Auto Update 2020/09/18 00:08:49

This commit is contained in:
motikan2010-bot 2020-09-18 00:08:49 +09:00
parent eae565c647
commit 3b1555e7c7
20 changed files with 104 additions and 104 deletions

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-09-02T16:21:12Z", "pushed_at": "2020-09-02T16:21:12Z",
"stargazers_count": 690, "stargazers_count": 690,
"watchers_count": 690, "watchers_count": 690,
"forks_count": 170, "forks_count": 171,
"forks": 170, "forks": 171,
"watchers": 690, "watchers": 690,
"score": 0 "score": 0
}, },

View file

@ -178,8 +178,8 @@
"pushed_at": "2020-01-20T06:37:56Z", "pushed_at": "2020-01-20T06:37:56Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 3, "watchers": 3,
"score": 0 "score": 0
}, },

View file

@ -36,13 +36,13 @@
"description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.", "description": "Meltdown Exploit \/ Proof-of-concept \/ checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.",
"fork": false, "fork": false,
"created_at": "2018-01-04T23:51:12Z", "created_at": "2018-01-04T23:51:12Z",
"updated_at": "2020-09-09T15:08:55Z", "updated_at": "2020-09-17T13:47:11Z",
"pushed_at": "2018-02-27T05:22:38Z", "pushed_at": "2018-02-27T05:22:38Z",
"stargazers_count": 549, "stargazers_count": 550,
"watchers_count": 549, "watchers_count": 550,
"forks_count": 73, "forks_count": 73,
"forks": 73, "forks": 73,
"watchers": 549, "watchers": 550,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,13 +13,13 @@
"description": "Hikvision camera CVE-2017-7921-EXP", "description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false, "fork": false,
"created_at": "2020-04-27T11:49:40Z", "created_at": "2020-04-27T11:49:40Z",
"updated_at": "2020-08-23T15:47:50Z", "updated_at": "2020-09-17T14:10:57Z",
"pushed_at": "2020-08-09T15:35:16Z", "pushed_at": "2020-08-09T15:35:16Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"forks_count": 4, "forks_count": 5,
"forks": 4, "forks": 5,
"watchers": 18, "watchers": 19,
"score": 0 "score": 0
} }
] ]

View file

@ -105,13 +105,13 @@
"description": "Spring Data Commons RCE 远程命令执行漏洞", "description": "Spring Data Commons RCE 远程命令执行漏洞",
"fork": false, "fork": false,
"created_at": "2019-04-29T03:43:15Z", "created_at": "2019-04-29T03:43:15Z",
"updated_at": "2020-09-12T07:27:07Z", "updated_at": "2020-09-17T09:32:43Z",
"pushed_at": "2019-04-29T04:25:35Z", "pushed_at": "2019-04-29T04:25:35Z",
"stargazers_count": 49, "stargazers_count": 50,
"watchers_count": 49, "watchers_count": 50,
"forks_count": 13, "forks_count": 13,
"forks": 13, "forks": 13,
"watchers": 49, "watchers": 50,
"score": 0 "score": 0
} }
] ]

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)", "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false, "fork": false,
"created_at": "2018-06-24T05:34:05Z", "created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-09-15T17:19:55Z", "updated_at": "2020-09-17T15:07:28Z",
"pushed_at": "2020-03-08T00:08:20Z", "pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 381, "stargazers_count": 382,
"watchers_count": 381, "watchers_count": 382,
"forks_count": 343, "forks_count": 343,
"forks": 343, "forks": 343,
"watchers": 381, "watchers": 382,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-17T23:31:46Z", "pushed_at": "2018-08-17T23:31:46Z",
"stargazers_count": 152, "stargazers_count": 152,
"watchers_count": 152, "watchers_count": 152,
"forks_count": 31, "forks_count": 30,
"forks": 31, "forks": 30,
"watchers": 152, "watchers": 152,
"score": 0 "score": 0
} }

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false, "fork": false,
"created_at": "2019-12-21T22:45:55Z", "created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-09-17T03:08:53Z", "updated_at": "2020-09-17T09:46:27Z",
"pushed_at": "2020-01-05T21:46:25Z", "pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 304, "stargazers_count": 305,
"watchers_count": 304, "watchers_count": 305,
"forks_count": 70, "forks_count": 70,
"forks": 70, "forks": 70,
"watchers": 304, "watchers": 305,
"score": 0 "score": 0
} }
] ]

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false, "fork": false,
"created_at": "2019-05-15T15:01:38Z", "created_at": "2019-05-15T15:01:38Z",
"updated_at": "2020-09-14T10:13:32Z", "updated_at": "2020-09-17T14:57:40Z",
"pushed_at": "2019-06-13T13:07:03Z", "pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 309, "stargazers_count": 314,
"watchers_count": 309, "watchers_count": 314,
"forks_count": 179, "forks_count": 179,
"forks": 179, "forks": 179,
"watchers": 309, "watchers": 314,
"score": 0 "score": 0
}, },
{ {
@ -1305,8 +1305,8 @@
"pushed_at": "2019-06-22T21:48:45Z", "pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 762, "stargazers_count": 762,
"watchers_count": 762, "watchers_count": 762,
"forks_count": 185, "forks_count": 186,
"forks": 185, "forks": 186,
"watchers": 762, "watchers": 762,
"score": 0 "score": 0
}, },
@ -1577,13 +1577,13 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits", "description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false, "fork": false,
"created_at": "2019-05-31T00:04:12Z", "created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-09-04T10:29:17Z", "updated_at": "2020-09-17T14:56:41Z",
"pushed_at": "2020-05-09T09:49:14Z", "pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 334, "stargazers_count": 335,
"watchers_count": 334, "watchers_count": 335,
"forks_count": 116, "forks_count": 116,
"forks": 116, "forks": 116,
"watchers": 334, "watchers": 335,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,8 +13,8 @@
"description": "CVE-2019-12836", "description": "CVE-2019-12836",
"fork": false, "fork": false,
"created_at": "2019-06-16T04:41:29Z", "created_at": "2019-06-16T04:41:29Z",
"updated_at": "2020-03-07T09:18:50Z", "updated_at": "2020-09-17T11:44:46Z",
"pushed_at": "2020-03-07T09:18:48Z", "pushed_at": "2020-09-17T11:44:44Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-22T19:46:04Z", "pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 172, "stargazers_count": 172,
"watchers_count": 172, "watchers_count": 172,
"forks_count": 52, "forks_count": 53,
"forks": 52, "forks": 53,
"watchers": 172, "watchers": 172,
"score": 0 "score": 0
}, },

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1844, "stargazers_count": 1844,
"watchers_count": 1844, "watchers_count": 1844,
"forks_count": 476, "forks_count": 477,
"forks": 476, "forks": 477,
"watchers": 1844, "watchers": 1844,
"score": 0 "score": 0
}, },

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-10-04T22:25:03Z", "pushed_at": "2019-10-04T22:25:03Z",
"stargazers_count": 21, "stargazers_count": 21,
"watchers_count": 21, "watchers_count": 21,
"forks_count": 15, "forks_count": 16,
"forks": 15, "forks": 16,
"watchers": 21, "watchers": 21,
"score": 0 "score": 0
}, },

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688", "description": "Exploit and detect tools for CVE-2020-0688",
"fork": false, "fork": false,
"created_at": "2020-03-01T12:57:32Z", "created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-09-16T16:13:24Z", "updated_at": "2020-09-17T14:04:50Z",
"pushed_at": "2020-03-21T05:44:48Z", "pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 218, "stargazers_count": 219,
"watchers_count": 218, "watchers_count": 219,
"forks_count": 61, "forks_count": 61,
"forks": 61, "forks": 61,
"watchers": 218, "watchers": 219,
"score": 0 "score": 0
}, },
{ {

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false, "fork": false,
"created_at": "2020-03-30T11:42:56Z", "created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-09-17T06:52:55Z", "updated_at": "2020-09-17T14:55:59Z",
"pushed_at": "2020-04-08T19:27:07Z", "pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 1002, "stargazers_count": 1004,
"watchers_count": 1002, "watchers_count": 1004,
"forks_count": 327, "forks_count": 327,
"forks": 327, "forks": 327,
"watchers": 1002, "watchers": 1004,
"score": 0 "score": 0
}, },
{ {
@ -1439,13 +1439,13 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-09-17T01:48:37Z", "created_at": "2020-09-17T01:48:37Z",
"updated_at": "2020-09-17T06:44:15Z", "updated_at": "2020-09-17T14:59:22Z",
"pushed_at": "2020-09-17T01:55:48Z", "pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 4, "stargazers_count": 5,
"watchers_count": 4, "watchers_count": 5,
"forks_count": 2, "forks_count": 3,
"forks": 2, "forks": 3,
"watchers": 4, "watchers": 5,
"score": 0 "score": 0
} }
] ]

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472", "description": "Test tool for CVE-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-08T08:58:37Z", "created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-09-17T09:04:06Z", "updated_at": "2020-09-17T15:05:10Z",
"pushed_at": "2020-09-17T08:18:25Z", "pushed_at": "2020-09-17T08:18:25Z",
"stargazers_count": 833, "stargazers_count": 855,
"watchers_count": 833, "watchers_count": 855,
"forks_count": 164, "forks_count": 165,
"forks": 164, "forks": 165,
"watchers": 833, "watchers": 855,
"score": 0 "score": 0
}, },
{ {
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura", "description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:56:51Z", "created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-09-17T08:52:03Z", "updated_at": "2020-09-17T15:08:38Z",
"pushed_at": "2020-09-15T15:50:03Z", "pushed_at": "2020-09-15T15:50:03Z",
"stargazers_count": 431, "stargazers_count": 445,
"watchers_count": 431, "watchers_count": 445,
"forks_count": 114, "forks_count": 114,
"forks": 114, "forks": 114,
"watchers": 431, "watchers": 445,
"score": 0 "score": 0
}, },
{ {
@ -105,13 +105,13 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon", "description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false, "fork": false,
"created_at": "2020-09-14T16:57:49Z", "created_at": "2020-09-14T16:57:49Z",
"updated_at": "2020-09-17T07:46:00Z", "updated_at": "2020-09-17T13:06:07Z",
"pushed_at": "2020-09-17T07:26:50Z", "pushed_at": "2020-09-17T07:26:50Z",
"stargazers_count": 64, "stargazers_count": 66,
"watchers_count": 64, "watchers_count": 66,
"forks_count": 14, "forks_count": 14,
"forks": 14, "forks": 14,
"watchers": 64, "watchers": 66,
"score": 0 "score": 0
}, },
{ {
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-09-17T07:32:11Z", "updated_at": "2020-09-17T11:20:30Z",
"pushed_at": "2020-09-14T19:44:25Z", "pushed_at": "2020-09-14T19:44:25Z",
"stargazers_count": 76, "stargazers_count": 79,
"watchers_count": 76, "watchers_count": 79,
"forks_count": 23, "forks_count": 23,
"forks": 23, "forks": 23,
"watchers": 76, "watchers": 79,
"score": 0 "score": 0
}, },
{ {
@ -151,13 +151,13 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.", "description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:27:14Z", "created_at": "2020-09-14T19:27:14Z",
"updated_at": "2020-09-17T06:01:36Z", "updated_at": "2020-09-17T11:33:27Z",
"pushed_at": "2020-09-16T14:05:27Z", "pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 71, "stargazers_count": 73,
"watchers_count": 71, "watchers_count": 73,
"forks_count": 19, "forks_count": 19,
"forks": 19, "forks": 19,
"watchers": 71, "watchers": 73,
"score": 0 "score": 0
}, },
{ {
@ -266,13 +266,13 @@
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器", "description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
"fork": false, "fork": false,
"created_at": "2020-09-15T16:10:21Z", "created_at": "2020-09-15T16:10:21Z",
"updated_at": "2020-09-17T06:44:19Z", "updated_at": "2020-09-17T12:25:30Z",
"pushed_at": "2020-09-15T16:40:53Z", "pushed_at": "2020-09-15T16:40:53Z",
"stargazers_count": 26, "stargazers_count": 30,
"watchers_count": 26, "watchers_count": 30,
"forks_count": 6, "forks_count": 6,
"forks": 6, "forks": 6,
"watchers": 26, "watchers": 30,
"score": 0 "score": 0
}, },
{ {
@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp", "description": "cve-2020-1472 复现利用及其exp",
"fork": false, "fork": false,
"created_at": "2020-09-16T03:40:47Z", "created_at": "2020-09-16T03:40:47Z",
"updated_at": "2020-09-17T08:43:07Z", "updated_at": "2020-09-17T09:23:33Z",
"pushed_at": "2020-09-16T15:03:32Z", "pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 10, "stargazers_count": 13,
"watchers_count": 10, "watchers_count": 13,
"forks_count": 2, "forks_count": 2,
"forks": 2, "forks": 2,
"watchers": 10, "watchers": 13,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-03T04:37:30Z", "pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1844, "stargazers_count": 1844,
"watchers_count": 1844, "watchers_count": 1844,
"forks_count": 476, "forks_count": 477,
"forks": 476, "forks": 477,
"watchers": 1844, "watchers": 1844,
"score": 0 "score": 0
}, },
@ -86,8 +86,8 @@
"pushed_at": "2020-07-15T02:52:33Z", "pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 313, "stargazers_count": 313,
"watchers_count": 313, "watchers_count": 313,
"forks_count": 97, "forks_count": 96,
"forks": 97, "forks": 96,
"watchers": 313, "watchers": 313,
"score": 0 "score": 0
}, },

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)", "description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false, "fork": false,
"created_at": "2020-07-15T15:20:09Z", "created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-09-17T08:30:25Z", "updated_at": "2020-09-17T10:48:04Z",
"pushed_at": "2020-07-23T19:45:25Z", "pushed_at": "2020-07-23T19:45:25Z",
"stargazers_count": 121, "stargazers_count": 122,
"watchers_count": 121, "watchers_count": 122,
"forks_count": 41, "forks_count": 41,
"forks": 41, "forks": 41,
"watchers": 121, "watchers": 122,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-03-12T11:10:31Z", "pushed_at": "2020-03-12T11:10:31Z",
"stargazers_count": 33, "stargazers_count": 33,
"watchers_count": 33, "watchers_count": 33,
"forks_count": 4, "forks_count": 5,
"forks": 4, "forks": 5,
"watchers": 33, "watchers": 33,
"score": 0 "score": 0
}, },

View file

@ -105,13 +105,13 @@
"description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ", "description": "CVE-2020-9484 Mass Scanner, Scan a list of urls for Apache Tomcat deserialization (CVE-2020-9484) which could lead to RCE ",
"fork": false, "fork": false,
"created_at": "2020-06-05T20:40:28Z", "created_at": "2020-06-05T20:40:28Z",
"updated_at": "2020-09-05T07:37:04Z", "updated_at": "2020-09-17T10:30:28Z",
"pushed_at": "2020-06-05T21:04:43Z", "pushed_at": "2020-06-05T21:04:43Z",
"stargazers_count": 7, "stargazers_count": 8,
"watchers_count": 7, "watchers_count": 8,
"forks_count": 4, "forks_count": 4,
"forks": 4, "forks": 4,
"watchers": 7, "watchers": 8,
"score": 0 "score": 0
}, },
{ {