Auto Update 2022/08/13 12:16:30

This commit is contained in:
motikan2010-bot 2022-08-13 21:16:30 +09:00
parent 6742937387
commit 4be5271a72
39 changed files with 174 additions and 174 deletions

View file

@ -219,10 +219,10 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2022-08-09T05:55:40Z",
"updated_at": "2022-08-13T09:36:00Z",
"pushed_at": "2022-03-16T12:08:54Z",
"stargazers_count": 414,
"watchers_count": 414,
"stargazers_count": 415,
"watchers_count": 415,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
@ -230,7 +230,7 @@
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 414,
"watchers": 415,
"score": 0
},
{
@ -307,18 +307,18 @@
"description": "Scan vuls kernel CVE-2016-5195 - DirtyCow",
"fork": false,
"created_at": "2016-10-29T08:45:45Z",
"updated_at": "2022-06-11T11:28:20Z",
"updated_at": "2022-08-13T07:54:38Z",
"pushed_at": "2016-10-29T08:50:34Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 13,
"forks": 16,
"watchers": 14,
"score": 0
},
{
@ -419,11 +419,11 @@
"description": "Dirty Cow exploit - CVE-2016-5195",
"fork": false,
"created_at": "2016-11-25T21:08:01Z",
"updated_at": "2022-08-11T13:35:58Z",
"updated_at": "2022-08-13T08:11:05Z",
"pushed_at": "2021-04-08T11:35:12Z",
"stargazers_count": 627,
"watchers_count": 627,
"forks_count": 400,
"forks_count": 401,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -433,7 +433,7 @@
"exploit"
],
"visibility": "public",
"forks": 400,
"forks": 401,
"watchers": 627,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2016-7608: Buffer overflow in IOFireWireFamily.",
"fork": false,
"created_at": "2017-08-19T20:49:26Z",
"updated_at": "2021-08-05T02:13:12Z",
"updated_at": "2022-08-13T08:24:55Z",
"pushed_at": "2017-08-19T21:17:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"watchers": 2,
"score": 0
}
]

View file

@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-07-31T02:45:52Z",
"updated_at": "2022-08-13T09:47:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
@ -455,7 +455,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 352,
"watchers": 353,
"score": 0
},
{

View file

@ -41,7 +41,7 @@
"description": "CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0 ",
"fork": false,
"created_at": "2017-11-19T16:50:39Z",
"updated_at": "2022-08-10T04:46:43Z",
"updated_at": "2022-08-13T09:00:49Z",
"pushed_at": "2022-03-07T20:04:08Z",
"stargazers_count": 40,
"watchers_count": 40,

View file

@ -13,10 +13,10 @@
"description": "PoC code for CVE-2018-16711 (exploit by wrmsr)",
"fork": false,
"created_at": "2018-09-18T22:18:32Z",
"updated_at": "2021-07-20T21:00:48Z",
"updated_at": "2022-08-13T08:25:26Z",
"pushed_at": "2018-09-25T12:15:50Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC code for CVE-2018-16713 (exploit by rdmsr)",
"fork": false,
"created_at": "2018-09-14T14:10:22Z",
"updated_at": "2021-07-20T21:00:49Z",
"updated_at": "2022-08-13T08:25:26Z",
"pushed_at": "2018-09-25T12:15:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC Code for CVE-2018-18026 (exploit by stack overflow)",
"fork": false,
"created_at": "2018-10-18T16:51:26Z",
"updated_at": "2021-07-20T21:00:53Z",
"updated_at": "2022-08-13T08:25:28Z",
"pushed_at": "2018-11-07T04:00:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC Code for CVE-2018-18714 (exploit by stack overflow)",
"fork": false,
"created_at": "2018-11-01T20:31:50Z",
"updated_at": "2022-04-25T02:36:26Z",
"updated_at": "2022-08-13T08:25:29Z",
"pushed_at": "2018-11-09T21:08:46Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 0,
"watchers": 6,
"watchers": 5,
"score": 0
}
]

View file

@ -102,10 +102,10 @@
"description": "CVE-2019-0708-exploit",
"fork": false,
"created_at": "2019-05-15T02:24:21Z",
"updated_at": "2022-07-20T03:16:02Z",
"updated_at": "2022-08-13T08:25:39Z",
"pushed_at": "2019-05-15T02:26:46Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
@ -113,7 +113,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 120,
"watchers": 119,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T06:32:07Z",
"updated_at": "2022-08-13T07:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3479,
"watchers_count": 3479,
"stargazers_count": 3480,
"watchers_count": 3480,
"forks_count": 1025,
"allow_forking": true,
"is_template": false,
@ -72,7 +72,7 @@
],
"visibility": "public",
"forks": 1025,
"watchers": 3479,
"watchers": 3480,
"score": 0
},
{

View file

@ -158,10 +158,10 @@
"description": "CVE-2019-17564Apache Dubbo反序列化漏洞",
"fork": false,
"created_at": "2020-02-24T07:46:36Z",
"updated_at": "2021-12-15T14:38:25Z",
"updated_at": "2022-08-13T08:17:13Z",
"pushed_at": "2020-02-24T07:54:05Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -169,7 +169,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Apache Log4j 1.2.X存在反序列化远程代码执行漏洞",
"fork": false,
"created_at": "2019-12-25T16:46:11Z",
"updated_at": "2022-06-16T12:05:42Z",
"updated_at": "2022-08-13T08:15:00Z",
"pushed_at": "2019-12-25T16:48:41Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 75,
"watchers": 76,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-07-31T02:45:52Z",
"updated_at": "2022-08-13T09:47:13Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 352,
"watchers_count": 352,
"stargazers_count": 353,
"watchers_count": 353,
"forks_count": 115,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 352,
"watchers": 353,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exploiting a patched vulnerability in JavaScriptCore",
"fork": false,
"created_at": "2020-01-02T00:12:22Z",
"updated_at": "2022-07-20T14:57:51Z",
"updated_at": "2022-08-13T08:38:46Z",
"pushed_at": "2020-01-02T00:13:22Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0014-Toast-复现",
"fork": false,
"created_at": "2020-09-04T09:02:29Z",
"updated_at": "2020-11-25T07:28:27Z",
"updated_at": "2022-08-13T09:38:09Z",
"pushed_at": "2020-09-07T06:34:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-08-12T06:32:07Z",
"updated_at": "2022-08-13T07:32:07Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3479,
"watchers_count": 3479,
"stargazers_count": 3480,
"watchers_count": 3480,
"forks_count": 1025,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 1025,
"watchers": 3479,
"watchers": 3480,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "Todos los materiales necesarios para la PoC en Chrome y ftview",
"fork": false,
"created_at": "2020-12-30T19:58:33Z",
"updated_at": "2021-07-20T20:36:40Z",
"updated_at": "2022-08-13T08:25:57Z",
"pushed_at": "2021-01-04T15:01:14Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 1,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-16012, a timing side channel in drawImage in Firefox & Chrome",
"fork": false,
"created_at": "2020-11-14T21:32:15Z",
"updated_at": "2021-07-20T20:36:42Z",
"updated_at": "2022-08-13T08:25:56Z",
"pushed_at": "2021-01-11T17:57:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 9,
"watchers": 8,
"score": 0
}
]

View file

@ -102,10 +102,10 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2022-08-09T05:55:44Z",
"updated_at": "2022-08-13T08:10:31Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 416,
"watchers_count": 416,
"stargazers_count": 417,
"watchers_count": 417,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
@ -113,7 +113,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 416,
"watchers": 417,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-08-11T19:25:52Z",
"updated_at": "2022-08-13T07:31:18Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1592,
"watchers_count": 1592,
"stargazers_count": 1593,
"watchers_count": 1593,
"forks_count": 572,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 572,
"watchers": 1592,
"watchers": 1593,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "CVE-2021-22986 F5 BIG-IP iControl 命令执行漏洞",
"fork": false,
"created_at": "2021-03-21T07:40:51Z",
"updated_at": "2021-07-20T20:19:13Z",
"updated_at": "2022-08-13T08:25:58Z",
"pushed_at": "2021-03-21T07:40:59Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 4,
"score": 0
},
{

View file

@ -1249,10 +1249,10 @@
"description": "Python exploit code for CVE-2021-4034 (pwnkit)",
"fork": false,
"created_at": "2022-01-26T17:53:16Z",
"updated_at": "2022-08-01T14:37:07Z",
"updated_at": "2022-08-13T08:35:38Z",
"pushed_at": "2022-01-28T00:29:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
@ -1260,7 +1260,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 73,
"watchers": 74,
"score": 0
},
{

View file

@ -13,7 +13,7 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-08-05T14:42:15Z",
"updated_at": "2022-08-13T07:55:20Z",
"pushed_at": "2022-07-10T22:23:13Z",
"stargazers_count": 829,
"watchers_count": 829,
@ -46,10 +46,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-08-05T21:36:47Z",
"updated_at": "2022-08-13T09:49:58Z",
"pushed_at": "2022-04-25T07:53:41Z",
"stargazers_count": 376,
"watchers_count": 376,
"stargazers_count": 377,
"watchers_count": 377,
"forks_count": 76,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 76,
"watchers": 376,
"watchers": 377,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-08-08T06:20:54Z",
"updated_at": "2022-08-13T09:50:13Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 1128,
"watchers_count": 1128,
"stargazers_count": 1129,
"watchers_count": 1129,
"forks_count": 295,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 295,
"watchers": 1128,
"watchers": 1129,
"score": 0
},
{

View file

@ -250,10 +250,10 @@
"description": "Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).",
"fork": false,
"created_at": "2021-12-10T12:38:20Z",
"updated_at": "2022-08-07T14:46:38Z",
"updated_at": "2022-08-13T11:01:33Z",
"pushed_at": "2022-08-02T13:18:24Z",
"stargazers_count": 1001,
"watchers_count": 1001,
"stargazers_count": 1000,
"watchers_count": 1000,
"forks_count": 447,
"allow_forking": true,
"is_template": false,
@ -263,7 +263,7 @@
],
"visibility": "public",
"forks": 447,
"watchers": 1001,
"watchers": 1000,
"score": 0
},
{
@ -4192,10 +4192,10 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2022-07-26T11:23:19Z",
"updated_at": "2022-08-13T12:16:57Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -4203,7 +4203,7 @@
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 63,
"watchers": 64,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "log4j2 dos exploit,CVE-2021-45105 exploit,Denial of Service poc",
"fork": false,
"created_at": "2021-12-20T10:52:20Z",
"updated_at": "2022-03-30T10:13:10Z",
"updated_at": "2022-08-13T07:08:57Z",
"pushed_at": "2021-12-22T02:37:35Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -111,7 +111,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 3,
"score": 0
},
{

View file

@ -69,10 +69,10 @@
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-08-03T17:35:33Z",
"updated_at": "2022-08-13T08:05:58Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 82,
"watchers_count": 82,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 81,
"watchers": 82,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-08-03T08:39:29Z",
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 133,
"forks_count": 134,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 133,
"forks": 134,
"watchers": 310,
"score": 0
}

View file

@ -13,18 +13,18 @@
"description": "POC of CVE-2022-21881 exploited at TianfuCup 2021 to escape Chrome Sandbox",
"fork": false,
"created_at": "2022-08-09T14:16:40Z",
"updated_at": "2022-08-13T05:36:14Z",
"updated_at": "2022-08-13T09:34:44Z",
"pushed_at": "2022-08-09T14:28:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"forks": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -687,10 +687,10 @@
"description": "CVE-2022-22947_EXP,CVE-2022-22947_RCE,CVE-2022-22947反弹shell,CVE-2022-22947 getshell",
"fork": false,
"created_at": "2022-03-08T09:32:36Z",
"updated_at": "2022-08-08T19:48:33Z",
"updated_at": "2022-08-13T07:14:35Z",
"pushed_at": "2022-03-08T09:36:31Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
@ -698,7 +698,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -855,10 +855,10 @@
"description": "spring-cloud-gateway-rce CVE-2022-22947",
"fork": false,
"created_at": "2022-03-13T10:00:21Z",
"updated_at": "2022-04-08T02:40:09Z",
"updated_at": "2022-08-13T10:10:14Z",
"pushed_at": "2022-07-13T02:38:10Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -866,7 +866,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 7,
"watchers": 8,
"score": 0
},
{

View file

@ -122,10 +122,10 @@
"description": "Dockerized Spring4Shell (CVE-2022-22965) PoC application and exploit",
"fork": false,
"created_at": "2022-03-31T00:24:28Z",
"updated_at": "2022-08-10T12:41:18Z",
"updated_at": "2022-08-13T12:15:07Z",
"pushed_at": "2022-08-04T18:26:18Z",
"stargazers_count": 263,
"watchers_count": 263,
"stargazers_count": 264,
"watchers_count": 264,
"forks_count": 206,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
"topics": [],
"visibility": "public",
"forks": 206,
"watchers": 263,
"watchers": 264,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "exploit for CVE-2022-2588",
"fork": false,
"created_at": "2022-08-11T06:01:24Z",
"updated_at": "2022-08-12T13:18:17Z",
"updated_at": "2022-08-13T11:57:03Z",
"pushed_at": "2022-08-11T06:04:18Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 20,
"watchers": 22,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-08-12T17:40:46Z",
"updated_at": "2022-08-13T12:15:27Z",
"pushed_at": "2022-08-11T09:35:18Z",
"stargazers_count": 638,
"watchers_count": 638,
"stargazers_count": 640,
"watchers_count": 640,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 121,
"watchers": 638,
"watchers": 640,
"score": 0
},
{

View file

@ -325,10 +325,10 @@
"description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ",
"fork": false,
"created_at": "2022-05-20T14:26:38Z",
"updated_at": "2022-08-12T21:22:50Z",
"updated_at": "2022-08-13T07:47:53Z",
"pushed_at": "2022-08-02T19:06:30Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -343,7 +343,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 22,
"watchers": 23,
"score": 0
},
{
@ -640,10 +640,10 @@
"description": "警惕 一种针对红队的新型溯源手段!",
"fork": false,
"created_at": "2022-07-27T15:48:19Z",
"updated_at": "2022-08-12T07:43:34Z",
"updated_at": "2022-08-13T09:06:26Z",
"pushed_at": "2022-07-27T15:55:01Z",
"stargazers_count": 289,
"watchers_count": 289,
"stargazers_count": 290,
"watchers_count": 290,
"forks_count": 64,
"allow_forking": true,
"is_template": false,
@ -651,7 +651,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 289,
"watchers": 290,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Zimbra RCE simple poc",
"fork": false,
"created_at": "2022-08-12T18:35:52Z",
"updated_at": "2022-08-13T04:29:15Z",
"updated_at": "2022-08-13T11:20:12Z",
"pushed_at": "2022-08-12T18:37:57Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 3,
"score": 0
}
]

View file

@ -47,11 +47,11 @@
"description": "Exploit for PrestaShop bockwishlist module 2.1.0 SQLi (CVE-2022-31101)",
"fork": false,
"created_at": "2022-08-09T10:29:48Z",
"updated_at": "2022-08-11T15:58:40Z",
"updated_at": "2022-08-13T11:20:52Z",
"pushed_at": "2022-08-09T14:55:35Z",
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 3,
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -62,8 +62,8 @@
"prestashop"
],
"visibility": "public",
"forks": 3,
"watchers": 12,
"forks": 4,
"watchers": 13,
"score": 0
}
]

View file

@ -69,10 +69,10 @@
"description": "CVE",
"fork": false,
"created_at": "2022-08-10T03:21:19Z",
"updated_at": "2022-08-13T05:52:00Z",
"updated_at": "2022-08-13T09:36:08Z",
"pushed_at": "2022-08-10T03:25:06Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -80,7 +80,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 22,
"watchers": 23,
"score": 0
}
]

View file

@ -154,7 +154,7 @@
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-08-12T18:49:57Z",
"pushed_at": "2022-08-05T14:46:52Z",
"pushed_at": "2022-08-13T08:14:07Z",
"stargazers_count": 131,
"watchers_count": 131,
"forks_count": 22,

View file

@ -13,10 +13,10 @@
"description": "A Python script to exploit CVE-2022-36446 Software Package Updates RCE (Authenticated) on Webmin < 1.997.",
"fork": false,
"created_at": "2022-08-11T11:47:17Z",
"updated_at": "2022-08-13T05:16:43Z",
"updated_at": "2022-08-13T11:14:49Z",
"pushed_at": "2022-08-11T19:25:11Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 8,
"watchers": 17,
"watchers": 18,
"score": 0
}
]