|
||||
"pushed_at": "2024-01-03T06:28:35Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738661198,
|
||||
"name": "exploit-CVE-2023-51385",
|
||||
"full_name": "julienbrs\/exploit-CVE-2023-51385",
|
||||
"owner": {
|
||||
"login": "julienbrs",
|
||||
"id": 106234742,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106234742?v=4",
|
||||
"html_url": "https:\/\/github.com\/julienbrs",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/julienbrs\/exploit-CVE-2023-51385",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-01-03T18:40:44Z",
|
||||
"updated_at": "2024-01-03T18:40:44Z",
|
||||
"pushed_at": "2024-01-03T18:41:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 738669696,
|
||||
"name": "malicious-exploit-CVE-2023-51385",
|
||||
|
|
|
|||
|
|
@ -172,8 +172,8 @@
|
|||
"description": "🔍 Exploit CVE-2024-0670 in CheckMK agents for local privilege escalation using a robust C++ tool designed for security professionals.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-08T01:32:09Z",
|
||||
"updated_at": "2026-04-30T05:27:12Z",
|
||||
"pushed_at": "2026-04-30T05:27:09Z",
|
||||
"updated_at": "2026-04-30T11:38:22Z",
|
||||
"pushed_at": "2026-04-30T11:38:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "Analyze and deobfuscate the Coruna Exploit Kit (CVE-2024-23222) to enhance understanding and detection of related threats.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-15T16:36:07Z",
|
||||
"updated_at": "2026-04-30T06:12:29Z",
|
||||
"pushed_at": "2026-04-30T06:12:26Z",
|
||||
"updated_at": "2026-04-30T12:36:05Z",
|
||||
"pushed_at": "2026-04-30T12:36:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,8 +80,8 @@
|
|||
"description": "PoC for CVE-2024-23700, Android slient privilege escalation allow to read\/write contacts, SMS, calendar, call log and voicemail, make outgoing calls or answer incoming calls, manipulate call settings, access & control notifications sent by other apps, control nearby devices, record audio, access device identifiers, and bypass background restriction",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-05T07:09:41Z",
|
||||
"updated_at": "2026-04-09T06:53:54Z",
|
||||
"pushed_at": "2026-04-09T06:53:48Z",
|
||||
"updated_at": "2026-04-30T10:43:18Z",
|
||||
"pushed_at": "2026-04-30T10:43:14Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-30090 - LPE PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-10-17T08:38:47Z",
|
||||
"updated_at": "2026-03-30T03:10:58Z",
|
||||
"updated_at": "2026-04-30T10:00:56Z",
|
||||
"pushed_at": "2024-10-17T09:53:33Z",
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"has_discussions": false,
|
||||
"forks_count": 25,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 25,
|
||||
"watchers": 107,
|
||||
"watchers": 108,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
|||
|
|
@ -2665,5 +2665,38 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1225460078,
|
||||
"name": "Kaspersky_CVE-2024-3094",
|
||||
"full_name": "vesjolyjd\/Kaspersky_CVE-2024-3094",
|
||||
"owner": {
|
||||
"login": "vesjolyjd",
|
||||
"id": 55855887,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55855887?v=4",
|
||||
"html_url": "https:\/\/github.com\/vesjolyjd",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/vesjolyjd\/Kaspersky_CVE-2024-3094",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T09:50:07Z",
|
||||
"updated_at": "2026-04-30T10:02:53Z",
|
||||
"pushed_at": "2026-04-30T10:02:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC for CVE-2024-3183 (FreeIPA Rosting)",
|
||||
"fork": false,
|
||||
"created_at": "2024-08-14T14:24:58Z",
|
||||
"updated_at": "2026-01-23T08:58:37Z",
|
||||
"updated_at": "2026-04-30T08:45:54Z",
|
||||
"pushed_at": "2024-08-20T14:16:04Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -11,11 +11,11 @@
|
|||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Catherines77\/ActiveMQ-EXPtools",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197)",
|
||||
"description": "Apache ActiveMQ漏洞综合利用工具(CVE-2015-5254,CVE-2016-3088,CVE-2022-41678,CVE-2023-46604,CVE-2024-32114,CVE-2026-34197,CVE-2026-40466)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-20T02:38:50Z",
|
||||
"updated_at": "2026-04-29T11:52:10Z",
|
||||
"pushed_at": "2026-04-27T09:37:12Z",
|
||||
"updated_at": "2026-04-30T08:56:15Z",
|
||||
"pushed_at": "2026-04-30T07:19:22Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "CVE-2024-38200 & CVE-2024-43609 - Microsoft Office NTLMv2 Disclosure Vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-24T19:24:55Z",
|
||||
"updated_at": "2026-04-15T05:54:42Z",
|
||||
"updated_at": "2026-04-30T10:00:22Z",
|
||||
"pushed_at": "2025-01-13T21:21:30Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"has_discussions": false,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 145,
|
||||
"watchers": 146,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -47,10 +47,10 @@
|
|||
"description": "CVE-2024-39713 (Rocket.Chat Blind SSRF vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-31T06:30:06Z",
|
||||
"updated_at": "2026-04-04T18:24:28Z",
|
||||
"updated_at": "2026-04-30T09:40:26Z",
|
||||
"pushed_at": "2025-10-31T06:31:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
|
|
@ -61,7 +61,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -179,10 +179,10 @@
|
|||
"description": "PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-07T09:52:54Z",
|
||||
"updated_at": "2026-04-28T13:46:28Z",
|
||||
"updated_at": "2026-04-30T11:45:22Z",
|
||||
"pushed_at": "2024-06-22T15:13:52Z",
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"stargazers_count": 313,
|
||||
"watchers_count": 313,
|
||||
"has_discussions": false,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
|
|
@ -193,7 +193,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 312,
|
||||
"watchers": 313,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate an authentication bypass and remote code execution exploit targeting JetBrains TeamCity versions before 2024.12 via REST API abuse.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-17T01:48:09Z",
|
||||
"updated_at": "2026-04-30T06:15:47Z",
|
||||
"pushed_at": "2026-04-30T06:15:43Z",
|
||||
"updated_at": "2026-04-30T12:39:43Z",
|
||||
"pushed_at": "2026-04-30T12:39:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit the CVE-2025-14847 vulnerability in MongoDB to disclose sensitive heap memory using a Python script that analyzes responses for new leaked data.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-30T15:52:00Z",
|
||||
"updated_at": "2026-04-30T05:31:57Z",
|
||||
"pushed_at": "2026-04-30T05:31:53Z",
|
||||
"updated_at": "2026-04-30T11:44:00Z",
|
||||
"pushed_at": "2026-04-30T11:43:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1129,8 +1129,8 @@
|
|||
"description": "🔍 Scan for MongoDB vulnerabilities with MongoBleed, a high-performance tool for detecting CVE-2025-14847 across large networks quickly and efficiently.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-14T06:05:44Z",
|
||||
"updated_at": "2026-04-30T05:31:03Z",
|
||||
"pushed_at": "2026-04-30T05:30:59Z",
|
||||
"updated_at": "2026-04-30T11:42:51Z",
|
||||
"pushed_at": "2026-04-30T11:42:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "POC exploit for CVE-2025-21333 heap-based buffer overflow. It leverages WNF state data and I\/O ring IOP_MC_BUFFER_ENTRY",
|
||||
"fork": false,
|
||||
"created_at": "2025-02-27T12:36:55Z",
|
||||
"updated_at": "2026-04-19T06:28:37Z",
|
||||
"updated_at": "2026-04-30T07:10:37Z",
|
||||
"pushed_at": "2025-04-12T22:14:58Z",
|
||||
"stargazers_count": 232,
|
||||
"watchers_count": 232,
|
||||
"stargazers_count": 233,
|
||||
"watchers_count": 233,
|
||||
"has_discussions": false,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 232,
|
||||
"watchers": 233,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -412,8 +412,8 @@
|
|||
"description": "🛠️ Exploit CVE-2025-2304 in Camaleon CMS easily with this Python script for privilege escalation, tested on version 2.9.0.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-14T20:01:20Z",
|
||||
"updated_at": "2026-04-30T05:52:31Z",
|
||||
"pushed_at": "2026-04-30T05:52:28Z",
|
||||
"updated_at": "2026-04-30T12:11:36Z",
|
||||
"pushed_at": "2026-04-30T12:11:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Basic customization app using CVE-2025-24203. Patched in iOS 18.4.",
|
||||
"fork": false,
|
||||
"created_at": "2025-05-09T07:18:55Z",
|
||||
"updated_at": "2026-04-30T04:31:51Z",
|
||||
"updated_at": "2026-04-30T10:16:59Z",
|
||||
"pushed_at": "2026-04-30T04:31:47Z",
|
||||
"stargazers_count": 315,
|
||||
"watchers_count": 315,
|
||||
"stargazers_count": 316,
|
||||
"watchers_count": 316,
|
||||
"has_discussions": false,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 32,
|
||||
"watchers": 315,
|
||||
"watchers": 316,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Demonstrate CVE-2025-24257 with a public PoC for IOGPUFamily kernel heap OOB read\/write and panic analysis",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-04T03:42:55Z",
|
||||
"updated_at": "2026-04-30T06:24:35Z",
|
||||
"pushed_at": "2026-04-30T06:24:32Z",
|
||||
"updated_at": "2026-04-30T12:49:34Z",
|
||||
"pushed_at": "2026-04-30T12:49:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1792,8 +1792,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-03-30T12:24:15Z",
|
||||
"updated_at": "2026-02-04T06:43:00Z",
|
||||
"pushed_at": "2026-02-09T11:12:46Z",
|
||||
"updated_at": "2026-04-30T07:29:47Z",
|
||||
"pushed_at": "2026-04-30T07:29:43Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,12 +14,12 @@
|
|||
"description": "Exploitation of CVE-2025-29969",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-18T18:23:33Z",
|
||||
"updated_at": "2026-04-01T03:54:19Z",
|
||||
"updated_at": "2026-04-30T11:09:01Z",
|
||||
"pushed_at": "2026-02-20T18:25:25Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,8 +27,8 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 63,
|
||||
"forks": 15,
|
||||
"watchers": 64,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔓 Explore CVE-2025-31258 with this PoC demonstrating partial sandbox escape using RemoteViewServices for practical 1-day security practice.",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-23T15:20:11Z",
|
||||
"updated_at": "2026-04-30T04:30:12Z",
|
||||
"pushed_at": "2026-04-30T04:30:09Z",
|
||||
"updated_at": "2026-04-30T10:28:37Z",
|
||||
"pushed_at": "2026-04-30T10:28:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "A method for CVE-2025-31710 and to connect to cmd_skt to obtain a root shell on unisoc unpatched models",
|
||||
"fork": false,
|
||||
"created_at": "2025-06-06T14:31:13Z",
|
||||
"updated_at": "2026-04-30T06:28:44Z",
|
||||
"updated_at": "2026-04-30T09:20:56Z",
|
||||
"pushed_at": "2026-04-22T23:07:03Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 105,
|
||||
"watchers": 107,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -645,8 +645,8 @@
|
|||
"description": "Demonstrate CVE-2025-32463 with this PoC for sudo's chroot feature. Explore the exploit and its impact on vulnerable sudo versions. 🐱💻🔒",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-04T18:20:09Z",
|
||||
"updated_at": "2026-04-30T04:23:25Z",
|
||||
"pushed_at": "2026-04-30T04:23:21Z",
|
||||
"updated_at": "2026-04-30T10:19:54Z",
|
||||
"pushed_at": "2026-04-30T10:19:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1628,8 +1628,8 @@
|
|||
"description": "🔍 Demonstrate the CVE-2025-32463 privilege-escalation flaw in sudo's chroot feature with this minimal, reproducible proof of concept environment.",
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T00:42:07Z",
|
||||
"updated_at": "2026-04-30T04:31:16Z",
|
||||
"pushed_at": "2026-04-30T04:31:13Z",
|
||||
"updated_at": "2026-04-30T10:30:05Z",
|
||||
"pushed_at": "2026-04-30T10:30:01Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -1680,8 +1680,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-20T02:01:08Z",
|
||||
"updated_at": "2026-04-30T04:31:17Z",
|
||||
"pushed_at": "2026-04-30T04:31:13Z",
|
||||
"updated_at": "2026-04-30T10:30:11Z",
|
||||
"pushed_at": "2026-04-30T10:30:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -80,10 +80,10 @@
|
|||
"description": "WordPress Simple File List Unauthenticated RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-20T16:50:20Z",
|
||||
"updated_at": "2025-07-20T16:53:49Z",
|
||||
"updated_at": "2026-04-30T12:00:22Z",
|
||||
"pushed_at": "2025-07-20T16:53:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
|
@ -94,7 +94,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
|
|||
|
|
@ -294,8 +294,8 @@
|
|||
"description": "🔍 Scan and research CVE-2025-36911 vulnerabilities with WPair, a specialized tool for Android built in Kotlin, ensuring your applications remain secure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T01:59:47Z",
|
||||
"updated_at": "2026-04-30T05:42:28Z",
|
||||
"pushed_at": "2026-04-30T05:42:25Z",
|
||||
"updated_at": "2026-04-30T11:58:53Z",
|
||||
"pushed_at": "2026-04-30T11:58:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -19,7 +19,7 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -27,7 +27,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-07-14T09:53:04Z",
|
||||
"updated_at": "2025-07-14T15:56:19Z",
|
||||
"pushed_at": "2025-07-14T10:08:56Z",
|
||||
"updated_at": "2026-04-30T08:41:44Z",
|
||||
"pushed_at": "2026-04-30T08:41:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-07-14T10:10:37Z",
|
||||
"updated_at": "2025-07-14T16:45:31Z",
|
||||
"pushed_at": "2025-07-14T16:45:27Z",
|
||||
"updated_at": "2026-04-30T08:40:34Z",
|
||||
"pushed_at": "2026-04-30T08:40:30Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Claude Skill that audits your projects for RLS misconfigurations, exposed keys, auth bypasses, and storage vulnerabilities. 27 anti-patterns sourced from CVE-2025-48757 and 10 security studies. Safe for production.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-15T14:49:30Z",
|
||||
"updated_at": "2026-04-30T04:42:20Z",
|
||||
"pushed_at": "2026-04-30T04:40:24Z",
|
||||
"updated_at": "2026-04-30T08:42:59Z",
|
||||
"pushed_at": "2026-04-30T08:42:55Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -251,8 +251,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2025-09-19T17:17:19Z",
|
||||
"updated_at": "2026-04-30T04:31:15Z",
|
||||
"pushed_at": "2026-04-30T04:31:12Z",
|
||||
"updated_at": "2026-04-30T10:29:59Z",
|
||||
"pushed_at": "2026-04-30T10:29:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-13T07:51:09Z",
|
||||
"updated_at": "2026-04-30T04:48:51Z",
|
||||
"pushed_at": "2026-04-30T04:48:47Z",
|
||||
"updated_at": "2026-04-30T10:52:43Z",
|
||||
"pushed_at": "2026-04-30T10:52:39Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-06T09:27:39Z",
|
||||
"updated_at": "2026-04-30T04:49:38Z",
|
||||
"pushed_at": "2026-04-30T04:49:34Z",
|
||||
"updated_at": "2026-04-30T10:54:08Z",
|
||||
"pushed_at": "2026-04-30T10:54:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛡️ Analyze CVE-2025-5419 to exploit an uninitialized read vulnerability in V8 for arbitrary read\/write access within the sandbox environment.",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-25T04:41:49Z",
|
||||
"updated_at": "2026-04-30T05:50:51Z",
|
||||
"pushed_at": "2026-04-30T05:50:48Z",
|
||||
"updated_at": "2026-04-30T12:09:31Z",
|
||||
"pushed_at": "2026-04-30T12:09:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -67,8 +67,8 @@
|
|||
"description": "🐙 CVE-2025-54253 exploit demo for Adobe AEM Forms on JEE: OGNL injection to RCE with PoC, Python 3.10 exploit code, reproducer and mitigation guidance.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-17T22:04:33Z",
|
||||
"updated_at": "2026-04-30T04:25:55Z",
|
||||
"pushed_at": "2026-04-30T04:25:51Z",
|
||||
"updated_at": "2026-04-30T10:23:19Z",
|
||||
"pushed_at": "2026-04-30T10:23:13Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -53,8 +53,8 @@
|
|||
"description": "CVE-2025-54424: 1Panel TLS client cert bypass enables RCE via forged CN 'panel_client' using a bundled scanning and exploitation tool. Affected: <= v2.0.5. 🔐",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-14T05:16:16Z",
|
||||
"updated_at": "2026-04-30T04:25:33Z",
|
||||
"pushed_at": "2026-04-30T04:25:29Z",
|
||||
"updated_at": "2026-04-30T10:22:52Z",
|
||||
"pushed_at": "2026-04-30T10:22:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Demonstrate CVE-2025-55182, a critical vulnerability in React Server Components allowing unauthenticated arbitrary code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-18T02:04:33Z",
|
||||
"updated_at": "2026-04-30T05:17:51Z",
|
||||
"pushed_at": "2026-04-30T05:17:47Z",
|
||||
"updated_at": "2026-04-30T11:27:51Z",
|
||||
"pushed_at": "2026-04-30T11:27:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -66,8 +66,8 @@
|
|||
"description": "🔍 Scan for CVE-2025-55182 risks in React Server Components with this non-intrusive tool that helps detect critical vulnerabilities in your applications.",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-17T10:19:10Z",
|
||||
"updated_at": "2026-04-30T05:17:31Z",
|
||||
"pushed_at": "2026-04-30T05:17:27Z",
|
||||
"updated_at": "2026-04-30T11:27:29Z",
|
||||
"pushed_at": "2026-04-30T11:27:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -151,8 +151,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-55182 and CVE-2025-66478 in Next.js apps with this reliable command-line scanner.",
|
||||
"fork": false,
|
||||
"created_at": "2023-11-27T18:17:43Z",
|
||||
"updated_at": "2026-04-30T05:17:41Z",
|
||||
"pushed_at": "2026-04-30T05:17:36Z",
|
||||
"updated_at": "2026-04-30T11:27:32Z",
|
||||
"pushed_at": "2026-04-30T11:27:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -203,8 +203,8 @@
|
|||
"description": "🚨 Exploit CVE-2025-55182, a critical RCE vulnerability in React Server Components for Next.js apps; enables testing for prototype pollution risks.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-24T02:36:56Z",
|
||||
"updated_at": "2026-04-30T05:18:40Z",
|
||||
"pushed_at": "2026-04-30T05:18:36Z",
|
||||
"updated_at": "2026-04-30T11:28:33Z",
|
||||
"pushed_at": "2026-04-30T11:28:29Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -251,8 +251,8 @@
|
|||
"description": "🚨 Exploit and scan for CVE-2025-55182, a critical React\/Next.js vulnerability enabling remote code execution through prototype pollution techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2024-05-28T16:48:51Z",
|
||||
"updated_at": "2026-04-30T05:17:14Z",
|
||||
"pushed_at": "2026-04-30T05:17:11Z",
|
||||
"updated_at": "2026-04-30T11:27:06Z",
|
||||
"pushed_at": "2026-04-30T11:27:00Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -303,8 +303,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2024-11-29T12:32:19Z",
|
||||
"updated_at": "2026-04-30T05:18:13Z",
|
||||
"pushed_at": "2026-04-30T05:18:09Z",
|
||||
"updated_at": "2026-04-30T11:28:09Z",
|
||||
"pushed_at": "2026-04-30T11:28:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -352,8 +352,8 @@
|
|||
"description": "🛠️ Exploit CVE-2025-55182 effortlessly with this GUI tool for vulnerability detection, command execution, and Shell reverse connections.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-21T22:04:31Z",
|
||||
"updated_at": "2026-04-30T05:21:07Z",
|
||||
"pushed_at": "2026-04-30T05:21:03Z",
|
||||
"updated_at": "2026-04-30T11:31:32Z",
|
||||
"pushed_at": "2026-04-30T11:31:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -406,8 +406,8 @@
|
|||
"description": "🚨 Exploit CVE-2025-55182 to demonstrate RCE in React Server Functions, highlighting risks from insecure prototype references in Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-06-06T16:34:46Z",
|
||||
"updated_at": "2026-04-30T05:17:48Z",
|
||||
"pushed_at": "2026-04-30T05:17:44Z",
|
||||
"updated_at": "2026-04-30T08:10:21Z",
|
||||
"pushed_at": "2026-04-30T08:10:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -458,8 +458,8 @@
|
|||
"description": "⚠️ Explore a vulnerable environment to test security scanners against the CVE-2025-55182 RCE flaw in React Server Components and Next.js applications.",
|
||||
"fork": false,
|
||||
"created_at": "2025-07-15T18:33:34Z",
|
||||
"updated_at": "2026-04-30T05:18:38Z",
|
||||
"pushed_at": "2026-04-30T05:18:35Z",
|
||||
"updated_at": "2026-04-30T11:28:57Z",
|
||||
"pushed_at": "2026-04-30T11:28:53Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -2539,10 +2539,10 @@
|
|||
"description": "CVE-2025-55182 React Server Components Remote Code Execution Exploit Tool",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-05T06:07:15Z",
|
||||
"updated_at": "2026-02-11T23:12:26Z",
|
||||
"updated_at": "2026-04-30T10:52:37Z",
|
||||
"pushed_at": "2025-12-05T11:39:49Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
|
@ -2553,7 +2553,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
@ -8773,7 +8773,7 @@
|
|||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -8791,7 +8791,7 @@
|
|||
"waku"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
@ -10213,7 +10213,7 @@
|
|||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -10229,7 +10229,7 @@
|
|||
"security-tools"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"forks": 3,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
@ -12284,8 +12284,8 @@
|
|||
"description": "🛡️ Explore CVE-2025-55182, a critical RCE vulnerability in React's Flight Protocol, demonstrating exploitation techniques and mitigation strategies.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T14:48:19Z",
|
||||
"updated_at": "2026-04-30T05:18:02Z",
|
||||
"pushed_at": "2026-04-30T05:17:58Z",
|
||||
"updated_at": "2026-04-30T11:27:20Z",
|
||||
"pushed_at": "2026-04-30T11:27:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12369,8 +12369,8 @@
|
|||
"description": "🚨 Identify and address CVE-2025-55182, a critical React Server vulnerability allowing remote code execution without authentication.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:44:51Z",
|
||||
"updated_at": "2026-04-30T05:16:49Z",
|
||||
"pushed_at": "2026-04-30T05:16:46Z",
|
||||
"updated_at": "2026-04-30T11:26:45Z",
|
||||
"pushed_at": "2026-04-30T11:26:42Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12418,8 +12418,8 @@
|
|||
"description": "🚨 Demonstrate CVE-2025-55182, a critical React vulnerability allowing remote code execution via prototype chain pollution in `react-server-dom-webpack@19.0.0`.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-24T18:48:07Z",
|
||||
"updated_at": "2026-04-30T05:16:53Z",
|
||||
"pushed_at": "2026-04-30T05:16:50Z",
|
||||
"updated_at": "2026-04-30T11:26:41Z",
|
||||
"pushed_at": "2026-04-30T11:26:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12503,8 +12503,8 @@
|
|||
"description": "🔍 Exploit CVE-2025-55182 in Next.js with this versatile tool for security research, featuring advanced payloads and WAF bypass techniques.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-25T19:28:28Z",
|
||||
"updated_at": "2026-04-30T05:18:16Z",
|
||||
"pushed_at": "2026-04-30T05:18:13Z",
|
||||
"updated_at": "2026-04-30T11:28:15Z",
|
||||
"pushed_at": "2026-04-30T11:28:11Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12705,8 +12705,8 @@
|
|||
"description": "⚡ Discover and exploit CVE-2025-55182 with this PoC, offering reliable remote code execution tests for React Server Components in Next.js.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-26T22:26:55Z",
|
||||
"updated_at": "2026-04-30T05:18:21Z",
|
||||
"pushed_at": "2026-04-30T05:18:18Z",
|
||||
"updated_at": "2026-04-30T11:28:11Z",
|
||||
"pushed_at": "2026-04-30T11:28:07Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -12975,8 +12975,8 @@
|
|||
"description": "🛡️ Scan and assess vulnerabilities in Next.js\/Waku with the CVE-2025-55182-Scanner, combining static and dynamic analysis for robust security.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T01:28:57Z",
|
||||
"updated_at": "2026-04-30T05:22:50Z",
|
||||
"pushed_at": "2026-04-30T05:22:46Z",
|
||||
"updated_at": "2026-04-30T11:33:20Z",
|
||||
"pushed_at": "2026-04-30T11:33:16Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -13496,8 +13496,8 @@
|
|||
"description": "🔍 Exploit CVE-2025-55182 vulnerabilities in Next.js and React with this efficient framework for rapid testing and assessment.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-08T16:28:04Z",
|
||||
"updated_at": "2026-04-30T05:27:56Z",
|
||||
"pushed_at": "2026-04-30T05:27:52Z",
|
||||
"updated_at": "2026-04-30T11:39:16Z",
|
||||
"pushed_at": "2026-04-30T11:39:12Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -15530,48 +15530,5 @@
|
|||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1225000034,
|
||||
"name": "reactguard",
|
||||
"full_name": "Theori-lO\/reactguard",
|
||||
"owner": {
|
||||
"login": "Theori-lO",
|
||||
"id": 280516657,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/280516657?v=4",
|
||||
"html_url": "https:\/\/github.com\/Theori-lO",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Theori-lO\/reactguard",
|
||||
"description": "ReactGuard provides framework- and vulnerability-detection tooling for CVE-2025-55182 (React2Shell)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-29T21:03:16Z",
|
||||
"updated_at": "2026-04-29T21:03:41Z",
|
||||
"pushed_at": "2026-04-29T21:03:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"cve-2025-55182",
|
||||
"cve-2025-55183",
|
||||
"cve-2025-55184",
|
||||
"cve-2025-67779",
|
||||
"nextjs",
|
||||
"react",
|
||||
"react2shell",
|
||||
"reactguard",
|
||||
"waku"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -289,8 +289,8 @@
|
|||
"description": "🛠️ Test and validate the CVE-2025-55184 vulnerability in React Server Components to enhance your application's security against denial-of-service attacks.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-02T05:04:03Z",
|
||||
"updated_at": "2026-04-30T05:23:16Z",
|
||||
"pushed_at": "2026-04-30T05:23:12Z",
|
||||
"updated_at": "2026-04-30T11:33:50Z",
|
||||
"pushed_at": "2026-04-30T11:33:46Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -200,8 +200,8 @@
|
|||
"description": "🔍 Analyze WSUS deserialization behavior to enhance security, generate reports, and identify configuration weaknesses in your infrastructure.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-29T02:16:04Z",
|
||||
"updated_at": "2026-04-30T05:42:30Z",
|
||||
"pushed_at": "2026-04-30T05:42:26Z",
|
||||
"updated_at": "2026-04-30T11:58:33Z",
|
||||
"pushed_at": "2026-04-30T11:58:26Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -146,8 +146,8 @@
|
|||
"description": "Read-only safety scanner for Claude Code projects. Catches CVE-2025-59536, statusLine injection, prompt injection, and more.",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-30T04:16:55Z",
|
||||
"updated_at": "2026-04-30T04:59:47Z",
|
||||
"pushed_at": "2026-04-30T04:59:43Z",
|
||||
"updated_at": "2026-04-30T07:01:10Z",
|
||||
"pushed_at": "2026-04-30T07:01:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔍 Detect vulnerabilities CVE-2025-61882 and CVE-2025-61884 in Oracle E-Business Suite to help secure your systems from potential remote code execution threats.",
|
||||
"fork": false,
|
||||
"created_at": "2025-03-04T15:38:32Z",
|
||||
"updated_at": "2026-04-30T04:47:30Z",
|
||||
"pushed_at": "2026-04-30T04:47:26Z",
|
||||
"updated_at": "2026-04-30T10:51:04Z",
|
||||
"pushed_at": "2026-04-30T10:51:01Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -179,8 +179,8 @@
|
|||
"description": "🔍 Demonstrate and validate the `addressof` and `fakeobj` primitives in the V8 sandbox for advanced security research on CVE-2025-6554.",
|
||||
"fork": false,
|
||||
"created_at": "2025-08-10T21:07:43Z",
|
||||
"updated_at": "2026-04-30T05:12:40Z",
|
||||
"pushed_at": "2026-04-30T05:12:36Z",
|
||||
"updated_at": "2026-04-30T11:22:04Z",
|
||||
"pushed_at": "2026-04-30T11:21:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -64,8 +64,8 @@
|
|||
"description": "Demonstrate exploitation of Signal K Server CVE-2025-66398 allowing unauthenticated attackers to inject backdoor and enable remote code execution.",
|
||||
"fork": false,
|
||||
"created_at": "2026-03-23T09:09:21Z",
|
||||
"updated_at": "2026-04-30T06:17:52Z",
|
||||
"pushed_at": "2026-04-30T06:17:49Z",
|
||||
"updated_at": "2026-04-30T12:41:59Z",
|
||||
"pushed_at": "2026-04-30T12:41:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🔧 Fix vulnerable versions in Next.js and React RSC apps with one command to secure against CVE-2025-66478. Improve your app's safety effortlessly.",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-01T07:40:09Z",
|
||||
"updated_at": "2026-04-30T05:18:58Z",
|
||||
"pushed_at": "2026-04-30T05:18:55Z",
|
||||
"updated_at": "2026-04-30T11:29:07Z",
|
||||
"pushed_at": "2026-04-30T11:29:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
@ -129,10 +129,10 @@
|
|||
"description": "A command-line scanner for batch detection of Next.js application versions and determining if they are affected by CVE-2025-66478 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-04T13:13:33Z",
|
||||
"updated_at": "2026-04-30T04:24:58Z",
|
||||
"updated_at": "2026-04-30T10:46:04Z",
|
||||
"pushed_at": "2025-12-16T03:18:16Z",
|
||||
"stargazers_count": 421,
|
||||
"watchers_count": 421,
|
||||
"stargazers_count": 422,
|
||||
"watchers_count": 422,
|
||||
"has_discussions": false,
|
||||
"forks_count": 87,
|
||||
"allow_forking": true,
|
||||
|
|
@ -148,7 +148,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 87,
|
||||
"watchers": 421,
|
||||
"watchers": 422,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
|||
|
|
@ -156,7 +156,7 @@
|
|||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
|
@ -164,7 +164,7 @@
|
|||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
|
|
|
|||
|
|
@ -47,8 +47,8 @@
|
|||
"description": "🔍 Identify and understand the local privilege escalation vulnerability (CVE-2025-68921) in Nahimic audio software, impacting many gaming laptops.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-24T21:00:41Z",
|
||||
"updated_at": "2026-04-30T05:39:28Z",
|
||||
"pushed_at": "2026-04-30T05:39:25Z",
|
||||
"updated_at": "2026-04-30T11:54:09Z",
|
||||
"pushed_at": "2026-04-30T11:54:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "Exploit CVE-2025-69985 to bypass authentication and execute remote commands on FUXA versions ≤ 1.2.8 via the \/api\/runscript endpoint.",
|
||||
"fork": false,
|
||||
"created_at": "2025-04-10T09:18:30Z",
|
||||
"updated_at": "2026-04-30T06:04:38Z",
|
||||
"pushed_at": "2026-04-30T06:04:34Z",
|
||||
"updated_at": "2026-04-30T12:27:27Z",
|
||||
"pushed_at": "2026-04-30T12:27:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-04-30T06:00:06Z",
|
||||
"pushed_at": "2026-04-30T06:00:03Z",
|
||||
"updated_at": "2026-04-30T12:21:52Z",
|
||||
"pushed_at": "2026-04-30T12:21:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
@ -68,10 +68,10 @@
|
|||
"description": "The PoC for CVE-2025-70795 \/ CVE-2026-0828 and updated driver",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-14T11:50:08Z",
|
||||
"updated_at": "2026-04-16T19:33:33Z",
|
||||
"updated_at": "2026-04-30T10:53:59Z",
|
||||
"pushed_at": "2026-03-13T09:52:10Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
|
@ -82,7 +82,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -838,8 +838,8 @@
|
|||
"description": "🛠 Exploit CVE-2025-8088 with this Python tool to generate malicious WinRAR archives that ensure payload persistence in Windows startup folders.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-20T13:52:21Z",
|
||||
"updated_at": "2026-04-30T05:13:57Z",
|
||||
"pushed_at": "2026-04-30T05:13:53Z",
|
||||
"updated_at": "2026-04-30T11:23:18Z",
|
||||
"pushed_at": "2026-04-30T11:23:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -146,8 +146,8 @@
|
|||
"description": "🔍 Detect improper symbolic link handling in Gogs' PutContents API, exposing local code execution risks for versions 0.13.3 and earlier.",
|
||||
"fork": false,
|
||||
"created_at": "2025-12-31T13:25:07Z",
|
||||
"updated_at": "2026-04-30T05:22:18Z",
|
||||
"pushed_at": "2026-04-30T05:22:14Z",
|
||||
"updated_at": "2026-04-30T11:33:27Z",
|
||||
"pushed_at": "2026-04-30T11:33:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🚀 Exploit CVE-2025-9074 with this Docker escape framework, simplifying API vulnerabilities and enhancing security testing for developers and researchers.",
|
||||
"fork": false,
|
||||
"created_at": "2024-06-19T23:21:41Z",
|
||||
"updated_at": "2026-04-30T05:23:47Z",
|
||||
"pushed_at": "2026-04-30T05:23:43Z",
|
||||
"updated_at": "2026-04-30T11:34:29Z",
|
||||
"pushed_at": "2026-04-30T11:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1129927025,
|
||||
"name": "CVE-2026-0628-POC",
|
||||
"full_name": "fevar54\/CVE-2026-0628-POC",
|
||||
"owner": {
|
||||
"login": "fevar54",
|
||||
"id": 80516843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4",
|
||||
"html_url": "https:\/\/github.com\/fevar54",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fevar54\/CVE-2026-0628-POC",
|
||||
"description": "Prueba de concepto (PoC) para CVE-2026-0628, que demuestra la inyección de scripts en páginas privilegiadas mediante el uso de la etiqueta <webview> en Google Chrome. Esta vulnerabilidad, clasificada como CWE-862 (Missing Authorization), permite a una extensión maliciosa eludir políticas de seguridad en versiones anteriores a la 143.0.7499.192.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-07T19:29:28Z",
|
||||
"updated_at": "2026-01-07T19:35:37Z",
|
||||
"pushed_at": "2026-01-07T19:35:33Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1146636584,
|
||||
"name": "Dissecting-CVE-2026-0628-Chromium-Extension-Privilege-Escalation",
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Exploit and control Windows processes using CVE-2025-70795 and CVE-2026-0828 with driver-based termination tools.",
|
||||
"fork": false,
|
||||
"created_at": "2024-04-20T04:18:24Z",
|
||||
"updated_at": "2026-04-30T06:00:06Z",
|
||||
"pushed_at": "2026-04-30T06:00:03Z",
|
||||
"updated_at": "2026-04-30T12:21:52Z",
|
||||
"pushed_at": "2026-04-30T12:21:48Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
|
|
@ -68,10 +68,10 @@
|
|||
"description": "BYOVD research performed by KOSEC. Includes vulnerable drivers and writeups (CVE-2026-0828).",
|
||||
"fork": false,
|
||||
"created_at": "2025-10-15T02:11:59Z",
|
||||
"updated_at": "2026-04-29T19:32:33Z",
|
||||
"updated_at": "2026-04-30T08:11:58Z",
|
||||
"pushed_at": "2026-03-18T00:25:06Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
|
@ -82,7 +82,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
@ -134,10 +134,10 @@
|
|||
"description": "The PoC for CVE-2025-70795 \/ CVE-2026-0828 and updated driver",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-14T11:50:08Z",
|
||||
"updated_at": "2026-04-16T19:33:33Z",
|
||||
"updated_at": "2026-04-30T10:53:59Z",
|
||||
"pushed_at": "2026-03-13T09:52:10Z",
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
|
|
@ -148,7 +148,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 43,
|
||||
"watchers": 44,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
|
|
@ -167,10 +167,10 @@
|
|||
"description": "Kernel Process Termination Tool ( CVE-2026-0828 exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2026-04-02T14:28:37Z",
|
||||
"updated_at": "2026-04-28T10:12:13Z",
|
||||
"updated_at": "2026-04-30T11:08:43Z",
|
||||
"pushed_at": "2026-04-02T14:32:56Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
|
|
@ -181,7 +181,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 22,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1126407015,
|
||||
"name": "smart-sketcher-upload",
|
||||
"full_name": "davidrxchester\/smart-sketcher-upload",
|
||||
"owner": {
|
||||
"login": "davidrxchester",
|
||||
"id": 81665391,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81665391?v=4",
|
||||
"html_url": "https:\/\/github.com\/davidrxchester",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/davidrxchester\/smart-sketcher-upload",
|
||||
"description": "CVE-2026-0842",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-01T21:07:07Z",
|
||||
"updated_at": "2026-02-17T20:26:16Z",
|
||||
"pushed_at": "2026-01-10T15:50:04Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1136632618,
|
||||
"name": "CVE-2026-1107",
|
||||
"full_name": "Iniivan13\/CVE-2026-1107",
|
||||
"owner": {
|
||||
"login": "Iniivan13",
|
||||
"id": 176641605,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/176641605?v=4",
|
||||
"html_url": "https:\/\/github.com\/Iniivan13",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Iniivan13\/CVE-2026-1107",
|
||||
"description": "A weakness has been identified in EyouCMS up to 1.7.1\/5.0. Impacted is the function check_userinfo of the file Diyajax.php of the component Member Avatar Handler. Executing a manipulation of the argument viewfile can lead to unrestricted upload. The attack may be performed from remote.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-18T03:30:08Z",
|
||||
"updated_at": "2026-01-18T03:32:44Z",
|
||||
"pushed_at": "2026-01-18T03:32:41Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1134257964,
|
||||
"name": "CVE-2026-20805-POC",
|
||||
"full_name": "fevar54\/CVE-2026-20805-POC",
|
||||
"owner": {
|
||||
"login": "fevar54",
|
||||
"id": 80516843,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80516843?v=4",
|
||||
"html_url": "https:\/\/github.com\/fevar54",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fevar54\/CVE-2026-20805-POC",
|
||||
"description": "# CVE-2026-20805 PoC Prueba de concepto para la vulnerabilidad de divulgación de información en **Desktop Windows Manager (dwm.exe)** de Microsoft. ## 📋 Resumen de la Vulnerabilidad - **ID:** CVE-2026-20805 - **Producto:** Microsoft Windows",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-14T13:26:26Z",
|
||||
"updated_at": "2026-04-09T17:05:00Z",
|
||||
"pushed_at": "2026-01-14T13:34:08Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1137741233,
|
||||
"name": "CVE-2026-20805-PoC",
|
||||
|
|
|
|||
|
|
@ -14,10 +14,10 @@
|
|||
"description": "Windows Error Reporting ALPC Elevation of Privilege (CVE-2026-20817) - Proof-of-Concept exploit demonstrating local privilege escalation via WER service. ",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-18T13:56:17Z",
|
||||
"updated_at": "2026-04-28T19:56:03Z",
|
||||
"updated_at": "2026-04-30T07:59:02Z",
|
||||
"pushed_at": "2026-02-19T13:37:06Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"has_discussions": false,
|
||||
"forks_count": 19,
|
||||
"allow_forking": true,
|
||||
|
|
@ -28,7 +28,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 19,
|
||||
"watchers": 118,
|
||||
"watchers": 119,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
|
|
|
|||
|
|
@ -14,8 +14,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad via markdown links exploiting unsecured URL protocols.",
|
||||
"fork": false,
|
||||
"created_at": "2024-09-22T12:19:06Z",
|
||||
"updated_at": "2026-04-30T05:59:25Z",
|
||||
"pushed_at": "2026-04-30T05:59:22Z",
|
||||
"updated_at": "2026-04-30T12:20:19Z",
|
||||
"pushed_at": "2026-04-30T12:20:15Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
@ -412,8 +412,8 @@
|
|||
"description": "🛠 Demonstrate remote code execution in Windows Notepad versions below 11.2510 using the CVE-2026-20841 proof of concept.",
|
||||
"fork": false,
|
||||
"created_at": "2026-02-26T05:21:28Z",
|
||||
"updated_at": "2026-04-30T05:58:31Z",
|
||||
"pushed_at": "2026-04-30T05:58:28Z",
|
||||
"updated_at": "2026-04-30T12:19:14Z",
|
||||
"pushed_at": "2026-04-30T12:19:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
|||
|
|
@ -1,35 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1126396422,
|
||||
"name": "CVE-2026-21437",
|
||||
"full_name": "osmancanvural\/CVE-2026-21437",
|
||||
"owner": {
|
||||
"login": "osmancanvural",
|
||||
"id": 123651825,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123651825?v=4",
|
||||
"html_url": "https:\/\/github.com\/osmancanvural",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/osmancanvural\/CVE-2026-21437",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2026-01-01T20:31:16Z",
|
||||
"updated_at": "2026-01-02T01:29:16Z",
|
||||
"pushed_at": "2026-01-02T01:29:13Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -1,113 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1128611560,
|
||||
"name": "CVE-2026-21440",
|
||||
"full_name": "you-ssef9\/CVE-2026-21440",
|
||||
"owner": {
|
||||
"login": "you-ssef9",
|
||||
"id": 206147093,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/206147093?v=4",
|
||||
"html_url": "https:\/\/github.com\/you-ssef9",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/you-ssef9\/CVE-2026-21440",
|
||||
"description": "Advanced detection-only PoC for CVE-2026-21440 affecting AdonisJS BodyParser. No exploitation included.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-05T22:40:37Z",
|
||||
"updated_at": "2026-01-10T14:57:12Z",
|
||||
"pushed_at": "2026-01-05T22:47:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1129447712,
|
||||
"name": "Ashwesker-CVE-2026-21440",
|
||||
"full_name": "redpack-kr\/Ashwesker-CVE-2026-21440",
|
||||
"owner": {
|
||||
"login": "redpack-kr",
|
||||
"id": 49622995,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49622995?v=4",
|
||||
"html_url": "https:\/\/github.com\/redpack-kr",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/redpack-kr\/Ashwesker-CVE-2026-21440",
|
||||
"description": "CVE-2026-21440",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-07T05:29:02Z",
|
||||
"updated_at": "2026-01-07T05:29:02Z",
|
||||
"pushed_at": "2026-01-05T15:18:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1130053662,
|
||||
"name": "cve-2026-21440-writeup-poc",
|
||||
"full_name": "k0nnect\/cve-2026-21440-writeup-poc",
|
||||
"owner": {
|
||||
"login": "k0nnect",
|
||||
"id": 66845682,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66845682?v=4",
|
||||
"html_url": "https:\/\/github.com\/k0nnect",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/k0nnect\/cve-2026-21440-writeup-poc",
|
||||
"description": "poc and writeup for cve-2026-21440: a critical path traversal vulnerability in @adonisjs\/bodyparser allowing arbitrary file writing",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-08T00:55:02Z",
|
||||
"updated_at": "2026-01-20T02:36:09Z",
|
||||
"pushed_at": "2026-01-08T02:21:06Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"adonisjs",
|
||||
"cve-2026-21440",
|
||||
"exploit",
|
||||
"nodejs",
|
||||
"path-traversal",
|
||||
"poc",
|
||||
"rce",
|
||||
"security-writeup",
|
||||
"vulnerability-research"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 3,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1145763070,
|
||||
"name": "CVE-2026-21440-POC-EXP",
|
||||
|
|
|
|||
|
|
@ -1,40 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 1127499197,
|
||||
"name": "CVE-2026-21445-PoC",
|
||||
"full_name": "chinaxploiter\/CVE-2026-21445-PoC",
|
||||
"owner": {
|
||||
"login": "chinaxploiter",
|
||||
"id": 244077382,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/244077382?v=4",
|
||||
"html_url": "https:\/\/github.com\/chinaxploiter",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/chinaxploiter\/CVE-2026-21445-PoC",
|
||||
"description": "Academic proof-of-concept demonstrating CVE-2026-21445 [LangFlow] for authorized security research.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-04T02:22:42Z",
|
||||
"updated_at": "2026-01-04T10:53:36Z",
|
||||
"pushed_at": "2026-01-04T02:30:41Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"codeb0ss",
|
||||
"cve-2026-21445",
|
||||
"cve-2026-21445-poc",
|
||||
"langflow"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
}
|
||||
]
|
||||
|
|
@ -41,74 +41,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 1132846567,
|
||||
"name": "Ni8mare",
|
||||
"full_name": "cropnet\/Ni8mare",
|
||||
"owner": {
|
||||
"login": "cropnet",
|
||||
"id": 44521465,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44521465?v=4",
|
||||
"html_url": "https:\/\/github.com\/cropnet",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cropnet\/Ni8mare",
|
||||
"description": "Comprehensive vulnerability detection tool for n8n workflow automation instances. Detects the critical CVE-2026-21858 vulnerability (CVSS 10.0) without performing any exploitation.",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-12T14:32:04Z",
|
||||
"updated_at": "2026-03-17T06:34:04Z",
|
||||
"pushed_at": "2026-01-12T16:20:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [
|
||||
"cve-2026-21858"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1136114565,
|
||||
"name": "SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit",
|
||||
"full_name": "sastraadiwiguna-purpleeliteteaming\/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit",
|
||||
"owner": {
|
||||
"login": "sastraadiwiguna-purpleeliteteaming",
|
||||
"id": 248769097,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/248769097?v=4",
|
||||
"html_url": "https:\/\/github.com\/sastraadiwiguna-purpleeliteteaming",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sastraadiwiguna-purpleeliteteaming\/SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit",
|
||||
"description": "SASTRA-ADI-WIGUNA-CVE-2026-21858-Holistic-Audit",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-17T04:57:53Z",
|
||||
"updated_at": "2026-01-18T17:49:57Z",
|
||||
"pushed_at": "2026-01-18T10:16:50Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1138220864,
|
||||
"name": "CVE-2026-21858",
|
||||
|
|
@ -184,39 +116,6 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1144045624,
|
||||
"name": "Ashwesker-CVE-2026-21858",
|
||||
"full_name": "bgarz929\/Ashwesker-CVE-2026-21858",
|
||||
"owner": {
|
||||
"login": "bgarz929",
|
||||
"id": 170430102,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170430102?v=4",
|
||||
"html_url": "https:\/\/github.com\/bgarz929",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/bgarz929\/Ashwesker-CVE-2026-21858",
|
||||
"description": "CVE-2026-21858",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-28T08:17:42Z",
|
||||
"updated_at": "2026-01-28T08:17:42Z",
|
||||
"pushed_at": "2026-01-07T21:56:15Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1146309368,
|
||||
"name": "CVE-2026-21858",
|
||||
|
|
|
|||
|
|
@ -1,37 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 1141694461,
|
||||
"name": "CVE-2026-21876",
|
||||
"full_name": "Mefhika120\/CVE-2026-21876",
|
||||
"owner": {
|
||||
"login": "Mefhika120",
|
||||
"id": 257077128,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/257077128?v=4",
|
||||
"html_url": "https:\/\/github.com\/Mefhika120",
|
||||
"user_view_type": "public"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Mefhika120\/CVE-2026-21876",
|
||||
"description": "CVE-2026-21876 OWASP ModSecurity CRS WAF bypass (docker container + minimal PoC).",
|
||||
"fork": false,
|
||||
"created_at": "2026-01-25T08:57:34Z",
|
||||
"updated_at": "2026-01-25T08:57:35Z",
|
||||
"pushed_at": "2026-01-09T14:15:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"has_pull_requests": true,
|
||||
"pull_request_creation_policy": "all",
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
},
|
||||
{
|
||||
"id": 1206445621,
|
||||
"name": "CVE-2026-21876",
|
||||
|
|
|
|||
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Add a link
Reference in a new issue