mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2020/12/17 06:10:04
This commit is contained in:
parent
fb1e78cc70
commit
3696202590
18 changed files with 77 additions and 77 deletions
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-10-04T19:03:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-09T22:16:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -450,13 +450,13 @@
|
|||
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-20T05:28:04Z",
|
||||
"updated_at": "2020-12-08T17:06:43Z",
|
||||
"updated_at": "2020-12-16T15:10:03Z",
|
||||
"pushed_at": "2017-01-27T10:04:07Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"stargazers_count": 252,
|
||||
"watchers_count": 252,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"watchers": 251,
|
||||
"watchers": 252,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2017-10-09T15:20:11Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 68,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2017-06-05T16:25:57Z",
|
||||
"updated_at": "2020-11-21T17:14:36Z",
|
||||
"updated_at": "2020-12-16T19:53:37Z",
|
||||
"pushed_at": "2017-11-27T16:28:14Z",
|
||||
"stargazers_count": 213,
|
||||
"watchers_count": 213,
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 213,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2018-10-21T21:24:29Z",
|
||||
"stargazers_count": 95,
|
||||
"watchers_count": 95,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"watchers": 95,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -174,13 +174,13 @@
|
|||
"description": "This module massively scan and exploit a path traversal vulnerability in the FortiOS SSL VPN web portal may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests (CVE-2018-13379).",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-30T08:39:05Z",
|
||||
"updated_at": "2020-12-16T04:56:38Z",
|
||||
"pushed_at": "2020-12-16T04:56:36Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"updated_at": "2020-12-16T20:27:01Z",
|
||||
"pushed_at": "2020-12-16T15:46:19Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": " POC for CVE-2018-4327",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-11T19:15:09Z",
|
||||
"updated_at": "2020-08-09T21:12:33Z",
|
||||
"updated_at": "2020-12-16T15:32:46Z",
|
||||
"pushed_at": "2018-09-13T15:59:05Z",
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 39,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-12-15T03:04:51Z",
|
||||
"updated_at": "2020-12-16T20:05:59Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 78,
|
||||
"forks": 78,
|
||||
"watchers": 338,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2018-10-30T01:48:42Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-16T06:52:45Z",
|
||||
"updated_at": "2020-12-16T15:41:21Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2168,
|
||||
"watchers_count": 2168,
|
||||
"forks_count": 607,
|
||||
"forks": 607,
|
||||
"watchers": 2168,
|
||||
"stargazers_count": 2169,
|
||||
"watchers_count": 2169,
|
||||
"forks_count": 608,
|
||||
"forks": 608,
|
||||
"watchers": 2169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Temproot for Bravia TV via CVE-2019-2215.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-30T06:06:32Z",
|
||||
"updated_at": "2020-11-25T11:29:22Z",
|
||||
"updated_at": "2020-12-16T17:24:46Z",
|
||||
"pushed_at": "2020-02-20T02:41:44Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,8 +59,8 @@
|
|||
"description": "CVE-2019-5475 靶场",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-16T14:03:16Z",
|
||||
"updated_at": "2020-12-16T14:41:16Z",
|
||||
"pushed_at": "2020-12-16T14:41:14Z",
|
||||
"updated_at": "2020-12-16T16:16:48Z",
|
||||
"pushed_at": "2020-12-16T16:16:46Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2020-12-16T13:01:41Z",
|
||||
"updated_at": "2020-12-16T19:59:16Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1210,
|
||||
"watchers_count": 1210,
|
||||
"stargazers_count": 1209,
|
||||
"watchers_count": 1209,
|
||||
"forks_count": 276,
|
||||
"forks": 276,
|
||||
"watchers": 1210,
|
||||
"watchers": 1209,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2020-12-16T07:51:15Z",
|
||||
"updated_at": "2020-12-16T15:35:38Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"forks_count": 88,
|
||||
"forks": 88,
|
||||
"watchers": 245,
|
||||
"watchers": 246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-12-16T06:52:45Z",
|
||||
"updated_at": "2020-12-16T15:41:21Z",
|
||||
"pushed_at": "2020-11-07T05:55:00Z",
|
||||
"stargazers_count": 2168,
|
||||
"watchers_count": 2168,
|
||||
"forks_count": 607,
|
||||
"forks": 607,
|
||||
"watchers": 2168,
|
||||
"stargazers_count": 2169,
|
||||
"watchers_count": 2169,
|
||||
"forks_count": 608,
|
||||
"forks": 608,
|
||||
"watchers": 2169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883, S2-061, CVE-2020-13942, CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-10-09T06:34:36Z",
|
||||
"updated_at": "2020-12-16T14:31:51Z",
|
||||
"updated_at": "2020-12-16T18:19:25Z",
|
||||
"pushed_at": "2020-12-15T02:33:45Z",
|
||||
"stargazers_count": 450,
|
||||
"watchers_count": 450,
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"forks_count": 83,
|
||||
"forks": 83,
|
||||
"watchers": 450,
|
||||
"watchers": 451,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Collect S2-061 payloads",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-10T17:42:37Z",
|
||||
"updated_at": "2020-12-16T09:33:56Z",
|
||||
"updated_at": "2020-12-16T19:20:19Z",
|
||||
"pushed_at": "2020-12-15T16:43:15Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 21,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "S2-061 CVE-2020-17530",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-13T11:02:15Z",
|
||||
"updated_at": "2020-12-16T14:43:56Z",
|
||||
"updated_at": "2020-12-16T15:41:19Z",
|
||||
"pushed_at": "2020-12-13T11:04:43Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 14,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-17530-strust2-061",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-14T06:54:57Z",
|
||||
"updated_at": "2020-12-16T11:50:01Z",
|
||||
"updated_at": "2020-12-16T19:20:26Z",
|
||||
"pushed_at": "2020-12-14T06:57:07Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-08-12T08:27:10Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 25,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -10,10 +10,10 @@
|
|||
"html_url": "https:\/\/github.com\/rancher"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/rancher\/externalip-webhook",
|
||||
"description": "[EMBARGO] CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
|
||||
"description": "CVE-2020-8554: Man in the middle using LoadBalancer or ExternalIPs",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-01T16:58:39Z",
|
||||
"updated_at": "2020-12-11T22:44:12Z",
|
||||
"updated_at": "2020-12-16T20:56:39Z",
|
||||
"pushed_at": "2020-12-11T22:45:45Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
Loading…
Reference in a new issue