mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/12/24 12:13:37
This commit is contained in:
parent
d5ca05269d
commit
49135072a0
44 changed files with 446 additions and 456 deletions
|
@ -40,17 +40,17 @@
|
|||
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
|
||||
"fork": false,
|
||||
"created_at": "2016-03-23T10:41:00Z",
|
||||
"updated_at": "2021-08-03T01:32:00Z",
|
||||
"updated_at": "2021-12-24T10:35:04Z",
|
||||
"pushed_at": "2016-03-23T12:05:38Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 20,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 20,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,16 +13,16 @@
|
|||
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
||||
"fork": false,
|
||||
"created_at": "2016-05-02T12:18:57Z",
|
||||
"updated_at": "2021-11-14T06:34:24Z",
|
||||
"updated_at": "2021-12-24T10:18:55Z",
|
||||
"pushed_at": "2019-08-13T07:14:01Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 53,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 53,
|
||||
"forks": 54,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T12:21:16Z",
|
||||
"updated_at": "2021-09-23T22:29:56Z",
|
||||
"updated_at": "2021-12-24T11:09:47Z",
|
||||
"pushed_at": "2019-09-30T04:10:23Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -190,7 +190,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Flexense HTTP Server <= 10.6.24 - Denial Of Service Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-25T17:31:05Z",
|
||||
"updated_at": "2021-08-07T16:45:57Z",
|
||||
"updated_at": "2021-12-24T10:36:59Z",
|
||||
"pushed_at": "2018-09-03T18:25:53Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 8,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -98,17 +98,17 @@
|
|||
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-07T08:30:07Z",
|
||||
"updated_at": "2021-12-15T14:34:16Z",
|
||||
"updated_at": "2021-12-24T08:51:08Z",
|
||||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 287,
|
||||
"watchers_count": 287,
|
||||
"stargazers_count": 288,
|
||||
"watchers_count": 288,
|
||||
"forks_count": 124,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 124,
|
||||
"watchers": 287,
|
||||
"watchers": 288,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-24T01:44:11Z",
|
||||
"updated_at": "2021-12-24T08:41:05Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3064,
|
||||
"watchers_count": 3064,
|
||||
"forks_count": 909,
|
||||
"stargazers_count": 3067,
|
||||
"watchers_count": 3067,
|
||||
"forks_count": 911,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 909,
|
||||
"watchers": 3064,
|
||||
"forks": 911,
|
||||
"watchers": 3067,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-12-21T22:20:09Z",
|
||||
"updated_at": "2021-12-24T09:42:33Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"stargazers_count": 549,
|
||||
"watchers_count": 549,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"watchers": 548,
|
||||
"watchers": 549,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploiting a patched vulnerability in JavaScriptCore",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-02T00:12:22Z",
|
||||
"updated_at": "2021-10-01T14:13:32Z",
|
||||
"updated_at": "2021-12-24T08:06:47Z",
|
||||
"pushed_at": "2020-01-02T00:13:22Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"forks_count": 2,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"forks": 3,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T21:25:18Z",
|
||||
"updated_at": "2021-11-29T02:30:40Z",
|
||||
"updated_at": "2021-12-24T06:50:06Z",
|
||||
"pushed_at": "2020-09-18T00:01:00Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -155,17 +155,17 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-12-23T09:27:27Z",
|
||||
"updated_at": "2021-12-24T06:43:52Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 388,
|
||||
"watchers_count": 388,
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 388,
|
||||
"watchers": 389,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-24T01:44:11Z",
|
||||
"updated_at": "2021-12-24T08:41:05Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3064,
|
||||
"watchers_count": 3064,
|
||||
"forks_count": 909,
|
||||
"stargazers_count": 3067,
|
||||
"watchers_count": 3067,
|
||||
"forks_count": 911,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 909,
|
||||
"watchers": 3064,
|
||||
"forks": 911,
|
||||
"watchers": 3067,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,12 +44,12 @@
|
|||
"pushed_at": "2020-11-11T09:12:20Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 3,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -125,7 +125,7 @@
|
|||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 912,
|
||||
"watchers_count": 912,
|
||||
"forks_count": 285,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -134,7 +134,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 285,
|
||||
"forks": 286,
|
||||
"watchers": 912,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-23T09:07:38Z",
|
||||
"updated_at": "2021-12-24T11:24:25Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1249,
|
||||
"watchers_count": 1249,
|
||||
"stargazers_count": 1251,
|
||||
"watchers_count": 1251,
|
||||
"forks_count": 277,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 277,
|
||||
"watchers": 1249,
|
||||
"watchers": 1251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -103,12 +103,12 @@
|
|||
"pushed_at": "2020-08-25T03:17:32Z",
|
||||
"stargazers_count": 304,
|
||||
"watchers_count": 304,
|
||||
"forks_count": 43,
|
||||
"forks_count": 44,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"forks": 44,
|
||||
"watchers": 304,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-35729",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:59:43Z",
|
||||
"updated_at": "2021-10-24T06:20:50Z",
|
||||
"updated_at": "2021-12-24T06:18:33Z",
|
||||
"pushed_at": "2021-04-09T08:00:19Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "🐱💻 👍 Google Chrome - File System Access API - vulnerabilities reported by Maciej Pulikowski | Total Bug Bounty Reward: $5.000 | CVE-2021-21123 and 5 more...",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-22T11:53:57Z",
|
||||
"updated_at": "2021-12-12T02:47:33Z",
|
||||
"updated_at": "2021-12-24T10:11:49Z",
|
||||
"pushed_at": "2021-03-22T18:24:20Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 22,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -38,7 +38,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,17 +128,17 @@
|
|||
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-12-23T18:09:04Z",
|
||||
"updated_at": "2021-12-24T07:15:03Z",
|
||||
"pushed_at": "2021-06-09T10:13:56Z",
|
||||
"stargazers_count": 305,
|
||||
"watchers_count": 305,
|
||||
"stargazers_count": 306,
|
||||
"watchers_count": 306,
|
||||
"forks_count": 67,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 67,
|
||||
"watchers": 305,
|
||||
"watchers": 306,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -155,17 +155,17 @@
|
|||
"description": "cve-2021-21985 exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:17:06Z",
|
||||
"updated_at": "2021-12-23T01:20:03Z",
|
||||
"updated_at": "2021-12-24T11:45:26Z",
|
||||
"pushed_at": "2021-12-16T08:25:02Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"stargazers_count": 85,
|
||||
"watchers_count": 85,
|
||||
"forks_count": 28,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"watchers": 84,
|
||||
"watchers": 85,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -226,33 +226,6 @@
|
|||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 384003238,
|
||||
"name": "CVE-2021-21985",
|
||||
"full_name": "haiclover\/CVE-2021-21985",
|
||||
"owner": {
|
||||
"login": "haiclover",
|
||||
"id": 20736458,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20736458?v=4",
|
||||
"html_url": "https:\/\/github.com\/haiclover"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/haiclover\/CVE-2021-21985",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-08T04:45:19Z",
|
||||
"updated_at": "2021-07-12T11:04:39Z",
|
||||
"pushed_at": "2021-07-12T11:04:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 426353517,
|
||||
"name": "CVE-2021-21985_PoC",
|
||||
|
|
|
@ -121,17 +121,17 @@
|
|||
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-25T16:21:56Z",
|
||||
"updated_at": "2021-12-24T03:25:45Z",
|
||||
"updated_at": "2021-12-24T10:47:43Z",
|
||||
"pushed_at": "2021-10-02T03:17:45Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"forks_count": 48,
|
||||
"stargazers_count": 193,
|
||||
"watchers_count": 193,
|
||||
"forks_count": 49,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 191,
|
||||
"forks": 49,
|
||||
"watchers": 193,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -283,17 +283,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T08:18:50Z",
|
||||
"updated_at": "2021-12-24T06:11:26Z",
|
||||
"updated_at": "2021-12-24T10:16:54Z",
|
||||
"pushed_at": "2021-12-22T10:32:37Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 12,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 12,
|
||||
"watchers": 54,
|
||||
"forks": 14,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-05T15:42:16Z",
|
||||
"updated_at": "2021-12-20T06:24:47Z",
|
||||
"updated_at": "2021-12-24T09:05:20Z",
|
||||
"pushed_at": "2021-11-02T14:45:24Z",
|
||||
"stargazers_count": 170,
|
||||
"watchers_count": 170,
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 170,
|
||||
"watchers": 171,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -125,14 +125,14 @@
|
|||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 49,
|
||||
"forks_count": 50,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve-2021-22205"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 49,
|
||||
"forks": 50,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -125,7 +125,7 @@
|
|||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 912,
|
||||
"watchers_count": 912,
|
||||
"forks_count": 285,
|
||||
"forks_count": 286,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -134,7 +134,7 @@
|
|||
"poc"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 285,
|
||||
"forks": 286,
|
||||
"watchers": 912,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -87,32 +87,5 @@
|
|||
"forks": 5,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 386052413,
|
||||
"name": "CVE-2021-30461",
|
||||
"full_name": "puckiestyle\/CVE-2021-30461",
|
||||
"owner": {
|
||||
"login": "puckiestyle",
|
||||
"id": 57447087,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
||||
"html_url": "https:\/\/github.com\/puckiestyle"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-30461",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-14T19:20:11Z",
|
||||
"updated_at": "2021-07-14T19:20:24Z",
|
||||
"pushed_at": "2021-07-14T19:20:21Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC CVE-2021-30632 - Out of bounds write in V8",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-20T09:49:51Z",
|
||||
"updated_at": "2021-11-30T11:23:11Z",
|
||||
"updated_at": "2021-12-24T06:17:39Z",
|
||||
"pushed_at": "2021-09-20T09:52:06Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-12-19T16:42:50Z",
|
||||
"updated_at": "2021-12-24T06:36:04Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"forks_count": 52,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 52,
|
||||
"watchers": 188,
|
||||
"watchers": 189,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-12-22T01:14:44Z",
|
||||
"updated_at": "2021-12-24T06:42:35Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1158,17 +1158,17 @@
|
|||
"description": "CVE-2021-3156 - Sudo Baron Samedit",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-29T06:29:26Z",
|
||||
"updated_at": "2021-12-18T05:37:22Z",
|
||||
"updated_at": "2021-12-24T11:25:04Z",
|
||||
"pushed_at": "2021-08-11T15:52:19Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 115,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -98,12 +98,12 @@
|
|||
"pushed_at": "2021-09-07T15:18:45Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"forks_count": 8,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"forks": 9,
|
||||
"watchers": 18,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 386161559,
|
||||
"name": "CVE-2021-34496",
|
||||
"full_name": "fkm75P8YjLkb\/CVE-2021-34496",
|
||||
"owner": {
|
||||
"login": "fkm75P8YjLkb",
|
||||
"id": 82131630,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82131630?v=4",
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/fkm75P8YjLkb\/CVE-2021-34496",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-15T04:23:58Z",
|
||||
"updated_at": "2021-07-15T04:23:58Z",
|
||||
"pushed_at": "2021-07-15T04:23:59Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1,31 +1,4 @@
|
|||
[
|
||||
{
|
||||
"id": 382267064,
|
||||
"name": "PrintNightmare",
|
||||
"full_name": "glshnu\/PrintNightmare",
|
||||
"owner": {
|
||||
"login": "glshnu",
|
||||
"id": 7205231,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4",
|
||||
"html_url": "https:\/\/github.com\/glshnu"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/glshnu\/PrintNightmare",
|
||||
"description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-02T07:30:52Z",
|
||||
"updated_at": "2021-08-05T03:00:36Z",
|
||||
"pushed_at": "2021-07-12T15:07:05Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 382645654,
|
||||
"name": "PrintNightmare-CVE-2021-34527",
|
||||
|
|
|
@ -1,29 +0,0 @@
|
|||
[
|
||||
{
|
||||
"id": 385496417,
|
||||
"name": "cve-2021-34558",
|
||||
"full_name": "alexzorin\/cve-2021-34558",
|
||||
"owner": {
|
||||
"login": "alexzorin",
|
||||
"id": 311534,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/311534?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexzorin"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexzorin\/cve-2021-34558",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-07-13T06:15:21Z",
|
||||
"updated_at": "2021-12-15T14:42:32Z",
|
||||
"pushed_at": "2021-07-13T06:16:11Z",
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -229,17 +229,17 @@
|
|||
"description": "CVE-2021-40444 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-10T16:55:53Z",
|
||||
"updated_at": "2021-12-23T10:21:35Z",
|
||||
"updated_at": "2021-12-24T06:31:03Z",
|
||||
"pushed_at": "2021-09-11T09:50:26Z",
|
||||
"stargazers_count": 1331,
|
||||
"watchers_count": 1331,
|
||||
"stargazers_count": 1332,
|
||||
"watchers_count": 1332,
|
||||
"forks_count": 437,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 437,
|
||||
"watchers": 1331,
|
||||
"watchers": 1332,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -256,17 +256,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-09-11T02:49:37Z",
|
||||
"updated_at": "2021-12-15T14:42:58Z",
|
||||
"updated_at": "2021-12-24T11:57:05Z",
|
||||
"pushed_at": "2021-09-11T02:49:31Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 6,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -553,10 +553,10 @@
|
|||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-15T22:34:35Z",
|
||||
"updated_at": "2021-12-23T23:25:23Z",
|
||||
"updated_at": "2021-12-24T11:05:28Z",
|
||||
"pushed_at": "2021-10-12T23:05:07Z",
|
||||
"stargazers_count": 532,
|
||||
"watchers_count": 532,
|
||||
"stargazers_count": 536,
|
||||
"watchers_count": 536,
|
||||
"forks_count": 120,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -570,7 +570,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 120,
|
||||
"watchers": 532,
|
||||
"watchers": 536,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -923,17 +923,17 @@
|
|||
"description": "CVE-2021-40444",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T08:16:07Z",
|
||||
"updated_at": "2021-12-24T03:57:30Z",
|
||||
"updated_at": "2021-12-24T09:40:59Z",
|
||||
"pushed_at": "2021-12-19T08:27:33Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 28,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "windows 10 14393 LPE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-20T09:24:36Z",
|
||||
"updated_at": "2021-12-23T10:28:19Z",
|
||||
"updated_at": "2021-12-24T10:53:29Z",
|
||||
"pushed_at": "2021-10-28T03:51:09Z",
|
||||
"stargazers_count": 74,
|
||||
"watchers_count": 74,
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"forks_count": 33,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 33,
|
||||
"watchers": 74,
|
||||
"watchers": 75,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -293,8 +293,8 @@
|
|||
"description": "Apache 远程代码执行 (CVE-2021-42013)批量检测工具:Apache HTTP Server是美国阿帕奇(Apache)基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点,发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T14:46:41Z",
|
||||
"updated_at": "2021-12-23T15:51:43Z",
|
||||
"pushed_at": "2021-12-23T15:51:41Z",
|
||||
"updated_at": "2021-12-24T07:38:42Z",
|
||||
"pushed_at": "2021-12-24T07:38:39Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T15:10:30Z",
|
||||
"updated_at": "2021-12-24T05:59:54Z",
|
||||
"updated_at": "2021-12-24T09:56:02Z",
|
||||
"pushed_at": "2021-12-21T10:11:05Z",
|
||||
"stargazers_count": 647,
|
||||
"watchers_count": 647,
|
||||
"stargazers_count": 650,
|
||||
"watchers_count": 650,
|
||||
"forks_count": 134,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 134,
|
||||
"watchers": 647,
|
||||
"watchers": 650,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -45,17 +45,17 @@
|
|||
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T10:28:12Z",
|
||||
"updated_at": "2021-12-23T22:19:02Z",
|
||||
"updated_at": "2021-12-24T09:28:32Z",
|
||||
"pushed_at": "2021-12-20T04:51:01Z",
|
||||
"stargazers_count": 160,
|
||||
"watchers_count": 160,
|
||||
"stargazers_count": 161,
|
||||
"watchers_count": 161,
|
||||
"forks_count": 29,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 29,
|
||||
"watchers": 160,
|
||||
"watchers": 161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -99,17 +99,17 @@
|
|||
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T23:15:05Z",
|
||||
"updated_at": "2021-12-22T10:08:04Z",
|
||||
"updated_at": "2021-12-24T09:50:08Z",
|
||||
"pushed_at": "2021-12-13T23:15:47Z",
|
||||
"stargazers_count": 162,
|
||||
"watchers_count": 162,
|
||||
"forks_count": 22,
|
||||
"stargazers_count": 164,
|
||||
"watchers_count": 164,
|
||||
"forks_count": 23,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 22,
|
||||
"watchers": 162,
|
||||
"forks": 23,
|
||||
"watchers": 164,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T19:27:30Z",
|
||||
"updated_at": "2021-12-24T05:14:10Z",
|
||||
"updated_at": "2021-12-24T11:43:43Z",
|
||||
"pushed_at": "2021-12-16T09:50:15Z",
|
||||
"stargazers_count": 937,
|
||||
"watchers_count": 937,
|
||||
"forks_count": 245,
|
||||
"stargazers_count": 939,
|
||||
"watchers_count": 939,
|
||||
"forks_count": 246,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 245,
|
||||
"watchers": 937,
|
||||
"forks": 246,
|
||||
"watchers": 939,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Windows Common Log File System Driver POC",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T01:51:41Z",
|
||||
"updated_at": "2021-12-24T04:02:58Z",
|
||||
"updated_at": "2021-12-24T11:44:39Z",
|
||||
"pushed_at": "2021-12-21T06:57:06Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"forks_count": 16,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 16,
|
||||
"watchers": 54,
|
||||
"watchers": 57,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -183,10 +183,10 @@
|
|||
"description": "A exploit tool for Grafana Unauthorized arbitrary file reading vulnerability (CVE-2021-43798), it can burst plugins \/ extract secret_key \/ decrypt data_source info automatic.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-07T15:11:34Z",
|
||||
"updated_at": "2021-12-24T02:42:26Z",
|
||||
"updated_at": "2021-12-24T08:41:37Z",
|
||||
"pushed_at": "2021-12-09T07:22:26Z",
|
||||
"stargazers_count": 177,
|
||||
"watchers_count": 177,
|
||||
"stargazers_count": 176,
|
||||
"watchers_count": 176,
|
||||
"forks_count": 24,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -197,7 +197,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 24,
|
||||
"watchers": 177,
|
||||
"watchers": 176,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Remote Code Injection In Log4j",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T05:23:44Z",
|
||||
"updated_at": "2021-12-24T06:04:29Z",
|
||||
"updated_at": "2021-12-24T08:54:55Z",
|
||||
"pushed_at": "2021-12-14T15:30:16Z",
|
||||
"stargazers_count": 269,
|
||||
"watchers_count": 269,
|
||||
"forks_count": 75,
|
||||
"stargazers_count": 272,
|
||||
"watchers_count": 272,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"watchers": 269,
|
||||
"forks": 76,
|
||||
"watchers": 272,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -390,17 +390,17 @@
|
|||
"description": "Spring Boot web application vulnerable to CVE-2021-44228, nicknamed Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T12:38:20Z",
|
||||
"updated_at": "2021-12-24T04:32:26Z",
|
||||
"pushed_at": "2021-12-20T22:54:49Z",
|
||||
"stargazers_count": 827,
|
||||
"watchers_count": 827,
|
||||
"forks_count": 325,
|
||||
"updated_at": "2021-12-24T10:17:16Z",
|
||||
"pushed_at": "2021-12-24T08:51:30Z",
|
||||
"stargazers_count": 829,
|
||||
"watchers_count": 829,
|
||||
"forks_count": 327,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 325,
|
||||
"watchers": 827,
|
||||
"forks": 327,
|
||||
"watchers": 829,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -858,10 +858,10 @@
|
|||
"description": "🐱💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T22:35:00Z",
|
||||
"updated_at": "2021-12-23T19:33:22Z",
|
||||
"updated_at": "2021-12-24T07:37:11Z",
|
||||
"pushed_at": "2021-12-20T18:11:42Z",
|
||||
"stargazers_count": 538,
|
||||
"watchers_count": 538,
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -888,7 +888,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"watchers": 538,
|
||||
"watchers": 539,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -905,11 +905,11 @@
|
|||
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:19:28Z",
|
||||
"updated_at": "2021-12-24T02:59:58Z",
|
||||
"updated_at": "2021-12-24T09:30:01Z",
|
||||
"pushed_at": "2021-12-22T20:14:52Z",
|
||||
"stargazers_count": 968,
|
||||
"watchers_count": 968,
|
||||
"forks_count": 233,
|
||||
"stargazers_count": 975,
|
||||
"watchers_count": 975,
|
||||
"forks_count": 234,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -919,8 +919,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 233,
|
||||
"watchers": 968,
|
||||
"forks": 234,
|
||||
"watchers": 975,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1233,11 +1233,11 @@
|
|||
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T07:19:11Z",
|
||||
"updated_at": "2021-12-24T05:35:50Z",
|
||||
"pushed_at": "2021-12-23T15:22:33Z",
|
||||
"stargazers_count": 135,
|
||||
"watchers_count": 135,
|
||||
"forks_count": 44,
|
||||
"updated_at": "2021-12-24T08:18:36Z",
|
||||
"pushed_at": "2021-12-24T07:00:13Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 45,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1246,8 +1246,8 @@
|
|||
"log4j2"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 44,
|
||||
"watchers": 135,
|
||||
"forks": 45,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1372,10 +1372,10 @@
|
|||
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T11:18:46Z",
|
||||
"updated_at": "2021-12-24T03:54:30Z",
|
||||
"updated_at": "2021-12-24T09:26:08Z",
|
||||
"pushed_at": "2021-12-23T03:42:30Z",
|
||||
"stargazers_count": 658,
|
||||
"watchers_count": 658,
|
||||
"stargazers_count": 660,
|
||||
"watchers_count": 660,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1391,7 +1391,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 130,
|
||||
"watchers": 658,
|
||||
"watchers": 660,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1462,8 +1462,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-11T12:16:45Z",
|
||||
"updated_at": "2021-12-23T16:20:02Z",
|
||||
"pushed_at": "2021-12-23T16:19:59Z",
|
||||
"updated_at": "2021-12-24T11:01:22Z",
|
||||
"pushed_at": "2021-12-24T11:02:55Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
|
@ -1887,7 +1887,7 @@
|
|||
"pushed_at": "2021-12-22T17:26:01Z",
|
||||
"stargazers_count": 523,
|
||||
"watchers_count": 523,
|
||||
"forks_count": 83,
|
||||
"forks_count": 84,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -1904,7 +1904,7 @@
|
|||
"vulnerability-scanner"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 83,
|
||||
"forks": 84,
|
||||
"watchers": 523,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2504,17 +2504,17 @@
|
|||
"description": "Scan systems and docker images for potential log4j vulnerabilities. Able to patch (remove JndiLookup.class) from layered archives. Will detect in-depth (layered archives jar\/zip\/tar\/war and scans for vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046 and CVE-2021-45105). Binaries for Windows, Linux and OsX, but can be build on each platform supported by supported Golang.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T12:16:07Z",
|
||||
"updated_at": "2021-12-23T19:53:53Z",
|
||||
"updated_at": "2021-12-24T07:53:50Z",
|
||||
"pushed_at": "2021-12-23T19:53:50Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2839,17 +2839,17 @@
|
|||
"description": "A Byte Buddy Java agent-based fix for CVE-2021-44228, the log4j 2.x \"JNDI LDAP\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-12T15:29:20Z",
|
||||
"updated_at": "2021-12-22T08:29:14Z",
|
||||
"updated_at": "2021-12-24T10:34:52Z",
|
||||
"pushed_at": "2021-12-22T16:09:08Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3536,17 +3536,17 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2021-12-24T05:47:23Z",
|
||||
"updated_at": "2021-12-24T12:11:06Z",
|
||||
"pushed_at": "2021-12-23T17:05:14Z",
|
||||
"stargazers_count": 2300,
|
||||
"watchers_count": 2300,
|
||||
"forks_count": 529,
|
||||
"stargazers_count": 2315,
|
||||
"watchers_count": 2315,
|
||||
"forks_count": 530,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 529,
|
||||
"watchers": 2300,
|
||||
"forks": 530,
|
||||
"watchers": 2315,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3567,12 +3567,12 @@
|
|||
"pushed_at": "2021-12-22T18:22:42Z",
|
||||
"stargazers_count": 222,
|
||||
"watchers_count": 222,
|
||||
"forks_count": 75,
|
||||
"forks_count": 76,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 75,
|
||||
"forks": 76,
|
||||
"watchers": 222,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -3979,17 +3979,17 @@
|
|||
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T11:06:46Z",
|
||||
"updated_at": "2021-12-24T02:03:55Z",
|
||||
"updated_at": "2021-12-24T08:19:15Z",
|
||||
"pushed_at": "2021-12-16T06:53:21Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4377,6 +4377,41 @@
|
|||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437948564,
|
||||
"name": "log4shell_ioc_ips",
|
||||
"full_name": "hackinghippo\/log4shell_ioc_ips",
|
||||
"owner": {
|
||||
"login": "hackinghippo",
|
||||
"id": 96073490,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96073490?v=4",
|
||||
"html_url": "https:\/\/github.com\/hackinghippo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/hackinghippo\/log4shell_ioc_ips",
|
||||
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T16:39:16Z",
|
||||
"updated_at": "2021-12-24T12:00:31Z",
|
||||
"pushed_at": "2021-12-24T12:00:29Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"cve",
|
||||
"cve-2021-44228",
|
||||
"ioc",
|
||||
"list",
|
||||
"log4j",
|
||||
"log4shell",
|
||||
"shell4log"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437948858,
|
||||
"name": "log4j-1.2.15-mod",
|
||||
|
@ -4858,17 +4893,17 @@
|
|||
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T21:39:51Z",
|
||||
"updated_at": "2021-12-23T21:09:08Z",
|
||||
"updated_at": "2021-12-24T08:28:51Z",
|
||||
"pushed_at": "2021-12-21T01:24:46Z",
|
||||
"stargazers_count": 255,
|
||||
"watchers_count": 255,
|
||||
"forks_count": 26,
|
||||
"stargazers_count": 256,
|
||||
"watchers_count": 256,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 26,
|
||||
"watchers": 255,
|
||||
"forks": 27,
|
||||
"watchers": 256,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5402,11 +5437,11 @@
|
|||
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T10:04:42Z",
|
||||
"updated_at": "2021-12-24T00:01:59Z",
|
||||
"updated_at": "2021-12-24T11:58:29Z",
|
||||
"pushed_at": "2021-12-23T22:12:36Z",
|
||||
"stargazers_count": 342,
|
||||
"watchers_count": 342,
|
||||
"forks_count": 63,
|
||||
"stargazers_count": 346,
|
||||
"watchers_count": 346,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -5420,8 +5455,8 @@
|
|||
"python"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 63,
|
||||
"watchers": 342,
|
||||
"forks": 65,
|
||||
"watchers": 346,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5438,17 +5473,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T12:37:23Z",
|
||||
"updated_at": "2021-12-24T05:56:54Z",
|
||||
"updated_at": "2021-12-24T08:20:54Z",
|
||||
"pushed_at": "2021-12-23T15:14:47Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 44,
|
||||
"watchers": 45,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5708,17 +5743,17 @@
|
|||
"description": "Tools for investigating Log4j CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T19:08:14Z",
|
||||
"updated_at": "2021-12-23T21:03:12Z",
|
||||
"updated_at": "2021-12-24T10:51:40Z",
|
||||
"pushed_at": "2021-12-23T21:03:08Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"stargazers_count": 80,
|
||||
"watchers_count": 80,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 79,
|
||||
"watchers": 80,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -5853,8 +5888,8 @@
|
|||
"description": "CVE-2021-44228 Log4J multithreaded Mass Exploitation tool compatible with URL\/IP lists.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T22:19:29Z",
|
||||
"updated_at": "2021-12-23T20:55:16Z",
|
||||
"pushed_at": "2021-12-23T12:47:21Z",
|
||||
"updated_at": "2021-12-24T08:58:53Z",
|
||||
"pushed_at": "2021-12-24T08:58:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
@ -5983,17 +6018,17 @@
|
|||
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-14T23:33:51Z",
|
||||
"updated_at": "2021-12-24T04:03:41Z",
|
||||
"updated_at": "2021-12-24T08:47:17Z",
|
||||
"pushed_at": "2021-12-23T20:16:12Z",
|
||||
"stargazers_count": 237,
|
||||
"watchers_count": 237,
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 57,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 57,
|
||||
"watchers": 237,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6483,17 +6518,17 @@
|
|||
"description": "we are providing DevOps and security teams script to identify cloud workloads that may be vulnerable to the Log4j vulnerability(CVE-2021-44228) in their AWS account. The script enables security teams to identify external-facing AWS assets by running the exploit on them, and thus be able to map them and quickly patch them",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-15T15:42:06Z",
|
||||
"updated_at": "2021-12-21T22:56:53Z",
|
||||
"updated_at": "2021-12-24T09:10:14Z",
|
||||
"pushed_at": "2021-12-17T16:00:03Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -6999,7 +7034,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-16T11:54:11Z",
|
||||
"updated_at": "2021-12-23T18:54:42Z",
|
||||
"pushed_at": "2021-12-23T14:49:04Z",
|
||||
"pushed_at": "2021-12-24T11:32:13Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 1,
|
||||
|
@ -8149,6 +8184,33 @@
|
|||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439698618,
|
||||
"name": "log4shell-docker-lab",
|
||||
"full_name": "axelcurmi\/log4shell-docker-lab",
|
||||
"owner": {
|
||||
"login": "axelcurmi",
|
||||
"id": 23001923,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23001923?v=4",
|
||||
"html_url": "https:\/\/github.com\/axelcurmi"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/axelcurmi\/log4shell-docker-lab",
|
||||
"description": "Log4Shell (CVE-2021-44228) docker lab",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-18T19:30:35Z",
|
||||
"updated_at": "2021-12-24T10:28:50Z",
|
||||
"pushed_at": "2021-12-24T10:28:47Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 439712818,
|
||||
"name": "log4j-2021-vulnerability-study",
|
||||
|
@ -8244,8 +8306,8 @@
|
|||
"description": "Vulnerability analysis, patch management and exploitation tool forCVE-2021-44228 \/ CVE-2021-45046 \/ CVE-2021-4104",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-19T05:13:25Z",
|
||||
"updated_at": "2021-12-19T18:11:23Z",
|
||||
"pushed_at": "2021-12-19T18:11:20Z",
|
||||
"updated_at": "2021-12-24T09:42:14Z",
|
||||
"pushed_at": "2021-12-24T07:00:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
|
@ -8894,11 +8956,11 @@
|
|||
"description": "Ansible detector scanner playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 Remote Code Execution - log4j (CVE-2021-44228)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-21T22:14:24Z",
|
||||
"updated_at": "2021-12-24T03:45:39Z",
|
||||
"updated_at": "2021-12-24T10:57:33Z",
|
||||
"pushed_at": "2021-12-23T22:22:23Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 3,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -8910,8 +8972,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 3,
|
||||
"watchers": 44,
|
||||
"forks": 4,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -8928,8 +8990,8 @@
|
|||
"description": "Log4Shell Demo with AWS",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T03:34:40Z",
|
||||
"updated_at": "2021-12-22T04:05:07Z",
|
||||
"pushed_at": "2021-12-22T03:35:44Z",
|
||||
"updated_at": "2021-12-24T08:56:47Z",
|
||||
"pushed_at": "2021-12-24T08:56:44Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -9051,20 +9113,20 @@
|
|||
},
|
||||
{
|
||||
"id": 440898542,
|
||||
"name": "Log4JChecker",
|
||||
"full_name": "NatteeSetobol\/Log4JChecker",
|
||||
"name": "Log4JPOC",
|
||||
"full_name": "NatteeSetobol\/Log4JPOC",
|
||||
"owner": {
|
||||
"login": "NatteeSetobol",
|
||||
"id": 6789925,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6789925?v=4",
|
||||
"html_url": "https:\/\/github.com\/NatteeSetobol"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JChecker",
|
||||
"description": "Log4JChecker checks for CVE-2021-44228 vulnerability",
|
||||
"html_url": "https:\/\/github.com\/NatteeSetobol\/Log4JPOC",
|
||||
"description": "POC for CVE-2021-44228 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T15:15:12Z",
|
||||
"updated_at": "2021-12-23T01:54:05Z",
|
||||
"pushed_at": "2021-12-23T01:54:02Z",
|
||||
"updated_at": "2021-12-24T10:15:11Z",
|
||||
"pushed_at": "2021-12-24T10:14:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
@ -9208,13 +9270,67 @@
|
|||
"pushed_at": "2021-12-24T02:39:06Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441364313,
|
||||
"name": "log4j-CVE-2021-44228-workaround",
|
||||
"full_name": "grimch\/log4j-CVE-2021-44228-workaround",
|
||||
"owner": {
|
||||
"login": "grimch",
|
||||
"id": 58831200,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58831200?v=4",
|
||||
"html_url": "https:\/\/github.com\/grimch"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/grimch\/log4j-CVE-2021-44228-workaround",
|
||||
"description": "general purpose workaround for the log4j CVE-2021-44228 vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T04:23:17Z",
|
||||
"updated_at": "2021-12-24T06:54:25Z",
|
||||
"pushed_at": "2021-12-24T06:54:22Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441423344,
|
||||
"name": "log4j-shell-csw",
|
||||
"full_name": "cybersecurityworks553\/log4j-shell-csw",
|
||||
"owner": {
|
||||
"login": "cybersecurityworks553",
|
||||
"id": 63910792,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/cybersecurityworks553\/log4j-shell-csw",
|
||||
"description": "A Proof-Of-Concept Exploit for CVE-2021-44228 vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T09:26:38Z",
|
||||
"updated_at": "2021-12-24T10:16:13Z",
|
||||
"pushed_at": "2021-12-24T10:16:10Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-12-22T14:46:21Z",
|
||||
"updated_at": "2021-12-22T21:34:28Z",
|
||||
"updated_at": "2021-12-24T06:56:19Z",
|
||||
"pushed_at": "2021-12-22T21:34:25Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -209,17 +209,44 @@
|
|||
"description": "Log4j 漏洞本地检测脚本。 Scan all java processes on your host to check whether it's affected by log4j2 remote code execution vulnerability (CVE-2021-45046)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-20T12:07:41Z",
|
||||
"updated_at": "2021-12-24T05:45:42Z",
|
||||
"updated_at": "2021-12-24T07:31:24Z",
|
||||
"pushed_at": "2021-12-22T06:24:42Z",
|
||||
"stargazers_count": 68,
|
||||
"watchers_count": 68,
|
||||
"stargazers_count": 70,
|
||||
"watchers_count": 70,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 68,
|
||||
"watchers": 70,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 441418197,
|
||||
"name": "Log4Shell-Sandbox-Signature",
|
||||
"full_name": "CaptanMoss\/Log4Shell-Sandbox-Signature",
|
||||
"owner": {
|
||||
"login": "CaptanMoss",
|
||||
"id": 10811344,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10811344?v=4",
|
||||
"html_url": "https:\/\/github.com\/CaptanMoss"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/CaptanMoss\/Log4Shell-Sandbox-Signature",
|
||||
"description": "Log4Shell(CVE-2021-45046) Sandbox Signature",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-24T09:02:55Z",
|
||||
"updated_at": "2021-12-24T09:31:46Z",
|
||||
"pushed_at": "2021-12-24T09:31:43Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
26
README.md
26
README.md
|
@ -804,7 +804,6 @@ The vSphere Client (HTML5) contains a remote code execution vulnerability due to
|
|||
- [xnianq/cve-2021-21985_exp](https://github.com/xnianq/cve-2021-21985_exp)
|
||||
- [daedalus/CVE-2021-21985](https://github.com/daedalus/CVE-2021-21985)
|
||||
- [testanull/Project_CVE-2021-21985_PoC](https://github.com/testanull/Project_CVE-2021-21985_PoC)
|
||||
- [haiclover/CVE-2021-21985](https://github.com/haiclover/CVE-2021-21985)
|
||||
- [sknux/CVE-2021-21985_PoC](https://github.com/sknux/CVE-2021-21985_PoC)
|
||||
|
||||
### CVE-2021-22005 (2021-09-23)
|
||||
|
@ -1890,7 +1889,6 @@ A remote code execution issue was discovered in the web UI of VoIPmonitor before
|
|||
- [daedalus/CVE-2021-30461](https://github.com/daedalus/CVE-2021-30461)
|
||||
- [Vulnmachines/CVE-2021-30461](https://github.com/Vulnmachines/CVE-2021-30461)
|
||||
- [Al1ex/CVE-2021-30461](https://github.com/Al1ex/CVE-2021-30461)
|
||||
- [puckiestyle/CVE-2021-30461](https://github.com/puckiestyle/CVE-2021-30461)
|
||||
|
||||
### CVE-2021-30481 (2021-04-10)
|
||||
|
||||
|
@ -2328,14 +2326,6 @@ Windows Event Tracing Elevation of Privilege Vulnerability This CVE ID is unique
|
|||
- [KaLendsi/CVE-2021-34486](https://github.com/KaLendsi/CVE-2021-34486)
|
||||
- [b1tg/CVE-2021-34486-exp](https://github.com/b1tg/CVE-2021-34486-exp)
|
||||
|
||||
### CVE-2021-34496 (2021-07-14)
|
||||
|
||||
<code>
|
||||
Windows GDI Information Disclosure Vulnerability
|
||||
</code>
|
||||
|
||||
- [fkm75P8YjLkb/CVE-2021-34496](https://github.com/fkm75P8YjLkb/CVE-2021-34496)
|
||||
|
||||
### CVE-2021-34523 (2021-07-14)
|
||||
|
||||
<code>
|
||||
|
@ -2350,21 +2340,12 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability This CVE ID is un
|
|||
Windows Print Spooler Remote Code Execution Vulnerability
|
||||
</code>
|
||||
|
||||
- [glshnu/PrintNightmare](https://github.com/glshnu/PrintNightmare)
|
||||
- [nemo-wq/PrintNightmare-CVE-2021-34527](https://github.com/nemo-wq/PrintNightmare-CVE-2021-34527)
|
||||
- [byt3bl33d3r/ItWasAllADream](https://github.com/byt3bl33d3r/ItWasAllADream)
|
||||
- [0xirison/PrintNightmare-Patcher](https://github.com/0xirison/PrintNightmare-Patcher)
|
||||
- [Tomparte/PrintNightmare](https://github.com/Tomparte/PrintNightmare)
|
||||
- [Amaranese/CVE-2021-34527](https://github.com/Amaranese/CVE-2021-34527)
|
||||
|
||||
### CVE-2021-34558 (2021-07-15)
|
||||
|
||||
<code>
|
||||
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
|
||||
</code>
|
||||
|
||||
- [alexzorin/cve-2021-34558](https://github.com/alexzorin/cve-2021-34558)
|
||||
|
||||
### CVE-2021-34646 (2021-08-30)
|
||||
|
||||
<code>
|
||||
|
@ -3899,6 +3880,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
|
||||
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
|
||||
- [tobiasoed/log4j-CVE-2021-44228](https://github.com/tobiasoed/log4j-CVE-2021-44228)
|
||||
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
|
||||
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
|
||||
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
|
||||
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
|
||||
|
@ -4032,6 +4014,7 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [shivakumarjayaraman/log4jvulnerability-CVE-2021-44228](https://github.com/shivakumarjayaraman/log4jvulnerability-CVE-2021-44228)
|
||||
- [j3kz/CVE-2021-44228-PoC](https://github.com/j3kz/CVE-2021-44228-PoC)
|
||||
- [Apipia/log4j-pcap-activity](https://github.com/Apipia/log4j-pcap-activity)
|
||||
- [axelcurmi/log4shell-docker-lab](https://github.com/axelcurmi/log4shell-docker-lab)
|
||||
- [otaviokr/log4j-2021-vulnerability-study](https://github.com/otaviokr/log4j-2021-vulnerability-study)
|
||||
- [kkyehit/log4j_CVE-2021-44228](https://github.com/kkyehit/log4j_CVE-2021-44228)
|
||||
- [trickyearlobe/inspec-log4j](https://github.com/trickyearlobe/inspec-log4j)
|
||||
|
@ -4064,12 +4047,14 @@ Apache Log4j2 2.0-beta9 through 2.12.1 and 2.13.0 through 2.15.0 JNDI features u
|
|||
- [ossie-git/log4shell_sentinel](https://github.com/ossie-git/log4shell_sentinel)
|
||||
- [r00thunter/Log4Shell](https://github.com/r00thunter/Log4Shell)
|
||||
- [asyzdykov/cve-2021-44228-fix-jars](https://github.com/asyzdykov/cve-2021-44228-fix-jars)
|
||||
- [NatteeSetobol/Log4JChecker](https://github.com/NatteeSetobol/Log4JChecker)
|
||||
- [NatteeSetobol/Log4JPOC](https://github.com/NatteeSetobol/Log4JPOC)
|
||||
- [BJLIYANLIANG/log4j-scanner](https://github.com/BJLIYANLIANG/log4j-scanner)
|
||||
- [0x3SC4L4T3/Apache-Log4j-POC](https://github.com/0x3SC4L4T3/Apache-Log4j-POC)
|
||||
- [TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit](https://github.com/TaroballzChen/CVE-2021-44228-log4jVulnScanner-metasploit)
|
||||
- [lucab85/ansible-role-log4shell](https://github.com/lucab85/ansible-role-log4shell)
|
||||
- [ainrm/log4j-scan](https://github.com/ainrm/log4j-scan)
|
||||
- [grimch/log4j-CVE-2021-44228-workaround](https://github.com/grimch/log4j-CVE-2021-44228-workaround)
|
||||
- [cybersecurityworks553/log4j-shell-csw](https://github.com/cybersecurityworks553/log4j-shell-csw)
|
||||
|
||||
### CVE-2021-44659 (2021-12-22)
|
||||
|
||||
|
@ -4112,6 +4097,7 @@ It was found that the fix to address CVE-2021-44228 in Apache Log4j 2.15.0 was i
|
|||
- [lukepasek/log4jjndilookupremove](https://github.com/lukepasek/log4jjndilookupremove)
|
||||
- [ludy-dev/cve-2021-45046](https://github.com/ludy-dev/cve-2021-45046)
|
||||
- [lijiejie/log4j2_vul_local_scanner](https://github.com/lijiejie/log4j2_vul_local_scanner)
|
||||
- [CaptanMoss/Log4Shell-Sandbox-Signature](https://github.com/CaptanMoss/Log4Shell-Sandbox-Signature)
|
||||
|
||||
### CVE-2021-45105 (2021-12-18)
|
||||
|
||||
|
|
Loading…
Reference in a new issue