Auto Update 2022/01/22 06:14:14

This commit is contained in:
motikan2010-bot 2022-01-22 15:14:14 +09:00
parent 24d38010dc
commit 43d97a75f0
18 changed files with 98 additions and 98 deletions

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-12-31T07:34:47Z",
"updated_at": "2022-01-22T03:08:33Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 375,
"watchers_count": 375,
"stargazers_count": 376,
"watchers_count": 376,
"forks_count": 147,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 147,
"watchers": 375,
"watchers": 376,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
},
{

View file

@ -44,7 +44,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3108,
"watchers_count": 3108,
"forks_count": 920,
"forks_count": 921,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,7 +69,7 @@
"webshell"
],
"visibility": "public",
"forks": 920,
"forks": 921,
"watchers": 3108,
"score": 0
},

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
}
]

View file

@ -758,17 +758,17 @@
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601结合相关资源及文章实现。推荐大家结合作者博客理解ECC算法、Windows验证机制并尝试自己复现可执行文件签名证书和HTTPS劫持的例子。作为网络安全初学者自己确实很菜但希望坚持下去加油",
"fork": false,
"created_at": "2020-02-17T15:01:54Z",
"updated_at": "2021-12-05T20:33:37Z",
"updated_at": "2022-01-22T03:09:25Z",
"pushed_at": "2020-02-17T16:09:40Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 1,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 24,
"forks": 2,
"watchers": 25,
"score": 0
},
{

View file

@ -17,7 +17,7 @@
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3108,
"watchers_count": 3108,
"forks_count": 920,
"forks_count": 921,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,7 +42,7 @@
"webshell"
],
"visibility": "public",
"forks": 920,
"forks": 921,
"watchers": 3108,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-20T07:04:45Z",
"updated_at": "2022-01-22T04:18:32Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1267,
"watchers_count": 1267,
"stargazers_count": 1268,
"watchers_count": 1268,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1267,
"watchers": 1268,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-11-10T15:15:04Z",
"updated_at": "2022-01-22T05:57:37Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 115,
"watchers": 116,
"score": 0
}
]

View file

@ -125,14 +125,14 @@
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 134,
"watchers_count": 134,
"forks_count": 60,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-22205"
],
"visibility": "public",
"forks": 60,
"forks": 61,
"watchers": 134,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2021-11-10T15:15:04Z",
"updated_at": "2022-01-22T05:57:37Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 116,
"watchers_count": 116,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 115,
"watchers": 116,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2022-01-11T16:03:38Z",
"updated_at": "2022-01-21T09:36:37Z",
"updated_at": "2022-01-22T05:10:24Z",
"pushed_at": "2022-01-11T16:52:16Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 31,
"watchers": 30,
"score": 0
}
]

View file

@ -67,17 +67,17 @@
"description": "CVE-2021-32099 SQLi allow attacker bypass login. From HTB with love",
"fork": false,
"created_at": "2022-01-21T02:43:20Z",
"updated_at": "2022-01-21T08:31:17Z",
"updated_at": "2022-01-22T05:41:19Z",
"pushed_at": "2022-01-21T08:00:59Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "CVE-2021-42342 RCE",
"fork": false,
"created_at": "2022-01-04T14:48:59Z",
"updated_at": "2022-01-16T02:59:37Z",
"updated_at": "2022-01-22T04:00:16Z",
"pushed_at": "2022-01-04T14:54:39Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 34,
"watchers": 35,
"score": 0
}
]

View file

@ -601,17 +601,17 @@
"description": "Hashes for vulnerable LOG4J versions",
"fork": false,
"created_at": "2021-12-10T18:06:06Z",
"updated_at": "2022-01-19T11:50:12Z",
"updated_at": "2022-01-22T02:58:36Z",
"pushed_at": "2021-12-17T17:02:24Z",
"stargazers_count": 148,
"watchers_count": 148,
"stargazers_count": 149,
"watchers_count": 149,
"forks_count": 36,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 36,
"watchers": 148,
"watchers": 149,
"score": 0
},
{
@ -858,10 +858,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-21T23:36:08Z",
"updated_at": "2022-01-22T03:32:11Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 656,
"watchers_count": 656,
"stargazers_count": 657,
"watchers_count": 657,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
@ -888,7 +888,7 @@
],
"visibility": "public",
"forks": 102,
"watchers": 656,
"watchers": 657,
"score": 0
},
{
@ -1373,10 +1373,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-21T13:15:45Z",
"updated_at": "2022-01-22T00:30:29Z",
"pushed_at": "2022-01-11T14:45:44Z",
"stargazers_count": 745,
"watchers_count": 745,
"stargazers_count": 746,
"watchers_count": 746,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
@ -1393,7 +1393,7 @@
],
"visibility": "public",
"forks": 151,
"watchers": 745,
"watchers": 746,
"score": 0
},
{
@ -1986,17 +1986,17 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false,
"created_at": "2021-12-12T01:24:51Z",
"updated_at": "2022-01-21T03:53:52Z",
"updated_at": "2022-01-22T02:30:33Z",
"pushed_at": "2021-12-23T20:40:44Z",
"stargazers_count": 482,
"watchers_count": 482,
"stargazers_count": 483,
"watchers_count": 483,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 482,
"watchers": 483,
"score": 0
},
{
@ -3539,17 +3539,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2022-01-21T23:18:19Z",
"updated_at": "2022-01-22T03:11:03Z",
"pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2642,
"watchers_count": 2642,
"stargazers_count": 2643,
"watchers_count": 2643,
"forks_count": 633,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 633,
"watchers": 2642,
"watchers": 2643,
"score": 0
},
{
@ -3566,17 +3566,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T04:14:18Z",
"updated_at": "2022-01-21T15:26:06Z",
"updated_at": "2022-01-22T02:58:19Z",
"pushed_at": "2022-01-21T11:43:49Z",
"stargazers_count": 253,
"watchers_count": 253,
"stargazers_count": 254,
"watchers_count": 254,
"forks_count": 89,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 253,
"watchers": 254,
"score": 0
},
{
@ -4606,7 +4606,7 @@
"pushed_at": "2021-12-21T16:01:08Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [
@ -4620,7 +4620,7 @@
"vulnerability"
],
"visibility": "public",
"forks": 3,
"forks": 4,
"watchers": 7,
"score": 0
},
@ -8247,8 +8247,8 @@
"description": "This is a showcase how the Log4J vulnerability (CVE-2021-44228) could be explored. This code is safe to run, but understand what it does and how it works!",
"fork": false,
"created_at": "2021-12-18T20:53:06Z",
"updated_at": "2021-12-18T20:53:10Z",
"pushed_at": "2021-12-18T20:53:07Z",
"updated_at": "2022-01-22T01:46:53Z",
"pushed_at": "2022-01-22T01:46:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
@ -8446,12 +8446,12 @@
"pushed_at": "2021-12-22T15:56:21Z",
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 60,
"score": 0
},

View file

@ -40,17 +40,17 @@
"description": "HTTP Protocol Stack Remote Code Execution Vulnerability CVE-2022-21907",
"fork": false,
"created_at": "2022-01-17T02:28:50Z",
"updated_at": "2022-01-21T17:53:10Z",
"updated_at": "2022-01-22T01:46:05Z",
"pushed_at": "2022-01-20T02:07:59Z",
"stargazers_count": 292,
"watchers_count": 292,
"stargazers_count": 293,
"watchers_count": 293,
"forks_count": 84,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 292,
"watchers": 293,
"score": 0
},
{
@ -94,10 +94,10 @@
"description": "Proof of concept of CVE-2022-21907 Double Free in http.sys driver, triggering a kernel crash on IIS servers",
"fork": false,
"created_at": "2022-01-17T15:42:37Z",
"updated_at": "2022-01-21T19:46:19Z",
"updated_at": "2022-01-22T04:13:41Z",
"pushed_at": "2022-01-18T14:58:44Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 41,
"watchers": 42,
"score": 0
}
]