mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-26 01:24:10 +01:00
Auto Update 2023/12/11 06:35:15
This commit is contained in:
parent
5946179059
commit
19ef942692
152 changed files with 542 additions and 405 deletions
2016
2017
2018
2019
2020
CVE-2020-0674.jsonCVE-2020-0787.jsonCVE-2020-1283.jsonCVE-2020-1362.jsonCVE-2020-14882.jsonCVE-2020-17530.jsonCVE-2020-1938.jsonCVE-2020-24186.jsonCVE-2020-2551.jsonCVE-2020-2883.json
2021
CVE-2021-1675.jsonCVE-2021-2109.jsonCVE-2021-21123.jsonCVE-2021-2119.jsonCVE-2021-21972.jsonCVE-2021-26084.jsonCVE-2021-26828.jsonCVE-2021-31166.jsonCVE-2021-3129.jsonCVE-2021-3156.jsonCVE-2021-31630.jsonCVE-2021-34473.jsonCVE-2021-34558.jsonCVE-2021-3493.jsonCVE-2021-36798.jsonCVE-2021-4034.jsonCVE-2021-40444.jsonCVE-2021-40870.jsonCVE-2021-42013.jsonCVE-2021-42278.jsonCVE-2021-43297.jsonCVE-2021-43798.jsonCVE-2021-44228.jsonCVE-2021-45046.json
2022
CVE-2022-0778.jsonCVE-2022-0824.jsonCVE-2022-0847.jsonCVE-2022-0995.jsonCVE-2022-1388.jsonCVE-2022-1802.jsonCVE-2022-20361.jsonCVE-2022-21661.jsonCVE-2022-2185.jsonCVE-2022-21907.jsonCVE-2022-22629.jsonCVE-2022-22639.jsonCVE-2022-22947.jsonCVE-2022-22954.jsonCVE-2022-22963.jsonCVE-2022-22965.jsonCVE-2022-22980.jsonCVE-2022-23222.jsonCVE-2022-2333.jsonCVE-2022-24112.jsonCVE-2022-24637.jsonCVE-2022-24734.jsonCVE-2022-25636.jsonCVE-2022-2588.jsonCVE-2022-26134.jsonCVE-2022-26809.jsonCVE-2022-27666.jsonCVE-2022-27925.jsonCVE-2022-28281.jsonCVE-2022-28672.jsonCVE-2022-29072.jsonCVE-2022-29464.jsonCVE-2022-30781.jsonCVE-2022-31705.jsonCVE-2022-31898.jsonCVE-2022-32250.jsonCVE-2022-32532.jsonCVE-2022-32832.jsonCVE-2022-33891.jsonCVE-2022-33980.jsonCVE-2022-34265.jsonCVE-2022-34718.jsonCVE-2022-34918.jsonCVE-2022-35416.jsonCVE-2022-3602.jsonCVE-2022-36537.jsonCVE-2022-36804.jsonCVE-2022-37042.jsonCVE-2022-37706.jsonCVE-2022-39197.jsonCVE-2022-39952.jsonCVE-2022-40127.jsonCVE-2022-40494.jsonCVE-2022-40684.jsonCVE-2022-41040.jsonCVE-2022-41352.jsonCVE-2022-41852.jsonCVE-2022-42046.json
|
@ -78,13 +78,13 @@
|
|||
"stargazers_count": 936,
|
||||
"watchers_count": 936,
|
||||
"has_discussions": false,
|
||||
"forks_count": 403,
|
||||
"forks_count": 402,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 403,
|
||||
"forks": 402,
|
||||
"watchers": 936,
|
||||
"score": 0,
|
||||
"subscribers_count": 65
|
||||
|
|
|
@ -343,10 +343,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2023-12-06T14:02:36Z",
|
||||
"updated_at": "2023-12-11T01:49:38Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -355,7 +355,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -1,34 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 84158718,
|
||||
"name": "S2-045",
|
||||
"full_name": "PolarisLab\/S2-045",
|
||||
"owner": {
|
||||
"login": "PolarisLab",
|
||||
"id": 25890110,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
|
||||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-07T05:30:30Z",
|
||||
"updated_at": "2022-03-22T17:04:53Z",
|
||||
"pushed_at": "2017-03-07T05:37:55Z",
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 24,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 84186490,
|
||||
"name": "Struts2-045-Exp",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 376677801,
|
||||
"name": "CVE-2018-19422-SubrionCMS-RCE",
|
||||
"full_name": "h3v0x\/CVE-2018-19422-SubrionCMS-RCE",
|
||||
"full_name": "hev0x\/CVE-2018-19422-SubrionCMS-RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2018-19422-SubrionCMS-RCE",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2018-19422-SubrionCMS-RCE",
|
||||
"description": "CVE-2018-19422 Authenticated Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-14T01:50:21Z",
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2023-12-01T12:53:12Z",
|
||||
"updated_at": "2023-12-11T03:53:54Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 631,
|
||||
"watchers_count": 631,
|
||||
"stargazers_count": 632,
|
||||
"watchers_count": 632,
|
||||
"has_discussions": false,
|
||||
"forks_count": 135,
|
||||
"allow_forking": true,
|
||||
|
@ -68,7 +68,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 135,
|
||||
"watchers": 631,
|
||||
"watchers": 632,
|
||||
"score": 0,
|
||||
"subscribers_count": 17
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "My first Android app: Launch Fusée Gelée payloads from stock Android (CVE-2018-6242)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-28T11:50:00Z",
|
||||
"updated_at": "2023-12-05T17:03:46Z",
|
||||
"updated_at": "2023-12-11T04:51:03Z",
|
||||
"pushed_at": "2022-12-11T10:44:39Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"stargazers_count": 503,
|
||||
"watchers_count": 503,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 502,
|
||||
"watchers": 503,
|
||||
"score": 0,
|
||||
"subscribers_count": 57
|
||||
},
|
||||
|
|
|
@ -66,14 +66,14 @@
|
|||
{
|
||||
"id": 376662727,
|
||||
"name": "CVE-2019-12725-Command-Injection",
|
||||
"full_name": "h3v0x\/CVE-2019-12725-Command-Injection",
|
||||
"full_name": "hev0x\/CVE-2019-12725-Command-Injection",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2019-12725-Command-Injection",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2019-12725-Command-Injection",
|
||||
"description": "ZeroShell 3.9.0 Remote Command Injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:57:37Z",
|
||||
|
|
|
@ -43,12 +43,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-12-10T02:25:09Z",
|
||||
"updated_at": "2023-12-11T02:35:16Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3938,
|
||||
"watchers_count": 3938,
|
||||
"stargazers_count": 3939,
|
||||
"watchers_count": 3939,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1095,
|
||||
"forks_count": 1096,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -74,8 +74,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1095,
|
||||
"watchers": 3938,
|
||||
"forks": 1096,
|
||||
"watchers": 3939,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -134,7 +134,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-12-10T11:52:48Z",
|
||||
"updated_at": "2023-12-10T12:11:32Z",
|
||||
"pushed_at": "2023-12-10T16:31:56Z",
|
||||
"pushed_at": "2023-12-11T03:49:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2023-12-06T06:09:14Z",
|
||||
"updated_at": "2023-12-11T06:15:55Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 700,
|
||||
"watchers_count": 700,
|
||||
"stargazers_count": 698,
|
||||
"watchers_count": 698,
|
||||
"has_discussions": false,
|
||||
"forks_count": 179,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 179,
|
||||
"watchers": 700,
|
||||
"watchers": 698,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 7,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "writeup of CVE-2020-1362",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-17T07:35:05Z",
|
||||
"updated_at": "2023-09-28T11:18:02Z",
|
||||
"updated_at": "2023-12-11T06:16:37Z",
|
||||
"pushed_at": "2020-07-17T07:54:26Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 227,
|
||||
"watchers_count": 227,
|
||||
"has_discussions": false,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 228,
|
||||
"watchers": 227,
|
||||
"score": 0,
|
||||
"subscribers_count": 12
|
||||
}
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2023-12-10T02:25:09Z",
|
||||
"updated_at": "2023-12-11T06:16:00Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3938,
|
||||
"watchers_count": 3938,
|
||||
"stargazers_count": 3933,
|
||||
"watchers_count": 3933,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1095,
|
||||
"forks_count": 1096,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -44,8 +44,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1095,
|
||||
"watchers": 3938,
|
||||
"forks": 1096,
|
||||
"watchers": 3933,
|
||||
"score": 0,
|
||||
"subscribers_count": 155
|
||||
},
|
||||
|
|
|
@ -166,10 +166,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-12-30T17:23:20Z",
|
||||
"updated_at": "2023-09-28T11:23:31Z",
|
||||
"updated_at": "2023-12-11T06:16:28Z",
|
||||
"pushed_at": "2020-12-30T17:24:27Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
|
@ -178,7 +178,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 5,
|
||||
"watchers": 4,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -283,10 +283,10 @@
|
|||
"description": "批量扫描TomcatAJP漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-21T14:55:40Z",
|
||||
"updated_at": "2023-09-28T11:11:35Z",
|
||||
"updated_at": "2023-12-11T06:16:23Z",
|
||||
"pushed_at": "2020-02-22T01:58:22Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -295,7 +295,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 15,
|
||||
"watchers": 14,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -889,10 +889,10 @@
|
|||
"description": "Tomcat常见漏洞GUI利用工具。CVE-2017-12615 PUT文件上传漏洞、tomcat-pass-getshell 弱认证部署war包、弱口令爆破、CVE-2020-1938 Tomcat AJP文件读取\/包含",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-13T11:01:41Z",
|
||||
"updated_at": "2023-12-06T14:02:36Z",
|
||||
"updated_at": "2023-12-11T01:49:38Z",
|
||||
"pushed_at": "2022-11-15T09:05:50Z",
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
|
@ -901,7 +901,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 119,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
}
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 376657175,
|
||||
"name": "CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE",
|
||||
"full_name": "h3v0x\/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE",
|
||||
"full_name": "hev0x\/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2020-24186-WordPress-wpDiscuz-7.0.4-RCE",
|
||||
"description": "wpDiscuz 7.0.4 Remote Code Execution",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-13T23:10:19Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2023-12-08T12:40:04Z",
|
||||
"updated_at": "2023-12-11T06:15:54Z",
|
||||
"pushed_at": "2023-11-24T09:21:56Z",
|
||||
"stargazers_count": 1845,
|
||||
"watchers_count": 1845,
|
||||
"stargazers_count": 1843,
|
||||
"watchers_count": 1843,
|
||||
"has_discussions": false,
|
||||
"forks_count": 340,
|
||||
"allow_forking": true,
|
||||
|
@ -46,7 +46,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 340,
|
||||
"watchers": 1845,
|
||||
"watchers": 1843,
|
||||
"score": 0,
|
||||
"subscribers_count": 34
|
||||
},
|
||||
|
@ -124,10 +124,10 @@
|
|||
"description": "Weblogic IIOP CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-28T08:46:21Z",
|
||||
"updated_at": "2023-12-08T08:51:01Z",
|
||||
"updated_at": "2023-12-11T06:16:08Z",
|
||||
"pushed_at": "2020-04-07T03:32:24Z",
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"stargazers_count": 329,
|
||||
"watchers_count": 329,
|
||||
"has_discussions": false,
|
||||
"forks_count": 78,
|
||||
"allow_forking": true,
|
||||
|
@ -136,7 +136,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 78,
|
||||
"watchers": 331,
|
||||
"watchers": 329,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -108,10 +108,10 @@
|
|||
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞,一键注册蚁剑filter内存shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-08-19T03:34:06Z",
|
||||
"updated_at": "2023-11-23T06:22:24Z",
|
||||
"updated_at": "2023-12-11T06:16:05Z",
|
||||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"stargazers_count": 530,
|
||||
"watchers_count": 530,
|
||||
"has_discussions": false,
|
||||
"forks_count": 66,
|
||||
"allow_forking": true,
|
||||
|
@ -120,7 +120,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 66,
|
||||
"watchers": 532,
|
||||
"watchers": 530,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
},
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-12-08T12:43:21Z",
|
||||
"updated_at": "2023-12-11T06:17:36Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1760,
|
||||
"watchers_count": 1760,
|
||||
|
@ -301,7 +301,7 @@
|
|||
"description": "Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T23:45:58Z",
|
||||
"updated_at": "2023-12-08T12:43:21Z",
|
||||
"updated_at": "2023-12-11T06:17:36Z",
|
||||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 948,
|
||||
"watchers_count": 948,
|
||||
|
@ -942,7 +942,7 @@
|
|||
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T11:25:04Z",
|
||||
"updated_at": "2023-11-27T02:25:12Z",
|
||||
"updated_at": "2023-12-11T06:17:37Z",
|
||||
"pushed_at": "2021-09-01T11:25:22Z",
|
||||
"stargazers_count": 145,
|
||||
"watchers_count": 145,
|
||||
|
|
|
@ -1,4 +1,69 @@
|
|||
[
|
||||
{
|
||||
"id": 331847444,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "Al1ex\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "Al1ex",
|
||||
"id": 38161463,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
|
||||
"html_url": "https:\/\/github.com\/Al1ex"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2021-2109",
|
||||
"description": "CVE-2021-2109 && Weblogic Server RCE via JNDI",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:37:11Z",
|
||||
"updated_at": "2023-09-28T11:24:12Z",
|
||||
"pushed_at": "2021-01-22T05:52:26Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"has_discussions": false,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [
|
||||
"cve-2021-2109",
|
||||
"jndi",
|
||||
"rce",
|
||||
"weblogic"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 32,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 331873303,
|
||||
"name": "CVE-2021-2109",
|
||||
"full_name": "rabbitsafe\/CVE-2021-2109",
|
||||
"owner": {
|
||||
"login": "rabbitsafe",
|
||||
"id": 33046073,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33046073?v=4",
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rabbitsafe\/CVE-2021-2109",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T07:43:46Z",
|
||||
"updated_at": "2023-09-28T11:24:12Z",
|
||||
"pushed_at": "2021-01-22T08:34:11Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"has_discussions": false,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 10,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
{
|
||||
"id": 367086891,
|
||||
"name": "CVE-2021-2109_poc",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2023-09-28T11:26:02Z",
|
||||
"updated_at": "2023-12-11T06:17:34Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
|
|
|
@ -1,4 +1,34 @@
|
|||
[
|
||||
{
|
||||
"id": 329979678,
|
||||
"name": "RWCTF21-VirtualBox-61-escape",
|
||||
"full_name": "Sauercloud\/RWCTF21-VirtualBox-61-escape",
|
||||
"owner": {
|
||||
"login": "Sauercloud",
|
||||
"id": 41395211,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41395211?v=4",
|
||||
"html_url": "https:\/\/github.com\/Sauercloud"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Sauercloud\/RWCTF21-VirtualBox-61-escape",
|
||||
"description": "0day VirtualBox 6.1.2 Escape for RealWorld CTF 2020\/2021 CVE-2021-2119",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-15T17:32:24Z",
|
||||
"updated_at": "2023-11-27T20:59:27Z",
|
||||
"pushed_at": "2021-01-23T01:25:22Z",
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"has_discussions": false,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 23,
|
||||
"watchers": 136,
|
||||
"score": 0,
|
||||
"subscribers_count": 10
|
||||
},
|
||||
{
|
||||
"id": 471867550,
|
||||
"name": "Sauercloude",
|
||||
|
|
|
@ -851,7 +851,7 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-12-09T11:23:31Z",
|
||||
"updated_at": "2023-12-11T06:17:16Z",
|
||||
"pushed_at": "2023-12-06T15:30:56Z",
|
||||
"stargazers_count": 1171,
|
||||
"watchers_count": 1171,
|
||||
|
|
|
@ -122,14 +122,14 @@
|
|||
{
|
||||
"id": 401967623,
|
||||
"name": "CVE-2021-26084_Confluence",
|
||||
"full_name": "h3v0x\/CVE-2021-26084_Confluence",
|
||||
"full_name": "hev0x\/CVE-2021-26084_Confluence",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-26084_Confluence",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-26084_Confluence",
|
||||
"description": "Confluence Server Webwork OGNL injection",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-01T07:15:17Z",
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 353202709,
|
||||
"name": "CVE-2021-26828_ScadaBR_RCE",
|
||||
"full_name": "h3v0x\/CVE-2021-26828_ScadaBR_RCE",
|
||||
"full_name": "hev0x\/CVE-2021-26828_ScadaBR_RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-26828_ScadaBR_RCE",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-26828_ScadaBR_RCE",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-31T02:39:02Z",
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2023-11-24T20:14:38Z",
|
||||
"updated_at": "2023-12-11T06:17:35Z",
|
||||
"pushed_at": "2021-06-12T08:27:09Z",
|
||||
"stargazers_count": 819,
|
||||
"watchers_count": 819,
|
||||
|
|
|
@ -29,6 +29,36 @@
|
|||
"score": 0,
|
||||
"subscribers_count": 14
|
||||
},
|
||||
{
|
||||
"id": 331843308,
|
||||
"name": "CVE-2021-3129",
|
||||
"full_name": "SNCKER\/CVE-2021-3129",
|
||||
"owner": {
|
||||
"login": "SNCKER",
|
||||
"id": 49559334,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49559334?v=4",
|
||||
"html_url": "https:\/\/github.com\/SNCKER"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/SNCKER\/CVE-2021-3129",
|
||||
"description": "Laravel debug rce",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-22T05:12:21Z",
|
||||
"updated_at": "2023-12-11T04:51:14Z",
|
||||
"pushed_at": "2021-01-24T05:28:07Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 121,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
{
|
||||
"id": 332682252,
|
||||
"name": "laravel-CVE-2021-3129-EXP",
|
||||
|
|
|
@ -410,10 +410,10 @@
|
|||
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T03:22:04Z",
|
||||
"updated_at": "2023-11-24T20:11:10Z",
|
||||
"updated_at": "2023-12-11T04:51:14Z",
|
||||
"pushed_at": "2022-04-14T11:51:18Z",
|
||||
"stargazers_count": 429,
|
||||
"watchers_count": 429,
|
||||
"stargazers_count": 430,
|
||||
"watchers_count": 430,
|
||||
"has_discussions": false,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
|
@ -422,7 +422,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 115,
|
||||
"watchers": 429,
|
||||
"watchers": 430,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -470,7 +470,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-01-30T20:39:58Z",
|
||||
"updated_at": "2023-12-08T11:55:57Z",
|
||||
"updated_at": "2023-12-11T06:17:33Z",
|
||||
"pushed_at": "2021-02-02T17:07:09Z",
|
||||
"stargazers_count": 902,
|
||||
"watchers_count": 902,
|
||||
|
@ -1074,7 +1074,7 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2023-12-03T16:42:44Z",
|
||||
"updated_at": "2023-12-11T06:17:11Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 681,
|
||||
"watchers_count": 681,
|
||||
|
|
|
@ -2,14 +2,14 @@
|
|||
{
|
||||
"id": 391818469,
|
||||
"name": "CVE-2021-31630-OpenPLC_RCE",
|
||||
"full_name": "h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"owner": {
|
||||
"login": "h3v0x",
|
||||
"login": "hev0x",
|
||||
"id": 6265911,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
||||
"html_url": "https:\/\/github.com\/h3v0x"
|
||||
"html_url": "https:\/\/github.com\/hev0x"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/h3v0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
|
||||
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T04:48:24Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "nuclei scanner for proxyshell ( CVE-2021-34473 )",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-10T15:01:02Z",
|
||||
"updated_at": "2023-12-08T12:43:28Z",
|
||||
"updated_at": "2023-12-11T06:08:58Z",
|
||||
"pushed_at": "2022-10-09T20:34:21Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-13T06:15:21Z",
|
||||
"updated_at": "2023-08-09T18:45:59Z",
|
||||
"updated_at": "2023-12-11T06:17:36Z",
|
||||
"pushed_at": "2021-07-13T06:16:11Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Ubuntu OverlayFS Local Privesc",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-19T20:07:01Z",
|
||||
"updated_at": "2023-12-09T09:44:48Z",
|
||||
"updated_at": "2023-12-11T06:17:34Z",
|
||||
"pushed_at": "2021-09-28T04:08:43Z",
|
||||
"stargazers_count": 381,
|
||||
"watchers_count": 381,
|
||||
"stargazers_count": 380,
|
||||
"watchers_count": 380,
|
||||
"has_discussions": false,
|
||||
"forks_count": 129,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 129,
|
||||
"watchers": 381,
|
||||
"watchers": 380,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Cobalt Strike < 4.4 dos CVE-2021-36798 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-19T11:26:51Z",
|
||||
"updated_at": "2023-09-28T11:30:41Z",
|
||||
"updated_at": "2023-12-11T06:17:37Z",
|
||||
"pushed_at": "2021-08-19T11:46:12Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
|
|
|
@ -79,7 +79,7 @@
|
|||
"description": "CVE-2021-4034 1day",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-25T23:51:37Z",
|
||||
"updated_at": "2023-12-09T03:45:11Z",
|
||||
"updated_at": "2023-12-11T06:17:11Z",
|
||||
"pushed_at": "2022-06-08T04:00:28Z",
|
||||
"stargazers_count": 1869,
|
||||
"watchers_count": 1869,
|
||||
|
@ -169,7 +169,7 @@
|
|||
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T00:56:36Z",
|
||||
"updated_at": "2023-12-05T02:41:43Z",
|
||||
"updated_at": "2023-12-11T06:17:21Z",
|
||||
"pushed_at": "2023-05-04T19:24:39Z",
|
||||
"stargazers_count": 997,
|
||||
"watchers_count": 997,
|
||||
|
@ -360,7 +360,7 @@
|
|||
"description": "Exploit for CVE-2021-4034",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T03:33:47Z",
|
||||
"updated_at": "2023-11-24T20:21:56Z",
|
||||
"updated_at": "2023-12-11T06:17:21Z",
|
||||
"pushed_at": "2022-01-27T11:57:05Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
|
@ -938,7 +938,7 @@
|
|||
"description": "Self-contained exploit for CVE-2021-4034 - Pkexec Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T14:26:10Z",
|
||||
"updated_at": "2023-12-10T07:12:32Z",
|
||||
"updated_at": "2023-12-11T06:16:28Z",
|
||||
"pushed_at": "2022-06-21T14:52:05Z",
|
||||
"stargazers_count": 914,
|
||||
"watchers_count": 914,
|
||||
|
@ -1335,10 +1335,10 @@
|
|||
"description": "Proof of Concept (PoC) CVE-2021-4034 ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-26T18:01:26Z",
|
||||
"updated_at": "2023-11-15T18:41:20Z",
|
||||
"updated_at": "2023-12-11T00:54:59Z",
|
||||
"pushed_at": "2022-02-07T15:42:00Z",
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"has_discussions": false,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
|
@ -1363,7 +1363,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 80,
|
||||
"watchers": 81,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -2256,10 +2256,10 @@
|
|||
"description": "Exploit for Local Privilege Escalation Vulnerability in polkit’s pkexec ",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T07:21:40Z",
|
||||
"updated_at": "2022-01-28T07:23:24Z",
|
||||
"updated_at": "2023-12-11T05:33:58Z",
|
||||
"pushed_at": "2022-01-28T08:12:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -2268,7 +2268,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
|
|
@ -223,7 +223,7 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2023-12-08T12:43:31Z",
|
||||
"updated_at": "2023-12-11T06:17:38Z",
|
||||
"pushed_at": "2021-12-25T18:31:02Z",
|
||||
"stargazers_count": 1493,
|
||||
"watchers_count": 1493,
|
||||
|
@ -523,7 +523,7 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2023-12-08T12:43:32Z",
|
||||
"updated_at": "2023-12-11T06:17:27Z",
|
||||
"pushed_at": "2023-10-11T18:44:51Z",
|
||||
"stargazers_count": 765,
|
||||
"watchers_count": 765,
|
||||
|
|
|
@ -112,12 +112,12 @@
|
|||
"description": "Unrestricted upload of file with dangerous type in Aviatrix allows an authenticated user to execute arbitrary code",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T05:35:40Z",
|
||||
"updated_at": "2023-11-04T15:04:22Z",
|
||||
"updated_at": "2023-12-11T05:31:49Z",
|
||||
"pushed_at": "2022-04-15T06:06:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"has_discussions": false,
|
||||
"forks_count": 1,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -125,8 +125,8 @@
|
|||
"cve-2021-40870"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"forks": 2,
|
||||
"watchers": 2,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
}
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Apache 2.4.50 Path traversal vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-08T05:44:54Z",
|
||||
"updated_at": "2023-09-28T11:32:10Z",
|
||||
"updated_at": "2023-12-11T06:17:20Z",
|
||||
"pushed_at": "2022-08-30T11:59:18Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2023-12-10T18:15:31Z",
|
||||
"updated_at": "2023-12-11T06:17:39Z",
|
||||
"pushed_at": "2022-07-10T22:23:13Z",
|
||||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2021-43297 POC,Apache Dubbo<= 2.7.13时可以实现RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-17T12:26:18Z",
|
||||
"updated_at": "2023-11-03T06:06:13Z",
|
||||
"updated_at": "2023-12-11T06:17:39Z",
|
||||
"pushed_at": "2022-01-24T11:24:56Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
|
|
|
@ -201,7 +201,7 @@
|
|||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T15:11:34Z",
|
||||
"updated_at": "2023-11-24T20:20:45Z",
|
||||
"updated_at": "2023-12-11T06:17:20Z",
|
||||
"pushed_at": "2023-11-07T02:48:51Z",
|
||||
"stargazers_count": 225,
|
||||
"watchers_count": 225,
|
||||
|
|
|
@ -103,10 +103,10 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2023-11-29T06:51:15Z",
|
||||
"updated_at": "2023-12-11T06:17:20Z",
|
||||
"pushed_at": "2022-01-18T12:01:52Z",
|
||||
"stargazers_count": 449,
|
||||
"watchers_count": 449,
|
||||
"stargazers_count": 448,
|
||||
"watchers_count": 448,
|
||||
"has_discussions": false,
|
||||
"forks_count": 126,
|
||||
"allow_forking": true,
|
||||
|
@ -115,7 +115,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 126,
|
||||
"watchers": 449,
|
||||
"watchers": 448,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
@ -857,7 +857,7 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2023-12-08T12:43:41Z",
|
||||
"updated_at": "2023-12-11T06:17:13Z",
|
||||
"pushed_at": "2022-01-15T16:18:44Z",
|
||||
"stargazers_count": 919,
|
||||
"watchers_count": 919,
|
||||
|
@ -907,7 +907,7 @@
|
|||
"description": "A Proof-Of-Concept for the CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2023-12-07T13:33:10Z",
|
||||
"updated_at": "2023-12-11T06:17:28Z",
|
||||
"pushed_at": "2023-11-08T21:02:16Z",
|
||||
"stargazers_count": 1670,
|
||||
"watchers_count": 1670,
|
||||
|
@ -1268,7 +1268,7 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2023-12-05T14:09:48Z",
|
||||
"updated_at": "2023-12-11T06:17:20Z",
|
||||
"pushed_at": "2023-06-13T09:17:54Z",
|
||||
"stargazers_count": 748,
|
||||
"watchers_count": 748,
|
||||
|
@ -3703,10 +3703,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2023-12-10T23:19:38Z",
|
||||
"updated_at": "2023-12-11T06:17:20Z",
|
||||
"pushed_at": "2022-11-23T18:23:24Z",
|
||||
"stargazers_count": 3319,
|
||||
"watchers_count": 3319,
|
||||
"stargazers_count": 3320,
|
||||
"watchers_count": 3320,
|
||||
"has_discussions": true,
|
||||
"forks_count": 750,
|
||||
"allow_forking": true,
|
||||
|
@ -3715,7 +3715,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 750,
|
||||
"watchers": 3319,
|
||||
"watchers": 3320,
|
||||
"score": 0,
|
||||
"subscribers_count": 58
|
||||
},
|
||||
|
@ -4684,10 +4684,10 @@
|
|||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T16:39:16Z",
|
||||
"updated_at": "2023-11-02T03:20:22Z",
|
||||
"updated_at": "2023-12-11T04:51:15Z",
|
||||
"pushed_at": "2022-01-07T17:00:38Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"has_discussions": false,
|
||||
"forks_count": 12,
|
||||
"allow_forking": true,
|
||||
|
@ -4704,7 +4704,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 35,
|
||||
"watchers": 36,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -10215,10 +10215,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2023-12-04T02:34:57Z",
|
||||
"updated_at": "2023-12-11T03:45:17Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"stargazers_count": 194,
|
||||
"watchers_count": 194,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -10232,7 +10232,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 193,
|
||||
"watchers": 194,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -260,7 +260,7 @@
|
|||
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:07:41Z",
|
||||
"updated_at": "2023-09-28T11:34:17Z",
|
||||
"updated_at": "2023-12-11T06:17:18Z",
|
||||
"pushed_at": "2021-12-22T06:24:42Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof of concept for CVE-2022-0778, which triggers an infinite loop in parsing X.509 certificates due to a bug in BN_mod_sqrt",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-15T19:06:33Z",
|
||||
"updated_at": "2023-11-20T15:00:24Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-04-03T15:07:31Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Webmin <=1.984, CVE-2022-0824 Post-Auth Reverse Shell PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-06T00:03:31Z",
|
||||
"updated_at": "2023-11-24T20:23:01Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-03-06T07:01:15Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
|
|
|
@ -133,7 +133,7 @@
|
|||
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T18:55:20Z",
|
||||
"updated_at": "2023-12-08T15:09:20Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-03-08T06:20:05Z",
|
||||
"stargazers_count": 1060,
|
||||
"watchers_count": 1060,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0995 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-26T21:46:09Z",
|
||||
"updated_at": "2023-11-04T06:56:49Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-03-27T09:07:01Z",
|
||||
"stargazers_count": 491,
|
||||
"watchers_count": 491,
|
||||
"stargazers_count": 490,
|
||||
"watchers_count": 490,
|
||||
"has_discussions": false,
|
||||
"forks_count": 70,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 70,
|
||||
"watchers": 491,
|
||||
"watchers": 490,
|
||||
"score": 0,
|
||||
"subscribers_count": 8
|
||||
},
|
||||
|
|
|
@ -290,7 +290,7 @@
|
|||
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T10:22:31Z",
|
||||
"updated_at": "2023-11-28T06:06:39Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-06-28T18:14:40Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-08-20T03:01:30Z",
|
||||
"updated_at": "2023-12-01T21:48:01Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2023-02-20T23:29:21Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
|
|
|
@ -32,6 +32,6 @@
|
|||
"forks": 5,
|
||||
"watchers": 8,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
"subscribers_count": 3
|
||||
}
|
||||
]
|
|
@ -73,7 +73,7 @@
|
|||
"description": "Wordpress 5.8.2 CVE-2022-21661 Vuln enviroment POC exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-28T10:46:48Z",
|
||||
"updated_at": "2023-12-08T11:56:12Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-05-28T10:50:30Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "wo ee cve-2022-2185 gitlab authenticated rce",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-29T11:14:03Z",
|
||||
"updated_at": "2023-10-31T19:51:08Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-29T11:28:59Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
|
|
|
@ -220,7 +220,7 @@
|
|||
"description": "A REAL DoS exploit for CVE-2022-21907",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-04T10:53:28Z",
|
||||
"updated_at": "2023-11-24T20:24:10Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"pushed_at": "2022-04-13T05:48:04Z",
|
||||
"stargazers_count": 127,
|
||||
"watchers_count": 127,
|
||||
|
@ -508,10 +508,10 @@
|
|||
"description": "Vulnerability in HTTP Protocol Stack Enabling Remote Code Execution and Potential System Crash.",
|
||||
"fork": false,
|
||||
"created_at": "2023-12-09T22:26:49Z",
|
||||
"updated_at": "2023-12-10T15:48:49Z",
|
||||
"updated_at": "2023-12-11T02:39:57Z",
|
||||
"pushed_at": "2023-12-10T21:50:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
|
@ -520,7 +520,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-22629 Proof of Concept",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-09T17:21:27Z",
|
||||
"updated_at": "2023-09-29T19:17:20Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-09-09T21:23:08Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-22639: Get a Root Shell on macOS Monterey",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-17T06:16:54Z",
|
||||
"updated_at": "2023-09-16T21:52:09Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-04-05T05:11:29Z",
|
||||
"stargazers_count": 121,
|
||||
"watchers_count": 121,
|
||||
"stargazers_count": 120,
|
||||
"watchers_count": 120,
|
||||
"has_discussions": false,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 121,
|
||||
"watchers": 120,
|
||||
"score": 0,
|
||||
"subscribers_count": 9
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-22947",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-02T11:58:55Z",
|
||||
"updated_at": "2023-12-07T21:36:52Z",
|
||||
"updated_at": "2023-12-11T06:16:28Z",
|
||||
"pushed_at": "2022-03-03T14:03:30Z",
|
||||
"stargazers_count": 216,
|
||||
"watchers_count": 216,
|
||||
|
@ -1284,7 +1284,7 @@
|
|||
"description": "CVE-2022-22947 注入Godzilla内存马",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-26T05:48:27Z",
|
||||
"updated_at": "2023-12-06T01:46:57Z",
|
||||
"updated_at": "2023-12-11T06:17:27Z",
|
||||
"pushed_at": "2022-04-26T05:55:58Z",
|
||||
"stargazers_count": 179,
|
||||
"watchers_count": 179,
|
||||
|
|
|
@ -46,10 +46,10 @@
|
|||
"description": "POC for VMWARE CVE-2022-22954",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-11T13:59:23Z",
|
||||
"updated_at": "2023-12-08T22:06:57Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"pushed_at": "2022-04-13T06:15:11Z",
|
||||
"stargazers_count": 286,
|
||||
"watchers_count": 286,
|
||||
"stargazers_count": 285,
|
||||
"watchers_count": 285,
|
||||
"has_discussions": false,
|
||||
"forks_count": 53,
|
||||
"allow_forking": true,
|
||||
|
@ -58,7 +58,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"watchers": 286,
|
||||
"watchers": 285,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
@ -796,7 +796,7 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-12-09T11:23:31Z",
|
||||
"updated_at": "2023-12-11T06:17:16Z",
|
||||
"pushed_at": "2023-12-06T15:30:56Z",
|
||||
"stargazers_count": 1171,
|
||||
"watchers_count": 1171,
|
||||
|
|
|
@ -53,7 +53,7 @@
|
|||
"description": "CVE-2022-22963 PoC ",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T05:04:24Z",
|
||||
"updated_at": "2023-10-08T08:19:28Z",
|
||||
"updated_at": "2023-12-11T06:17:31Z",
|
||||
"pushed_at": "2022-03-30T06:01:04Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Spring4Shell Proof Of Concept\/And vulnerable application CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T07:54:45Z",
|
||||
"updated_at": "2023-12-08T12:43:52Z",
|
||||
"updated_at": "2023-12-11T05:57:46Z",
|
||||
"pushed_at": "2022-11-09T15:46:06Z",
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"has_discussions": false,
|
||||
"forks_count": 107,
|
||||
"allow_forking": true,
|
||||
|
@ -34,7 +34,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 107,
|
||||
"watchers": 339,
|
||||
"watchers": 340,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -87,7 +87,7 @@
|
|||
"description": "Spring4Shell - Spring Core RCE - CVE-2022-22965",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-30T17:05:46Z",
|
||||
"updated_at": "2023-11-24T20:24:02Z",
|
||||
"updated_at": "2023-12-11T06:17:31Z",
|
||||
"pushed_at": "2022-04-04T14:09:11Z",
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
|
@ -979,7 +979,7 @@
|
|||
"description": "Nmap Spring4Shell NSE script for Spring Boot RCE (CVE-2022-22965) ",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-03T01:27:28Z",
|
||||
"updated_at": "2023-10-03T04:03:52Z",
|
||||
"updated_at": "2023-12-11T06:17:31Z",
|
||||
"pushed_at": "2022-04-08T19:24:41Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
|
@ -1913,7 +1913,7 @@
|
|||
"description": "burpsuite 的Spring漏洞扫描插件。SpringVulScan:支持检测:路由泄露|CVE-2022-22965|CVE-2022-22963|CVE-2022-22947|CVE-2016-4977",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-19T13:16:55Z",
|
||||
"updated_at": "2023-12-08T02:47:11Z",
|
||||
"updated_at": "2023-12-11T06:17:34Z",
|
||||
"pushed_at": "2023-01-23T13:00:34Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Poc of CVE-2022-22980",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-21T11:39:13Z",
|
||||
"updated_at": "2023-05-31T03:46:48Z",
|
||||
"updated_at": "2023-12-11T06:17:23Z",
|
||||
"pushed_at": "2022-06-23T09:53:01Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
|
@ -73,7 +73,7 @@
|
|||
"description": "CVE-2022-22980环境",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-22T07:39:42Z",
|
||||
"updated_at": "2023-11-14T16:10:36Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-06-22T07:45:29Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"description": "[CVE-2022-22980] Spring Data MongoDB SpEL Expression Injection",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-28T21:42:35Z",
|
||||
"updated_at": "2023-09-28T11:40:12Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-06-28T22:27:58Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2023-12-09T11:54:38Z",
|
||||
"updated_at": "2023-12-11T06:17:23Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 550,
|
||||
"watchers_count": 550,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "SXF VPN RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-25T10:13:40Z",
|
||||
"updated_at": "2023-11-03T07:56:46Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"pushed_at": "2022-04-25T10:26:28Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-24112:Apache APISIX apisix\/batch-requests RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-02-22T14:09:49Z",
|
||||
"updated_at": "2023-09-28T11:36:21Z",
|
||||
"updated_at": "2023-12-11T06:17:22Z",
|
||||
"pushed_at": "2022-02-22T15:42:39Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
|
|
|
@ -43,7 +43,7 @@
|
|||
"description": "Unauthenticated RCE in Open Web Analytics (OWA) 1.7.3",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-30T17:31:14Z",
|
||||
"updated_at": "2023-10-19T18:36:59Z",
|
||||
"updated_at": "2023-12-11T06:17:24Z",
|
||||
"pushed_at": "2022-08-30T17:09:40Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-24734 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-08T15:20:41Z",
|
||||
"updated_at": "2023-11-03T07:52:59Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-05-08T15:23:46Z",
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"has_discussions": false,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 50,
|
||||
"watchers": 49,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-25636",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-07T13:38:41Z",
|
||||
"updated_at": "2023-11-07T14:13:18Z",
|
||||
"updated_at": "2023-12-11T06:17:40Z",
|
||||
"pushed_at": "2022-03-07T17:18:19Z",
|
||||
"stargazers_count": 426,
|
||||
"watchers_count": 426,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "exploit for CVE-2022-2588",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-11T06:01:24Z",
|
||||
"updated_at": "2023-12-08T13:05:55Z",
|
||||
"updated_at": "2023-12-11T06:17:34Z",
|
||||
"pushed_at": "2023-03-04T05:52:28Z",
|
||||
"stargazers_count": 458,
|
||||
"watchers_count": 458,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-31T07:44:01Z",
|
||||
"updated_at": "2023-12-09T14:26:37Z",
|
||||
"updated_at": "2023-12-11T06:17:19Z",
|
||||
"pushed_at": "2023-02-26T14:06:05Z",
|
||||
"stargazers_count": 1083,
|
||||
"watchers_count": 1083,
|
||||
"stargazers_count": 1084,
|
||||
"watchers_count": 1084,
|
||||
"has_discussions": true,
|
||||
"forks_count": 185,
|
||||
"allow_forking": true,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 185,
|
||||
"watchers": 1083,
|
||||
"watchers": 1084,
|
||||
"score": 0,
|
||||
"subscribers_count": 18
|
||||
},
|
||||
|
@ -608,7 +608,7 @@
|
|||
"description": "Simple Honeypot for Atlassian Confluence (CVE-2022-26134)",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-06T15:44:24Z",
|
||||
"updated_at": "2023-09-28T11:39:29Z",
|
||||
"updated_at": "2023-12-11T06:17:15Z",
|
||||
"pushed_at": "2022-06-07T08:51:53Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
|
|
|
@ -257,7 +257,7 @@
|
|||
"description": "警惕 一种针对红队的新型溯源手段!",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-27T15:48:19Z",
|
||||
"updated_at": "2023-12-01T21:47:58Z",
|
||||
"updated_at": "2023-12-11T06:17:15Z",
|
||||
"pushed_at": "2022-07-27T15:55:01Z",
|
||||
"stargazers_count": 374,
|
||||
"watchers_count": 374,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit for CVE-2022-27666",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T22:54:28Z",
|
||||
"updated_at": "2023-11-20T12:43:23Z",
|
||||
"updated_at": "2023-12-11T06:17:31Z",
|
||||
"pushed_at": "2022-03-28T18:21:00Z",
|
||||
"stargazers_count": 202,
|
||||
"watchers_count": 202,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Zimbra RCE simple poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-12T18:35:52Z",
|
||||
"updated_at": "2023-11-24T20:27:38Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-08-13T18:54:58Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
|
@ -43,7 +43,7 @@
|
|||
"description": "Zimbra Unauthenticated Remote Code Execution Exploit (CVE-2022-27925)",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-14T22:22:55Z",
|
||||
"updated_at": "2023-09-28T11:41:54Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-09-05T22:05:53Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for CVE-2022-28281 a Mozilla Firefox Out of bounds write.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-08T02:49:09Z",
|
||||
"updated_at": "2023-09-28T11:37:46Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"pushed_at": "2022-04-08T15:21:26Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"has_discussions": false,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
|
@ -32,7 +32,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 75,
|
||||
"watchers": 74,
|
||||
"score": 0,
|
||||
"subscribers_count": 3
|
||||
}
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Foxit PDF Reader Remote Code Execution Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-02T18:52:20Z",
|
||||
"updated_at": "2023-12-08T11:56:37Z",
|
||||
"updated_at": "2023-12-11T06:17:46Z",
|
||||
"pushed_at": "2023-12-05T12:22:45Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "7-Zip through 21.07 on Windows allows privilege escalation and command execution when a file with the .7z extension is dragged to the Help>Contents area.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-15T22:59:03Z",
|
||||
"updated_at": "2023-12-10T18:10:33Z",
|
||||
"updated_at": "2023-12-11T06:17:22Z",
|
||||
"pushed_at": "2022-04-22T11:26:31Z",
|
||||
"stargazers_count": 694,
|
||||
"watchers_count": 694,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2023-12-08T18:02:20Z",
|
||||
"updated_at": "2023-12-11T06:17:41Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
|
@ -232,7 +232,7 @@
|
|||
"description": "😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-24T18:25:26Z",
|
||||
"updated_at": "2023-10-30T03:58:10Z",
|
||||
"updated_at": "2023-12-11T06:17:32Z",
|
||||
"pushed_at": "2023-05-23T03:42:31Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "🍵 Gitea repository migration remote command execution exploit.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-22T05:15:58Z",
|
||||
"updated_at": "2023-12-04T09:46:26Z",
|
||||
"updated_at": "2023-12-11T06:17:42Z",
|
||||
"pushed_at": "2022-05-26T11:32:21Z",
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC ",
|
||||
"fork": false,
|
||||
"created_at": "2023-01-09T04:27:15Z",
|
||||
"updated_at": "2023-11-27T20:55:30Z",
|
||||
"updated_at": "2023-12-11T06:17:47Z",
|
||||
"pushed_at": "2023-01-09T08:19:27Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T05:11:14Z",
|
||||
"updated_at": "2023-10-17T09:37:36Z",
|
||||
"updated_at": "2023-12-11T06:17:46Z",
|
||||
"pushed_at": "2022-11-17T12:58:20Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
|
|
|
@ -57,7 +57,7 @@
|
|||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0,
|
||||
"subscribers_count": 1
|
||||
"subscribers_count": 2
|
||||
},
|
||||
{
|
||||
"id": 716574497,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Apache Shiro CVE-2022-32532",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-29T01:05:33Z",
|
||||
"updated_at": "2023-12-05T15:47:39Z",
|
||||
"updated_at": "2023-12-11T06:17:23Z",
|
||||
"pushed_at": "2022-06-28T22:46:43Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Proof-of-concept and write-up for the CVE-2022-32832 vulnerability patched in iOS 15.6",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-21T13:09:50Z",
|
||||
"updated_at": "2023-11-03T07:45:05Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-21T13:44:32Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "cve-2022-33891-poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-18T16:16:51Z",
|
||||
"updated_at": "2023-11-22T01:53:54Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-20T08:00:18Z",
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-33980 Apache Commons Configuration 远程命令执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-08T09:25:42Z",
|
||||
"updated_at": "2023-11-24T20:26:40Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-08T09:27:48Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "PoC for CVE-2022-34265 (Django)",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-07T07:45:28Z",
|
||||
"updated_at": "2023-11-11T00:53:46Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-30T07:53:43Z",
|
||||
"stargazers_count": 122,
|
||||
"watchers_count": 122,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-03T11:39:25Z",
|
||||
"updated_at": "2023-11-03T18:43:00Z",
|
||||
"updated_at": "2023-12-11T06:17:23Z",
|
||||
"pushed_at": "2022-10-10T08:57:29Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-07-19T12:46:45Z",
|
||||
"updated_at": "2023-12-08T13:05:55Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-09-06T14:05:22Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
|
@ -133,7 +133,7 @@
|
|||
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-02T09:52:02Z",
|
||||
"updated_at": "2023-12-01T21:47:59Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-09-15T03:19:28Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "H3C_SSL_VPN_XSS(Reflected XSS) CVE-2022-35416",
|
||||
"fork": false,
|
||||
"created_at": "2022-07-12T04:35:49Z",
|
||||
"updated_at": "2022-08-11T05:12:07Z",
|
||||
"updated_at": "2023-12-11T06:17:43Z",
|
||||
"pushed_at": "2022-07-12T04:38:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
|
|
|
@ -48,7 +48,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-30T23:32:56Z",
|
||||
"updated_at": "2023-11-05T21:07:08Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-11-01T19:56:40Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
|
|
|
@ -47,7 +47,7 @@
|
|||
"description": "POC of CVE-2022-36537",
|
||||
"fork": false,
|
||||
"created_at": "2022-12-09T14:15:52Z",
|
||||
"updated_at": "2023-11-18T00:33:41Z",
|
||||
"updated_at": "2023-12-11T06:17:46Z",
|
||||
"pushed_at": "2023-10-18T02:01:03Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A real exploit for BitBucket RCE CVE-2022-36804",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-07T09:35:49Z",
|
||||
"updated_at": "2023-09-28T11:42:32Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-09-07T12:09:19Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "CVE-2022-37042 Zimbra Auth Bypass leads to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-24T10:10:45Z",
|
||||
"updated_at": "2023-10-02T14:57:21Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-12-09T02:45:14Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2023-11-19T18:38:38Z",
|
||||
"updated_at": "2023-12-11T06:17:35Z",
|
||||
"pushed_at": "2022-09-19T19:41:34Z",
|
||||
"stargazers_count": 223,
|
||||
"watchers_count": 223,
|
||||
"stargazers_count": 221,
|
||||
"watchers_count": 221,
|
||||
"has_discussions": false,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 223,
|
||||
"watchers": 221,
|
||||
"score": 0,
|
||||
"subscribers_count": 5
|
||||
},
|
||||
|
|
|
@ -73,7 +73,7 @@
|
|||
"description": "cve-2022-39197 poc",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-22T14:39:02Z",
|
||||
"updated_at": "2023-09-28T11:42:55Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-09-22T15:03:24Z",
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
|
@ -103,7 +103,7 @@
|
|||
"description": "CVE-2022-39197(CobaltStrike XSS <=4.7) POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-23T08:20:07Z",
|
||||
"updated_at": "2023-09-28T11:42:56Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-09-30T06:31:11Z",
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
|
@ -227,10 +227,10 @@
|
|||
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T08:58:21Z",
|
||||
"updated_at": "2023-11-24T08:51:50Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-09-26T13:20:38Z",
|
||||
"stargazers_count": 289,
|
||||
"watchers_count": 289,
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"has_discussions": false,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
|
@ -243,7 +243,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 50,
|
||||
"watchers": 289,
|
||||
"watchers": 287,
|
||||
"score": 0,
|
||||
"subscribers_count": 4
|
||||
},
|
||||
|
@ -321,7 +321,7 @@
|
|||
"description": "CobaltStrike <= 4.7.1 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T11:46:01Z",
|
||||
"updated_at": "2023-12-04T03:09:39Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-10-25T05:32:54Z",
|
||||
"stargazers_count": 356,
|
||||
"watchers_count": 356,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "POC for CVE-2022-39952",
|
||||
"fork": false,
|
||||
"created_at": "2023-02-20T15:12:33Z",
|
||||
"updated_at": "2023-12-08T12:44:16Z",
|
||||
"updated_at": "2023-12-11T06:17:48Z",
|
||||
"pushed_at": "2023-02-25T08:52:03Z",
|
||||
"stargazers_count": 266,
|
||||
"watchers_count": 266,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "Apache Airflow < 2.4.0 DAG example_bash_operator RCE POC",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-18T13:19:23Z",
|
||||
"updated_at": "2023-08-07T03:24:28Z",
|
||||
"updated_at": "2023-12-11T06:17:22Z",
|
||||
"pushed_at": "2022-11-19T10:35:50Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "nps认证绕过利用工具,CVE-2022-40494,使用此工具可在浏览器访问web控制端后台页面,或者批量获取socks5和http代理",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-04T08:22:41Z",
|
||||
"updated_at": "2023-11-20T10:51:53Z",
|
||||
"updated_at": "2023-12-11T06:17:15Z",
|
||||
"pushed_at": "2022-08-19T09:04:09Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A proof of concept exploit for CVE-2022-40684 affecting Fortinet FortiOS, FortiProxy, and FortiSwitchManager",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-13T14:24:12Z",
|
||||
"updated_at": "2023-11-24T20:29:10Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-10-13T15:25:00Z",
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
|
@ -599,7 +599,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-10-28T03:46:00Z",
|
||||
"updated_at": "2023-07-18T11:15:59Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-10-28T04:07:23Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -235,7 +235,7 @@
|
|||
"description": "the metasploit script(POC) about CVE-2022-41040. Microsoft Exchange are vulnerable to a server-side request forgery (SSRF) attack. An authenticated attacker can use the vulnerability to elevate privileges.",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-20T03:11:03Z",
|
||||
"updated_at": "2023-09-28T11:43:31Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-10-20T06:36:42Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
|
|
|
@ -43,10 +43,10 @@
|
|||
"description": "Zimbra <9.0.0.p27 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-11T20:58:08Z",
|
||||
"updated_at": "2023-11-29T02:17:34Z",
|
||||
"updated_at": "2023-12-11T06:17:46Z",
|
||||
"pushed_at": "2022-11-24T14:59:35Z",
|
||||
"stargazers_count": 101,
|
||||
"watchers_count": 101,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"has_discussions": false,
|
||||
"forks_count": 26,
|
||||
"allow_forking": true,
|
||||
|
@ -62,7 +62,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 101,
|
||||
"watchers": 100,
|
||||
"score": 0,
|
||||
"subscribers_count": 2
|
||||
},
|
||||
|
@ -124,6 +124,6 @@
|
|||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0,
|
||||
"subscribers_count": 0
|
||||
"subscribers_count": 1
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-41852 Proof of Concept (unofficial)",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-14T12:09:19Z",
|
||||
"updated_at": "2023-11-08T22:07:24Z",
|
||||
"updated_at": "2023-12-11T06:17:45Z",
|
||||
"pushed_at": "2022-10-20T08:01:38Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "CVE-2022-42046 Proof of Concept of wfshbr64.sys local privilege escalation via DKOM",
|
||||
"fork": false,
|
||||
"created_at": "2022-08-17T16:45:13Z",
|
||||
"updated_at": "2023-12-01T21:48:01Z",
|
||||
"updated_at": "2023-12-11T06:17:44Z",
|
||||
"pushed_at": "2022-12-24T10:29:08Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Add table
Reference in a new issue