Auto Update 2019/12/19 15:30:01

This commit is contained in:
motikan2010-bot 2019-12-20 00:30:01 +09:00
parent bb82ce05b4
commit 42f4825e1c
33 changed files with 170 additions and 147 deletions

View file

@ -197,13 +197,13 @@
"description": "A CVE-2016-5195 exploit example.",
"fork": false,
"created_at": "2016-10-23T00:16:33Z",
"updated_at": "2019-12-13T02:56:59Z",
"updated_at": "2019-12-19T11:20:41Z",
"pushed_at": "2017-03-21T16:46:38Z",
"stargazers_count": 158,
"watchers_count": 158,
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 85,
"forks": 85,
"watchers": 158,
"watchers": 159,
"score": 0
},
{

View file

@ -335,13 +335,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2019-12-10T06:48:44Z",
"updated_at": "2019-12-19T09:00:51Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 45,
"forks": 45,
"watchers": 144,
"watchers": 145,
"score": 0
},
{
@ -427,13 +427,13 @@
"description": "POC for CVE-2017-10271. Since java.lang.ProcessBuilder was the original vector for RCE, there are multiple signature based rules that block this particular payload. Added java.lang.Runtime and will add others in the future. This is for educational purposes only: I take no responsibility for how you use this code. ",
"fork": false,
"created_at": "2019-03-20T15:26:55Z",
"updated_at": "2019-07-19T03:05:08Z",
"updated_at": "2019-12-19T13:44:39Z",
"pushed_at": "2019-03-27T17:47:52Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "A collection of tools for the Janus exploit [CVE-2017-13156].",
"fork": false,
"created_at": "2019-08-25T16:31:16Z",
"updated_at": "2019-11-03T09:37:52Z",
"updated_at": "2019-12-19T03:48:44Z",
"pushed_at": "2019-10-22T20:04:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -90,5 +90,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 229002257,
"name": "jackson-RCE",
"full_name": "BassinD\/jackson-RCE",
"owner": {
"login": "BassinD",
"id": 29598797,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29598797?v=4",
"html_url": "https:\/\/github.com\/BassinD"
},
"html_url": "https:\/\/github.com\/BassinD\/jackson-RCE",
"description": "Demo for CVE-2017-7525",
"fork": false,
"created_at": "2019-12-19T07:45:21Z",
"updated_at": "2019-12-19T08:09:43Z",
"pushed_at": "2019-12-19T08:09:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-06-16T09:53:10Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 18,
"forks": 18,
"forks_count": 19,
"forks": 19,
"watchers": 61,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2018-0824",
"fork": false,
"created_at": "2018-06-15T08:59:37Z",
"updated_at": "2019-11-13T23:37:34Z",
"updated_at": "2019-12-19T13:33:11Z",
"pushed_at": "2018-06-25T07:13:36Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 36,
"forks": 36,
"watchers": 67,
"watchers": 68,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2019-11-20T14:32:04Z",
"updated_at": "2019-12-19T09:29:03Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 188,
"watchers_count": 188,
"stargazers_count": 189,
"watchers_count": 189,
"forks_count": 58,
"forks": 58,
"watchers": 188,
"watchers": 189,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2018-13379 Script for Nmap NSE.",
"fork": false,
"created_at": "2019-10-14T04:09:44Z",
"updated_at": "2019-12-09T05:54:44Z",
"updated_at": "2019-12-19T09:29:05Z",
"pushed_at": "2019-11-21T22:10:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-05-08T16:14:50Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"forks_count": 4,
"forks": 4,
"watchers": 11,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-06-13T15:40:15Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 15,
"score": 0
}

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-11-13T00:26:18Z",
"stargazers_count": 200,
"watchers_count": 200,
"forks_count": 35,
"forks": 35,
"forks_count": 36,
"forks": 36,
"watchers": 200,
"score": 0
}

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-03-13T07:11:23Z",
"stargazers_count": 398,
"watchers_count": 398,
"forks_count": 126,
"forks": 126,
"forks_count": 125,
"forks": 125,
"watchers": 398,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2019-12-17T11:47:57Z",
"updated_at": "2019-12-19T07:03:42Z",
"pushed_at": "2019-06-21T11:29:41Z",
"stargazers_count": 281,
"watchers_count": 281,
"stargazers_count": 282,
"watchers_count": 282,
"forks_count": 58,
"forks": 58,
"watchers": 281,
"watchers": 282,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 399,
"watchers_count": 399,
"forks_count": 160,
"forks": 160,
"forks_count": 161,
"forks": 161,
"watchers": 399,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2019-12-18T08:50:15Z",
"updated_at": "2019-12-19T05:15:30Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 35,
"forks": 35,
"watchers": 54,
"watchers": 55,
"score": 0
},
{

View file

@ -1048,13 +1048,13 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2019-12-16T06:51:02Z",
"updated_at": "2019-12-19T07:09:15Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 451,
"watchers_count": 451,
"stargazers_count": 450,
"watchers_count": 450,
"forks_count": 185,
"forks": 185,
"watchers": 451,
"watchers": 450,
"score": 0
},
{
@ -1117,13 +1117,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2019-12-18T17:38:59Z",
"updated_at": "2019-12-19T08:26:29Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1067,
"watchers_count": 1067,
"stargazers_count": 1066,
"watchers_count": 1066,
"forks_count": 354,
"forks": 354,
"watchers": 1067,
"watchers": 1066,
"score": 0
},
{
@ -1301,13 +1301,13 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2019-12-17T01:38:16Z",
"updated_at": "2019-12-19T12:45:39Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 666,
"watchers_count": 666,
"forks_count": 155,
"forks": 155,
"watchers": 666,
"stargazers_count": 668,
"watchers_count": 668,
"forks_count": 156,
"forks": 156,
"watchers": 668,
"score": 0
},
{
@ -1485,13 +1485,13 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2019-12-18T02:35:40Z",
"updated_at": "2019-12-19T08:26:50Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 990,
"watchers_count": 990,
"stargazers_count": 988,
"watchers_count": 988,
"forks_count": 346,
"forks": 346,
"watchers": 990,
"watchers": 988,
"score": 0
},
{
@ -1554,13 +1554,13 @@
"description": "Porting BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2019-12-10T06:41:21Z",
"updated_at": "2019-12-19T07:09:14Z",
"pushed_at": "2019-07-20T04:48:43Z",
"stargazers_count": 308,
"watchers_count": 308,
"stargazers_count": 307,
"watchers_count": 307,
"forks_count": 110,
"forks": 110,
"watchers": 308,
"watchers": 307,
"score": 0
},
{
@ -1669,13 +1669,13 @@
"description": "Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS\/SSL and x509 support",
"fork": false,
"created_at": "2019-06-03T07:49:26Z",
"updated_at": "2019-12-18T22:54:44Z",
"updated_at": "2019-12-19T08:25:16Z",
"pushed_at": "2019-06-12T08:48:17Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 4,
"forks": 4,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Win32k Exploit by Grant Willcox",
"fork": false,
"created_at": "2019-05-17T14:08:01Z",
"updated_at": "2019-11-21T07:50:41Z",
"updated_at": "2019-12-19T13:41:19Z",
"pushed_at": "2019-05-17T14:17:00Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 69,
"watchers_count": 69,
"forks_count": 32,
"forks": 32,
"watchers": 67,
"watchers": 69,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Privesc through import of Sheduled tasks + Hardlinks - CVE-2019-1069",
"fork": false,
"created_at": "2019-06-03T08:07:32Z",
"updated_at": "2019-10-13T12:57:36Z",
"updated_at": "2019-12-19T14:48:26Z",
"pushed_at": "2019-06-26T11:53:08Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 10,
"forks": 10,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "(PoC) Python version of CVE-2019-11043 exploit by neex",
"fork": false,
"created_at": "2019-10-28T11:09:06Z",
"updated_at": "2019-12-16T13:57:34Z",
"updated_at": "2019-12-19T07:27:33Z",
"pushed_at": "2019-10-29T15:47:02Z",
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 22,
"forks": 22,
"watchers": 107,
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 23,
"forks": 23,
"watchers": 108,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
"fork": false,
"created_at": "2019-08-21T08:40:26Z",
"updated_at": "2019-12-09T07:19:20Z",
"updated_at": "2019-12-19T12:38:14Z",
"pushed_at": "2019-09-02T16:36:31Z",
"stargazers_count": 254,
"watchers_count": 254,
"stargazers_count": 255,
"watchers_count": 255,
"forks_count": 92,
"forks": 92,
"watchers": 254,
"watchers": 255,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-07-22T06:47:52Z",
"stargazers_count": 52,
"watchers_count": 52,
"forks_count": 16,
"forks": 16,
"forks_count": 17,
"forks": 17,
"watchers": 52,
"score": 0
},

View file

@ -13,7 +13,7 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2019-12-18T14:41:09Z",
"updated_at": "2019-12-19T15:17:57Z",
"pushed_at": "2019-12-10T11:26:28Z",
"stargazers_count": 525,
"watchers_count": 525,

View file

@ -59,13 +59,13 @@
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
"fork": false,
"created_at": "2019-10-04T14:43:57Z",
"updated_at": "2019-12-13T13:00:32Z",
"updated_at": "2019-12-19T06:34:30Z",
"pushed_at": "2019-11-30T10:28:01Z",
"stargazers_count": 87,
"watchers_count": 87,
"stargazers_count": 88,
"watchers_count": 88,
"forks_count": 39,
"forks": 39,
"watchers": 87,
"watchers": 88,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-06-10T18:14:34Z",
"updated_at": "2019-11-07T23:54:28Z",
"updated_at": "2019-12-19T13:38:37Z",
"pushed_at": "2019-06-24T18:30:30Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 12,
"forks": 12,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Poc for CVE-2019-1253",
"fork": false,
"created_at": "2019-09-11T20:40:15Z",
"updated_at": "2019-12-18T01:53:37Z",
"updated_at": "2019-12-19T12:11:12Z",
"pushed_at": "2019-09-12T14:43:47Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 31,
"forks": 31,
"watchers": 104,
"watchers": 105,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
"fork": false,
"created_at": "2019-11-21T06:26:27Z",
"updated_at": "2019-12-16T01:58:04Z",
"updated_at": "2019-12-19T10:59:19Z",
"pushed_at": "2019-11-21T09:27:59Z",
"stargazers_count": 41,
"watchers_count": 41,
"forks_count": 13,
"forks": 13,
"watchers": 41,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 15,
"forks": 15,
"watchers": 43,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
"fork": false,
"created_at": "2019-12-12T07:58:11Z",
"updated_at": "2019-12-18T16:33:56Z",
"updated_at": "2019-12-19T12:35:12Z",
"pushed_at": "2019-12-18T15:32:15Z",
"stargazers_count": 85,
"watchers_count": 85,
"stargazers_count": 90,
"watchers_count": 90,
"forks_count": 14,
"forks": 14,
"watchers": 85,
"watchers": 90,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2019-12-17T19:04:15Z",
"updated_at": "2019-12-19T10:59:55Z",
"pushed_at": "2019-07-25T08:01:07Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 300,
"watchers_count": 300,
"forks_count": 92,
"forks": 92,
"watchers": 299,
"watchers": 300,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-09T06:31:41Z",
"updated_at": "2019-10-24T00:27:08Z",
"updated_at": "2019-12-19T14:17:46Z",
"pushed_at": "2019-10-09T06:32:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic Unrestricted File Upload",
"fork": false,
"created_at": "2019-04-17T11:12:32Z",
"updated_at": "2019-11-30T23:35:41Z",
"updated_at": "2019-12-19T13:41:07Z",
"pushed_at": "2019-04-17T11:13:29Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 10,
"forks": 10,
"watchers": 42,
"watchers": 43,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2019-12-17T09:54:02Z",
"updated_at": "2019-12-19T11:35:25Z",
"pushed_at": "2019-06-24T06:06:48Z",
"stargazers_count": 464,
"watchers_count": 464,
"stargazers_count": 465,
"watchers_count": 465,
"forks_count": 96,
"forks": 96,
"watchers": 464,
"watchers": 465,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2019-12-10T06:48:44Z",
"updated_at": "2019-12-19T09:00:51Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 144,
"watchers_count": 144,
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 45,
"forks": 45,
"watchers": 144,
"watchers": 145,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2019-04-09T11:06:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 1,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "🐱‍💻 Poc of CVE-2019-7238 - Nexus Repository Manager 3 Remote Code Execution 🐱‍💻",
"fork": false,
"created_at": "2019-02-24T23:09:43Z",
"updated_at": "2019-12-12T08:07:44Z",
"updated_at": "2019-12-19T12:15:59Z",
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 31,
"forks": 31,
"watchers": 109,
"watchers": 110,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
"fork": false,
"created_at": "2019-05-06T15:47:20Z",
"updated_at": "2019-11-14T14:46:23Z",
"updated_at": "2019-12-19T03:36:32Z",
"pushed_at": "2019-05-08T16:22:58Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 19,
"forks": 19,
"watchers": 34,
"watchers": 35,
"score": 0
}
]