Auto Update 2019/12/31 06:30:02

This commit is contained in:
motikan2010-bot 2019-12-31 06:30:02 +09:00
parent 5d40f0f283
commit 35e6b3cdd7
21 changed files with 84 additions and 84 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-11-28T09:55:46Z",
"stargazers_count": 143,
"watchers_count": 143,
"forks_count": 79,
"forks": 79,
"forks_count": 80,
"forks": 80,
"watchers": 143,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "Exploit code for CVE-2016-9066",
"fork": false,
"created_at": "2017-03-10T20:08:13Z",
"updated_at": "2019-12-21T07:49:23Z",
"updated_at": "2019-12-30T17:07:31Z",
"pushed_at": "2017-03-19T17:37:18Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 10,
"forks": 10,
"watchers": 37,
"watchers": 38,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-04-17T08:10:07Z",
"updated_at": "2019-12-20T12:23:00Z",
"updated_at": "2019-12-30T17:07:33Z",
"pushed_at": "2017-11-19T11:01:16Z",
"stargazers_count": 601,
"watchers_count": 601,
"stargazers_count": 602,
"watchers_count": 602,
"forks_count": 274,
"forks": 274,
"watchers": 601,
"watchers": 602,
"score": 0
},
{

View file

@ -385,8 +385,8 @@
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 149,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "CVE-2017-11882 Exploit accepts over 17k bytes long command\/code in maximum.",
"fork": false,
"created_at": "2017-11-21T15:22:41Z",
"updated_at": "2019-12-20T12:23:10Z",
"updated_at": "2019-12-30T17:07:42Z",
"pushed_at": "2017-12-06T12:47:31Z",
"stargazers_count": 255,
"watchers_count": 255,
"stargazers_count": 256,
"watchers_count": 256,
"forks_count": 73,
"forks": 73,
"watchers": 255,
"watchers": 256,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Chrome < 62 uxss exploit (CVE-2017-5124)",
"fork": false,
"created_at": "2017-11-13T21:33:55Z",
"updated_at": "2019-12-20T12:23:09Z",
"updated_at": "2019-12-30T17:07:41Z",
"pushed_at": "2017-11-14T10:26:28Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 35,
"forks": 35,
"watchers": 155,
"watchers": 156,
"score": 0
}
]

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2019-12-20T12:23:02Z",
"updated_at": "2019-12-30T17:07:34Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 183,
"watchers_count": 183,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 64,
"forks": 64,
"watchers": 183,
"watchers": 184,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Proof of Concept exploit for CVE-2017-8570",
"fork": false,
"created_at": "2018-01-09T19:09:33Z",
"updated_at": "2019-12-23T05:58:17Z",
"updated_at": "2019-12-30T17:07:44Z",
"pushed_at": "2018-01-09T19:23:43Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 101,
"forks": 101,
"watchers": 165,
"watchers": 166,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Running CVE-2017-8759 exploit sample.",
"fork": false,
"created_at": "2017-09-13T09:50:04Z",
"updated_at": "2019-12-20T12:23:06Z",
"updated_at": "2019-12-30T17:07:39Z",
"pushed_at": "2017-09-13T09:58:25Z",
"stargazers_count": 256,
"watchers_count": 256,
"stargazers_count": 257,
"watchers_count": 257,
"forks_count": 108,
"forks": 108,
"watchers": 256,
"watchers": 257,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2019-12-20T12:23:07Z",
"updated_at": "2019-12-30T17:07:39Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 298,
"watchers_count": 298,
"stargazers_count": 299,
"watchers_count": 299,
"forks_count": 124,
"forks": 124,
"watchers": 298,
"watchers": 299,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2019-12-20T12:23:29Z",
"updated_at": "2019-12-30T17:08:01Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 21,
"forks": 21,
"watchers": 189,
"watchers": 190,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "A WebKit exploit using CVE-2018-4441 to obtain RCE on PS4 6.20.",
"fork": false,
"created_at": "2019-03-08T18:06:10Z",
"updated_at": "2019-12-19T20:41:29Z",
"updated_at": "2019-12-30T17:14:46Z",
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 49,
"forks": 49,
"watchers": 178,
"watchers": 179,
"score": 0
}
]

View file

@ -1393,13 +1393,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2019-12-30T14:46:39Z",
"updated_at": "2019-12-30T17:08:09Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 679,
"watchers_count": 679,
"stargazers_count": 680,
"watchers_count": 680,
"forks_count": 157,
"forks": 157,
"watchers": 679,
"watchers": 680,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Win32k Elevation of Privilege Poc",
"fork": false,
"created_at": "2019-05-17T11:05:22Z",
"updated_at": "2019-12-30T06:46:53Z",
"updated_at": "2019-12-30T16:51:54Z",
"pushed_at": "2019-05-17T10:53:29Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 59,
"forks": 59,
"watchers": 64,
"watchers": 65,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": " double-free bug in WhatsApp exploit poc",
"fork": false,
"created_at": "2019-10-03T09:26:24Z",
"updated_at": "2019-12-30T09:44:07Z",
"updated_at": "2019-12-30T17:08:15Z",
"pushed_at": "2019-10-03T09:43:55Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 70,
"forks": 70,
"watchers": 226,
"watchers": 227,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "sploit",
"fork": false,
"created_at": "2019-12-21T00:44:25Z",
"updated_at": "2019-12-29T14:57:31Z",
"updated_at": "2019-12-30T19:18:32Z",
"pushed_at": "2019-12-21T00:56:27Z",
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 12,
"forks": 12,
"watchers": 55,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 13,
"forks": 13,
"watchers": 56,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-01T16:02:59Z",
"stargazers_count": 203,
"watchers_count": 203,
"forks_count": 70,
"forks": 70,
"forks_count": 69,
"forks": 69,
"watchers": 203,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2019-12-28T03:25:52Z",
"updated_at": "2019-12-30T16:51:55Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 216,
"watchers_count": 216,
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 49,
"forks": 49,
"watchers": 216,
"watchers": 217,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2019-12-20T12:23:44Z",
"updated_at": "2019-12-30T17:08:15Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 17,
"forks": 17,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -86,8 +86,8 @@
"pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 97,
"forks": 97,
"forks_count": 98,
"forks": 98,
"watchers": 468,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 149,
"score": 0
},
@ -312,13 +312,13 @@
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
"fork": false,
"created_at": "2019-06-24T08:33:07Z",
"updated_at": "2019-12-23T08:35:33Z",
"updated_at": "2019-12-30T15:51:17Z",
"pushed_at": "2019-07-15T06:03:15Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 14,
"forks": 14,
"watchers": 33,
"watchers": 34,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "RCE on Kibana versions before 5.6.15 and 6.6.0 in the Timelion visualizer",
"fork": false,
"created_at": "2019-10-21T07:32:31Z",
"updated_at": "2019-12-29T20:22:38Z",
"updated_at": "2019-12-30T16:51:39Z",
"pushed_at": "2019-12-20T14:28:44Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0
},
{