mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/01/19 18:10:33
This commit is contained in:
parent
760b752a38
commit
0d82301377
44 changed files with 199 additions and 199 deletions
|
@ -59,13 +59,13 @@
|
|||
"description": "This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function will help you to get only the important information.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-04T11:44:22Z",
|
||||
"updated_at": "2020-12-07T08:46:24Z",
|
||||
"updated_at": "2021-01-19T03:30:51Z",
|
||||
"pushed_at": "2020-12-04T12:19:11Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -454,8 +454,8 @@
|
|||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 253,
|
||||
"watchers_count": 253,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 253,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -611,13 +611,13 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2021-01-06T06:29:40Z",
|
||||
"updated_at": "2021-01-19T08:14:34Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 88,
|
||||
"watchers_count": 88,
|
||||
"stargazers_count": 89,
|
||||
"watchers_count": 89,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"watchers": 88,
|
||||
"watchers": 89,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -358,13 +358,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-01-18T08:55:36Z",
|
||||
"updated_at": "2021-01-19T08:08:35Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2017-10-31T16:20:29Z",
|
||||
"stargazers_count": 260,
|
||||
"watchers_count": 260,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 260,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -159,5 +159,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 330894535,
|
||||
"name": "exploit-nginx-1.10.3",
|
||||
"full_name": "ninjabuster\/exploit-nginx-1.10.3",
|
||||
"owner": {
|
||||
"login": "ninjabuster",
|
||||
"id": 27276452,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27276452?v=4",
|
||||
"html_url": "https:\/\/github.com\/ninjabuster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/ninjabuster\/exploit-nginx-1.10.3",
|
||||
"description": "CVE-2017-7529 | nginx on the range 0.5.6 - 1.13.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-19T07:12:10Z",
|
||||
"updated_at": "2021-01-19T07:17:55Z",
|
||||
"pushed_at": "2021-01-19T07:17:52Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -115,25 +115,25 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185440912,
|
||||
"id": 185678026,
|
||||
"name": "CVE-2017-8570",
|
||||
"full_name": "930201676\/CVE-2017-8570",
|
||||
"full_name": "sasqwatch\/CVE-2017-8570",
|
||||
"owner": {
|
||||
"login": "930201676",
|
||||
"id": 20335327,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4",
|
||||
"html_url": "https:\/\/github.com\/930201676"
|
||||
"login": "sasqwatch",
|
||||
"id": 22352904,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22352904?v=4",
|
||||
"html_url": "https:\/\/github.com\/sasqwatch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/930201676\/CVE-2017-8570",
|
||||
"html_url": "https:\/\/github.com\/sasqwatch\/CVE-2017-8570",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-07T16:35:18Z",
|
||||
"updated_at": "2019-05-07T16:35:45Z",
|
||||
"created_at": "2019-05-08T20:53:27Z",
|
||||
"updated_at": "2021-01-19T05:54:41Z",
|
||||
"pushed_at": "2019-05-07T16:35:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -151,13 +151,13 @@
|
|||
"description": "Environment for CVE-2018-11776 \/ S2-057 (Apache Struts 2)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-25T12:45:15Z",
|
||||
"updated_at": "2020-04-06T19:13:36Z",
|
||||
"updated_at": "2021-01-19T03:50:38Z",
|
||||
"pushed_at": "2018-08-25T14:20:46Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2019-12-07T14:18:04Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -321,29 +321,6 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 185440756,
|
||||
"name": "CVE-2018-20250",
|
||||
"full_name": "930201676\/CVE-2018-20250",
|
||||
"owner": {
|
||||
"login": "930201676",
|
||||
"id": 20335327,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4",
|
||||
"html_url": "https:\/\/github.com\/930201676"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/930201676\/CVE-2018-20250",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-05-07T16:34:10Z",
|
||||
"updated_at": "2019-05-07T16:34:31Z",
|
||||
"pushed_at": "2019-05-07T16:34:29Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 241136874,
|
||||
"name": "CVE-2018-20250-WinRAR",
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2021-01-17T03:14:14Z",
|
||||
"updated_at": "2021-01-19T03:52:57Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,8 +473,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-10-18T14:01:59Z",
|
||||
"updated_at": "2021-01-18T12:02:05Z",
|
||||
"pushed_at": "2021-01-18T12:02:03Z",
|
||||
"updated_at": "2021-01-19T03:16:57Z",
|
||||
"pushed_at": "2021-01-19T03:16:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2021-01-18T10:16:03Z",
|
||||
"updated_at": "2021-01-19T07:30:54Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"forks_count": 114,
|
||||
"forks": 114,
|
||||
"watchers": 330,
|
||||
"watchers": 329,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "(CVE-2018-9995) Get DVR Credentials",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-29T20:00:06Z",
|
||||
"updated_at": "2021-01-19T02:08:45Z",
|
||||
"updated_at": "2021-01-19T07:48:38Z",
|
||||
"pushed_at": "2019-01-23T14:27:21Z",
|
||||
"stargazers_count": 439,
|
||||
"watchers_count": 439,
|
||||
"forks_count": 182,
|
||||
"forks": 182,
|
||||
"watchers": 439,
|
||||
"stargazers_count": 440,
|
||||
"watchers_count": 440,
|
||||
"forks_count": 183,
|
||||
"forks": 183,
|
||||
"watchers": 440,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat Remote Code Execution on Windows",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-15T07:54:25Z",
|
||||
"updated_at": "2021-01-03T19:50:38Z",
|
||||
"updated_at": "2021-01-19T03:35:37Z",
|
||||
"pushed_at": "2019-11-27T07:39:40Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 177,
|
||||
"watchers": 178,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1236,8 +1236,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 786,
|
||||
"watchers_count": 786,
|
||||
"forks_count": 194,
|
||||
"forks": 194,
|
||||
"forks_count": 193,
|
||||
"forks": 193,
|
||||
"watchers": 786,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2428,13 +2428,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2021-01-18T06:00:57Z",
|
||||
"updated_at": "2021-01-19T07:05:45Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 173,
|
||||
"watchers_count": 173,
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"watchers": 173,
|
||||
"watchers": 174,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2576,21 +2576,21 @@
|
|||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 328879468,
|
||||
"id": 330872202,
|
||||
"name": "CVE-2019-0708-EXP-Windows",
|
||||
"full_name": "930201676\/CVE-2019-0708-EXP-Windows",
|
||||
"full_name": "go-bi\/CVE-2019-0708-EXP-Windows",
|
||||
"owner": {
|
||||
"login": "930201676",
|
||||
"id": 20335327,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/20335327?v=4",
|
||||
"html_url": "https:\/\/github.com\/930201676"
|
||||
"login": "go-bi",
|
||||
"id": 77657159,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/77657159?v=4",
|
||||
"html_url": "https:\/\/github.com\/go-bi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/930201676\/CVE-2019-0708-EXP-Windows",
|
||||
"html_url": "https:\/\/github.com\/go-bi\/CVE-2019-0708-EXP-Windows",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-12T05:14:24Z",
|
||||
"updated_at": "2021-01-12T05:19:54Z",
|
||||
"pushed_at": "2021-01-12T05:19:19Z",
|
||||
"created_at": "2021-01-19T05:19:18Z",
|
||||
"updated_at": "2021-01-19T05:23:44Z",
|
||||
"pushed_at": "2021-01-19T05:23:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Jenkins RCE Proof-of-Concept: SECURITY-1266 \/ CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-15T05:59:24Z",
|
||||
"updated_at": "2020-12-02T16:34:39Z",
|
||||
"updated_at": "2021-01-19T03:15:21Z",
|
||||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 268,
|
||||
"watchers_count": 268,
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 268,
|
||||
"watchers": 269,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-01-18T07:53:31Z",
|
||||
"updated_at": "2021-01-19T07:56:00Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1630,
|
||||
"watchers_count": 1630,
|
||||
"stargazers_count": 1631,
|
||||
"watchers_count": 1631,
|
||||
"forks_count": 246,
|
||||
"forks": 246,
|
||||
"watchers": 1630,
|
||||
"watchers": 1631,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -132,8 +132,8 @@
|
|||
"pushed_at": "2019-08-27T09:29:05Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 51,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-03-18T06:21:13Z",
|
||||
"stargazers_count": 67,
|
||||
"watchers_count": 67,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 67,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 265,
|
||||
"watchers_count": 265,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"forks_count": 64,
|
||||
"forks": 64,
|
||||
"watchers": 265,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -155,8 +155,8 @@
|
|||
"pushed_at": "2019-11-01T07:16:09Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2021-01-14T15:22:06Z",
|
||||
"updated_at": "2021-01-19T06:37:31Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"stargazers_count": 186,
|
||||
"watchers_count": 186,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 185,
|
||||
"watchers": 186,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-18T13:45:07Z",
|
||||
"updated_at": "2021-01-19T03:16:06Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2275,
|
||||
"watchers_count": 2275,
|
||||
"stargazers_count": 2276,
|
||||
"watchers_count": 2276,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2275,
|
||||
"watchers": 2276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-06T13:13:58Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"forks_count": 115,
|
||||
"forks": 115,
|
||||
"watchers": 357,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2020-01-11T14:03:52Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 74,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2021-01-18T08:55:36Z",
|
||||
"updated_at": "2021-01-19T08:08:35Z",
|
||||
"pushed_at": "2020-10-01T20:20:41Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit code for CVE-2019-2729",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-09T22:27:36Z",
|
||||
"updated_at": "2020-08-12T04:06:49Z",
|
||||
"updated_at": "2021-01-19T03:49:41Z",
|
||||
"pushed_at": "2020-08-06T16:11:18Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-10-22T06:44:20Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 42,
|
||||
"forks": 42,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-02-22T11:28:21Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-9729. Transferred from https:\/\/github.com\/DoubleLabyrinth\/SdoKeyCrypt-sys-local-privilege-elevation",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-12T14:18:20Z",
|
||||
"updated_at": "2020-08-27T17:37:48Z",
|
||||
"updated_at": "2021-01-19T03:19:20Z",
|
||||
"pushed_at": "2019-03-13T01:24:21Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"forks_count": 26,
|
||||
"forks": 26,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-27T02:54:27Z",
|
||||
"updated_at": "2021-01-12T18:35:04Z",
|
||||
"updated_at": "2021-01-19T05:57:18Z",
|
||||
"pushed_at": "2020-06-19T09:28:15Z",
|
||||
"stargazers_count": 254,
|
||||
"watchers_count": 254,
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 89,
|
||||
"forks": 89,
|
||||
"watchers": 254,
|
||||
"watchers": 255,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2021-01-08T07:52:16Z",
|
||||
"updated_at": "2021-01-19T03:25:56Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 257,
|
||||
"watchers_count": 257,
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 257,
|
||||
"watchers": 258,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -910,13 +910,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2021-01-17T03:09:32Z",
|
||||
"updated_at": "2021-01-19T03:38:32Z",
|
||||
"pushed_at": "2020-12-07T20:04:27Z",
|
||||
"stargazers_count": 1061,
|
||||
"watchers_count": 1061,
|
||||
"forks_count": 356,
|
||||
"forks": 356,
|
||||
"watchers": 1061,
|
||||
"stargazers_count": 1062,
|
||||
"watchers_count": 1062,
|
||||
"forks_count": 355,
|
||||
"forks": 355,
|
||||
"watchers": 1062,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-12T13:38:19Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 736,
|
||||
"watchers_count": 736,
|
||||
"forks_count": 212,
|
||||
"forks": 212,
|
||||
"forks_count": 213,
|
||||
"forks": 213,
|
||||
"watchers": 736,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-01-18T13:45:07Z",
|
||||
"updated_at": "2021-01-19T03:16:06Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2275,
|
||||
"watchers_count": 2275,
|
||||
"stargazers_count": 2276,
|
||||
"watchers_count": 2276,
|
||||
"forks_count": 641,
|
||||
"forks": 641,
|
||||
"watchers": 2275,
|
||||
"watchers": 2276,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -335,13 +335,13 @@
|
|||
"description": "CVE-2020-14882\/14883\/14750",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-04T03:09:13Z",
|
||||
"updated_at": "2020-11-14T00:16:44Z",
|
||||
"updated_at": "2021-01-19T07:12:06Z",
|
||||
"pushed_at": "2020-11-04T03:15:33Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -519,8 +519,8 @@
|
|||
"description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-29T09:11:31Z",
|
||||
"updated_at": "2021-01-18T08:08:32Z",
|
||||
"pushed_at": "2021-01-18T08:08:29Z",
|
||||
"updated_at": "2021-01-19T08:02:47Z",
|
||||
"pushed_at": "2021-01-19T08:02:44Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-12-21T17:05:44Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 9,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2021-01-07T04:30:55Z",
|
||||
"updated_at": "2021-01-19T03:56:22Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 208,
|
||||
"watchers_count": 208,
|
||||
"stargazers_count": 209,
|
||||
"watchers_count": 209,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 208,
|
||||
"watchers": 209,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -312,13 +312,13 @@
|
|||
"description": "CISCO CVE-2020-3452 Scanner & Exploiter",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-05T14:41:13Z",
|
||||
"updated_at": "2021-01-19T01:46:43Z",
|
||||
"updated_at": "2021-01-19T05:38:01Z",
|
||||
"pushed_at": "2021-01-10T09:14:08Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": " CVE-2020-35728 & Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T01:55:39Z",
|
||||
"updated_at": "2021-01-19T02:43:52Z",
|
||||
"updated_at": "2021-01-19T05:45:53Z",
|
||||
"pushed_at": "2020-12-31T01:56:18Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-36179~82 Jackson-databind SSRF&RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-10T06:47:49Z",
|
||||
"updated_at": "2021-01-19T02:27:44Z",
|
||||
"updated_at": "2021-01-19T04:32:26Z",
|
||||
"pushed_at": "2021-01-10T06:48:53Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-36184 && Jackson-databind RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-11T06:22:25Z",
|
||||
"updated_at": "2021-01-18T01:06:38Z",
|
||||
"updated_at": "2021-01-19T06:59:44Z",
|
||||
"pushed_at": "2021-01-11T06:22:44Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-01-19T01:51:12Z",
|
||||
"updated_at": "2021-01-19T07:42:13Z",
|
||||
"pushed_at": "2021-01-13T13:25:10Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3996,7 +3996,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [AaronWilsonGrylls/CVE-2019-0708-POC](https://github.com/AaronWilsonGrylls/CVE-2019-0708-POC)
|
||||
- [alexa872/CVE-2019-0708](https://github.com/alexa872/CVE-2019-0708)
|
||||
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
|
||||
- [930201676/CVE-2019-0708-EXP-Windows](https://github.com/930201676/CVE-2019-0708-EXP-Windows)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
|
||||
### CVE-2019-0709 (2019-06-12)
|
||||
|
||||
|
@ -10531,7 +10531,6 @@ In WinRAR versions prior to and including 5.61, There is path traversal vulnerab
|
|||
- [joydragon/Detect-CVE-2018-20250](https://github.com/joydragon/Detect-CVE-2018-20250)
|
||||
- [DANIELVISPOBLOG/WinRar_ACE_exploit_CVE-2018-20250](https://github.com/DANIELVISPOBLOG/WinRar_ACE_exploit_CVE-2018-20250)
|
||||
- [likescam/CVE-2018-20250](https://github.com/likescam/CVE-2018-20250)
|
||||
- [930201676/CVE-2018-20250](https://github.com/930201676/CVE-2018-20250)
|
||||
- [eastmountyxz/CVE-2018-20250-WinRAR](https://github.com/eastmountyxz/CVE-2018-20250-WinRAR)
|
||||
- [lxg5763/cve-2018-20250](https://github.com/lxg5763/cve-2018-20250)
|
||||
|
||||
|
@ -11614,6 +11613,7 @@ Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer
|
|||
- [cyberk1w1/CVE-2017-7529](https://github.com/cyberk1w1/CVE-2017-7529)
|
||||
- [cyberharsh/nginx-CVE-2017-7529](https://github.com/cyberharsh/nginx-CVE-2017-7529)
|
||||
- [daehee/nginx-overflow](https://github.com/daehee/nginx-overflow)
|
||||
- [ninjabuster/exploit-nginx-1.10.3](https://github.com/ninjabuster/exploit-nginx-1.10.3)
|
||||
|
||||
### CVE-2017-7648 (2017-04-10)
|
||||
|
||||
|
@ -11740,7 +11740,7 @@ Microsoft Office allows a remote code execution vulnerability due to the way tha
|
|||
- [MaxSecurity/Office-CVE-2017-8570](https://github.com/MaxSecurity/Office-CVE-2017-8570)
|
||||
- [SwordSheath/CVE-2017-8570](https://github.com/SwordSheath/CVE-2017-8570)
|
||||
- [Drac0nids/CVE-2017-8570](https://github.com/Drac0nids/CVE-2017-8570)
|
||||
- [930201676/CVE-2017-8570](https://github.com/930201676/CVE-2017-8570)
|
||||
- [sasqwatch/CVE-2017-8570](https://github.com/sasqwatch/CVE-2017-8570)
|
||||
- [erfze/CVE-2017-8570](https://github.com/erfze/CVE-2017-8570)
|
||||
|
||||
### CVE-2017-8625 (2017-08-08)
|
||||
|
|
Loading…
Reference in a new issue