mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/05/23 18:07:39
This commit is contained in:
parent
daa4fde921
commit
429baf01bf
13 changed files with 53 additions and 53 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2020-05-21T10:58:10Z",
|
||||
"updated_at": "2020-05-23T07:59:54Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 258,
|
||||
"watchers_count": 258,
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 102,
|
||||
"forks": 102,
|
||||
"watchers": 258,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-01-10T01:14:44Z",
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
"forks_count": 176,
|
||||
"forks": 176,
|
||||
"forks_count": 177,
|
||||
"forks": 177,
|
||||
"watchers": 665,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -37,7 +37,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2020-05-22T17:10:10Z",
|
||||
"updated_at": "2020-05-22T17:16:32Z",
|
||||
"pushed_at": "2020-05-22T17:16:30Z",
|
||||
"pushed_at": "2020-05-23T03:23:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Developed proof-of-concept exploits for various types of vulnerabilities and mitigation bypasses with user-mode Windows applications, New CVE's produced via this repo: CVE-2019-16724, CVE-2019-17181",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-31T20:28:12Z",
|
||||
"updated_at": "2020-05-22T07:20:37Z",
|
||||
"updated_at": "2020-05-23T06:56:35Z",
|
||||
"pushed_at": "2020-05-09T16:01:14Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-22T20:06:43Z",
|
||||
"updated_at": "2020-05-23T08:47:36Z",
|
||||
"pushed_at": "2020-05-20T09:26:30Z",
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"watchers": 749,
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 753,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -174,13 +174,13 @@
|
|||
"description": "CVE-2019-2725 命令回显",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-29T01:57:05Z",
|
||||
"updated_at": "2020-05-19T01:47:25Z",
|
||||
"updated_at": "2020-05-23T03:52:31Z",
|
||||
"pushed_at": "2019-08-08T09:48:20Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"forks_count": 148,
|
||||
"forks": 148,
|
||||
"watchers": 336,
|
||||
"watchers": 337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-05-05T11:43:13Z",
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2020-05-18T10:43:42Z",
|
||||
"updated_at": "2020-05-23T07:12:54Z",
|
||||
"pushed_at": "2020-04-14T11:38:39Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 438,
|
||||
"watchers_count": 438,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"forks_count": 128,
|
||||
"forks": 128,
|
||||
"watchers": 438,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat的漏洞利用脚本,优先更新高危且易利用的漏洞利用脚本,最新添加CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2020-05-22T20:06:43Z",
|
||||
"updated_at": "2020-05-23T08:47:36Z",
|
||||
"pushed_at": "2020-05-20T09:26:30Z",
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"watchers": 749,
|
||||
"stargazers_count": 753,
|
||||
"watchers_count": 753,
|
||||
"forks_count": 166,
|
||||
"forks": 166,
|
||||
"watchers": 753,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-05-22T08:46:20Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weblogic coherence.jar RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-10T09:04:43Z",
|
||||
"updated_at": "2020-05-22T02:28:15Z",
|
||||
"updated_at": "2020-05-23T03:51:18Z",
|
||||
"pushed_at": "2020-05-10T09:29:36Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 17,
|
||||
"forks": 17,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2020-8617 (BIND)",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-20T12:26:45Z",
|
||||
"updated_at": "2020-05-22T18:34:07Z",
|
||||
"updated_at": "2020-05-23T07:41:32Z",
|
||||
"pushed_at": "2020-05-20T13:03:50Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"stargazers_count": 24,
|
||||
"watchers_count": 24,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 23,
|
||||
"watchers": 24,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "tomcat使用了自带session同步功能时,不安全的配置(没有使用EncryptInterceptor)导致存在的反序列化漏洞,通过精心构造的数据包, 可以对使用了tomcat自带session同步功能的服务器进行攻击。PS:这个不是CVE-2020-9484,9484是session持久化的洞,这个是session集群同步的洞!",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-19T05:12:53Z",
|
||||
"updated_at": "2020-05-23T03:06:18Z",
|
||||
"updated_at": "2020-05-23T07:57:17Z",
|
||||
"pushed_at": "2020-05-19T05:13:19Z",
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 158,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-05-21T15:13:22Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
|
|
Loading…
Reference in a new issue