Auto Update 2023/11/25 00:31:56

This commit is contained in:
motikan2010-bot 2023-11-25 09:31:56 +09:00
parent 9a6002151e
commit 53b66badd4
182 changed files with 1118 additions and 1091 deletions

View file

@ -13,10 +13,10 @@
"description": "Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.",
"fork": false,
"created_at": "2022-09-20T17:03:57Z",
"updated_at": "2023-09-28T11:42:53Z",
"updated_at": "2023-11-24T20:28:33Z",
"pushed_at": "2022-09-23T08:24:16Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 84,
"watchers": 83,
"score": 0,
"subscribers_count": 9
},

View file

@ -344,5 +344,35 @@
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 723160395,
"name": "vsftpd-exploit",
"full_name": "chleba124\/vsftpd-exploit",
"owner": {
"login": "chleba124",
"id": 121700816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121700816?v=4",
"html_url": "https:\/\/github.com\/chleba124"
},
"html_url": "https:\/\/github.com\/chleba124\/vsftpd-exploit",
"description": "A tool that exploits the CVE-2011-2523 vulnerability.",
"fork": false,
"created_at": "2023-11-24T21:09:00Z",
"updated_at": "2023-11-24T21:19:00Z",
"pushed_at": "2023-11-24T21:42:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2023-11-07T05:04:12Z",
"updated_at": "2023-11-24T19:23:04Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 332,
"watchers": 331,
"score": 0,
"subscribers_count": 48
}

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2023-11-07T05:04:12Z",
"updated_at": "2023-11-24T19:23:04Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 123,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 123,
"watchers": 332,
"watchers": 331,
"score": 0,
"subscribers_count": 48
}

View file

@ -13,10 +13,10 @@
"description": "Use CVE-2016-3308 corrupt win32k desktop heap",
"fork": false,
"created_at": "2016-09-18T03:48:53Z",
"updated_at": "2023-09-28T10:36:20Z",
"updated_at": "2023-11-24T19:24:45Z",
"pushed_at": "2016-09-18T05:48:27Z",
"stargazers_count": 51,
"watchers_count": 51,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 51,
"watchers": 50,
"score": 0,
"subscribers_count": 3
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2023-11-19T20:23:09Z",
"updated_at": "2023-11-24T19:25:30Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 936,
"watchers_count": 936,
"stargazers_count": 935,
"watchers_count": 935,
"has_discussions": false,
"forks_count": 403,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 403,
"watchers": 936,
"watchers": 935,
"score": 0,
"subscribers_count": 65
},
@ -601,10 +601,10 @@
"description": "CVE-2016-5195 (Dirty COW) PoC for Android 6.0.1 Marshmallow",
"fork": false,
"created_at": "2017-01-20T05:28:04Z",
"updated_at": "2023-11-18T13:36:47Z",
"updated_at": "2023-11-24T19:27:41Z",
"pushed_at": "2017-01-27T10:04:07Z",
"stargazers_count": 260,
"watchers_count": 260,
"stargazers_count": 258,
"watchers_count": 258,
"has_discussions": false,
"forks_count": 105,
"allow_forking": true,
@ -613,7 +613,7 @@
"topics": [],
"visibility": "public",
"forks": 105,
"watchers": 260,
"watchers": 258,
"score": 0,
"subscribers_count": 23
},

View file

@ -43,10 +43,10 @@
"description": "Proof of Concept code for CVE-2016-5696",
"fork": false,
"created_at": "2016-08-21T00:17:20Z",
"updated_at": "2023-10-23T11:16:52Z",
"updated_at": "2023-11-24T19:24:08Z",
"pushed_at": "2016-08-24T07:56:39Z",
"stargazers_count": 100,
"watchers_count": 100,
"stargazers_count": 99,
"watchers_count": 99,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 100,
"watchers": 99,
"score": 0,
"subscribers_count": 7
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept exploit for Edge bugs (CVE-2016-7200 & CVE-2016-7201)",
"fork": false,
"created_at": "2017-01-04T23:41:27Z",
"updated_at": "2023-09-28T10:38:23Z",
"updated_at": "2023-11-24T19:27:18Z",
"pushed_at": "2017-01-04T23:42:46Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 137,
"watchers_count": 137,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 138,
"watchers": 137,
"score": 0,
"subscribers_count": 17
}

View file

@ -13,10 +13,10 @@
"description": "Blueborne CVE-2017-0785 Android information leak vulnerability",
"fork": false,
"created_at": "2017-09-20T23:32:29Z",
"updated_at": "2023-11-05T09:54:10Z",
"updated_at": "2023-11-24T19:34:12Z",
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 455,
"watchers_count": 455,
"stargazers_count": 454,
"watchers_count": 454,
"has_discussions": false,
"forks_count": 200,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 200,
"watchers": 455,
"watchers": 454,
"score": 0,
"subscribers_count": 46
},

View file

@ -73,10 +73,10 @@
"description": "CVE-2017-11882 from https:\/\/github.com\/embedi\/CVE-2017-11882",
"fork": false,
"created_at": "2017-11-21T05:55:53Z",
"updated_at": "2023-11-16T07:35:41Z",
"updated_at": "2023-11-24T19:35:35Z",
"pushed_at": "2017-11-29T03:33:53Z",
"stargazers_count": 537,
"watchers_count": 537,
"stargazers_count": 535,
"watchers_count": 535,
"has_discussions": false,
"forks_count": 264,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 264,
"watchers": 537,
"watchers": 535,
"score": 0,
"subscribers_count": 28
},

View file

@ -13,10 +13,10 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false,
"created_at": "2017-10-05T23:41:52Z",
"updated_at": "2023-11-19T14:15:20Z",
"updated_at": "2023-11-24T19:34:32Z",
"pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 378,
"watchers_count": 378,
"stargazers_count": 377,
"watchers_count": 377,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 140,
"watchers": 378,
"watchers": 377,
"score": 0,
"subscribers_count": 14
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2017-3881 Cisco Catalyst Remote Code Execution PoC",
"fork": false,
"created_at": "2017-04-10T03:44:04Z",
"updated_at": "2023-09-28T10:40:34Z",
"updated_at": "2023-11-24T19:29:57Z",
"pushed_at": "2017-04-12T09:17:27Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 89,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 89,
"watchers": 197,
"watchers": 196,
"score": 0,
"subscribers_count": 14
},

View file

@ -415,10 +415,10 @@
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2023-11-15T14:24:47Z",
"updated_at": "2023-11-24T19:29:08Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 417,
"watchers_count": 417,
"stargazers_count": 416,
"watchers_count": 416,
"has_discussions": false,
"forks_count": 151,
"allow_forking": true,
@ -433,7 +433,7 @@
],
"visibility": "public",
"forks": 151,
"watchers": 417,
"watchers": 416,
"score": 0,
"subscribers_count": 21
},

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept exploit for CVE-2017-7494(Samba RCE from a writable share)",
"fork": false,
"created_at": "2017-05-25T13:20:56Z",
"updated_at": "2023-09-28T10:41:42Z",
"updated_at": "2023-11-24T19:31:11Z",
"pushed_at": "2017-07-26T13:07:51Z",
"stargazers_count": 180,
"watchers_count": 180,
"stargazers_count": 179,
"watchers_count": 179,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 180,
"watchers": 179,
"score": 0,
"subscribers_count": 11
},
@ -169,10 +169,10 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2023-10-09T07:14:46Z",
"updated_at": "2023-11-24T19:31:29Z",
"pushed_at": "2021-03-09T09:12:55Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 88,
"allow_forking": true,
@ -181,7 +181,7 @@
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 258,
"watchers": 257,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Running CVE-2017-8759 exploit sample.",
"fork": false,
"created_at": "2017-09-13T09:50:04Z",
"updated_at": "2023-09-28T10:44:23Z",
"updated_at": "2023-11-24T19:34:00Z",
"pushed_at": "2020-01-23T06:53:00Z",
"stargazers_count": 258,
"watchers_count": 258,
"stargazers_count": 257,
"watchers_count": 257,
"has_discussions": false,
"forks_count": 112,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 112,
"watchers": 258,
"watchers": 257,
"score": 0,
"subscribers_count": 13
},
@ -198,10 +198,10 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2023-09-28T10:44:25Z",
"updated_at": "2023-11-24T19:34:02Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 318,
"watchers_count": 318,
"stargazers_count": 317,
"watchers_count": 317,
"has_discussions": false,
"forks_count": 127,
"allow_forking": true,
@ -210,7 +210,7 @@
"topics": [],
"visibility": "public",
"forks": 127,
"watchers": 318,
"watchers": 317,
"score": 0,
"subscribers_count": 24
},

View file

@ -75,10 +75,10 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2023-09-28T10:44:18Z",
"updated_at": "2023-11-24T19:33:54Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 248,
"watchers_count": 248,
"stargazers_count": 247,
"watchers_count": 247,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -89,7 +89,7 @@
],
"visibility": "public",
"forks": 78,
"watchers": 248,
"watchers": 247,
"score": 0,
"subscribers_count": 17
},

View file

@ -43,10 +43,10 @@
"description": "Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.",
"fork": false,
"created_at": "2018-06-21T15:44:29Z",
"updated_at": "2023-10-26T12:52:23Z",
"updated_at": "2023-11-24T19:40:57Z",
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 200,
"watchers_count": 200,
"stargazers_count": 199,
"watchers_count": 199,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 200,
"watchers": 199,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "A code demonstrating CVE-2018-0886",
"fork": false,
"created_at": "2018-04-02T12:52:07Z",
"updated_at": "2023-10-09T18:47:33Z",
"updated_at": "2023-11-24T19:38:47Z",
"pushed_at": "2020-08-14T16:33:44Z",
"stargazers_count": 262,
"watchers_count": 262,
"stargazers_count": 261,
"watchers_count": 261,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 262,
"watchers": 261,
"score": 0,
"subscribers_count": 18
}

View file

@ -13,10 +13,10 @@
"description": "Test utility for cve-2018-1002105",
"fork": false,
"created_at": "2018-12-05T02:51:43Z",
"updated_at": "2023-09-28T10:56:19Z",
"updated_at": "2023-11-24T19:45:39Z",
"pushed_at": "2018-12-13T16:56:28Z",
"stargazers_count": 197,
"watchers_count": 197,
"stargazers_count": 196,
"watchers_count": 196,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 197,
"watchers": 196,
"score": 0,
"subscribers_count": 44
},
@ -43,10 +43,10 @@
"description": "PoC for CVE-2018-1002105.",
"fork": false,
"created_at": "2018-12-06T11:28:02Z",
"updated_at": "2023-11-03T00:12:57Z",
"updated_at": "2023-11-24T19:45:41Z",
"pushed_at": "2018-12-21T14:34:04Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 223,
"watchers": 222,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-10933 very simple POC",
"fork": false,
"created_at": "2018-10-17T09:01:44Z",
"updated_at": "2023-09-28T10:54:53Z",
"updated_at": "2023-11-24T19:44:06Z",
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 128,
"watchers_count": 128,
"stargazers_count": 127,
"watchers_count": 127,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 128,
"watchers": 127,
"score": 0,
"subscribers_count": 11
},
@ -43,10 +43,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2023-11-17T06:38:57Z",
"updated_at": "2023-11-24T19:44:07Z",
"pushed_at": "2023-02-20T02:06:22Z",
"stargazers_count": 494,
"watchers_count": 494,
"stargazers_count": 493,
"watchers_count": 493,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 122,
"watchers": 494,
"watchers": 493,
"score": 0,
"subscribers_count": 22
},
@ -133,10 +133,10 @@
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
"fork": false,
"created_at": "2018-10-17T23:05:10Z",
"updated_at": "2023-10-08T20:54:05Z",
"updated_at": "2023-11-24T19:44:08Z",
"pushed_at": "2018-11-04T17:29:33Z",
"stargazers_count": 231,
"watchers_count": 231,
"stargazers_count": 230,
"watchers_count": 230,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 231,
"watchers": 230,
"score": 0,
"subscribers_count": 18
},

View file

@ -83,10 +83,10 @@
"description": "Working Python test and PoC for CVE-2018-11776, includes Docker lab",
"fork": false,
"created_at": "2018-08-24T11:53:02Z",
"updated_at": "2023-09-28T10:53:27Z",
"updated_at": "2023-11-24T19:42:40Z",
"pushed_at": "2018-08-25T02:14:49Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -101,7 +101,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 125,
"watchers": 124,
"score": 0,
"subscribers_count": 12
},
@ -119,10 +119,10 @@
"description": " An exploit for Apache Struts CVE-2018-11776",
"fork": false,
"created_at": "2018-08-25T01:53:30Z",
"updated_at": "2023-09-28T10:53:28Z",
"updated_at": "2023-11-24T19:42:41Z",
"pushed_at": "2018-08-26T02:31:39Z",
"stargazers_count": 300,
"watchers_count": 300,
"stargazers_count": 299,
"watchers_count": 299,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -138,7 +138,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 300,
"watchers": 299,
"score": 0,
"subscribers_count": 23
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-13379",
"fork": false,
"created_at": "2019-08-11T09:44:37Z",
"updated_at": "2023-09-28T11:05:01Z",
"updated_at": "2023-11-24T19:53:23Z",
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 249,
"watchers_count": 249,
"stargazers_count": 248,
"watchers_count": 248,
"has_discussions": false,
"forks_count": 88,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 249,
"watchers": 248,
"score": 0,
"subscribers_count": 11
},

View file

@ -13,10 +13,10 @@
"description": "PoC for Foxit Reader CVE-2018-14442",
"fork": false,
"created_at": "2018-12-28T08:29:28Z",
"updated_at": "2023-09-28T10:56:58Z",
"updated_at": "2023-11-24T19:46:14Z",
"pushed_at": "2018-12-28T09:46:29Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 59,
"watchers": 58,
"score": 0,
"subscribers_count": 7
},

View file

@ -89,10 +89,10 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2023-11-17T06:41:33Z",
"updated_at": "2023-11-24T19:42:32Z",
"pushed_at": "2021-11-08T02:19:03Z",
"stargazers_count": 511,
"watchers_count": 511,
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 189,
"allow_forking": true,
@ -101,7 +101,7 @@
"topics": [],
"visibility": "public",
"forks": 189,
"watchers": 511,
"watchers": 510,
"score": 0,
"subscribers_count": 20
},

View file

@ -587,10 +587,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -620,7 +620,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script",
"fork": false,
"created_at": "2018-07-20T03:59:18Z",
"updated_at": "2023-09-28T10:52:26Z",
"updated_at": "2023-11-24T19:41:39Z",
"pushed_at": "2018-07-20T12:46:50Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 134,
"watchers": 133,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2023-11-15T08:03:19Z",
"updated_at": "2023-11-24T19:57:27Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 631,
"watchers_count": 631,
"stargazers_count": 630,
"watchers_count": 630,
"has_discussions": false,
"forks_count": 135,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 135,
"watchers": 631,
"watchers": 630,
"score": 0,
"subscribers_count": 17
},

View file

@ -43,10 +43,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2023-11-22T12:43:54Z",
"updated_at": "2023-11-24T19:38:43Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 345,
"watchers_count": 345,
"has_discussions": false,
"forks_count": 117,
"allow_forking": true,
@ -62,7 +62,7 @@
],
"visibility": "public",
"forks": 117,
"watchers": 346,
"watchers": 345,
"score": 0,
"subscribers_count": 77
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2018-8581 | Microsoft Exchange Server Elevation of Privilege Vulnerability",
"fork": false,
"created_at": "2018-12-27T06:30:32Z",
"updated_at": "2023-11-22T07:53:39Z",
"updated_at": "2023-11-24T19:46:13Z",
"pushed_at": "2018-12-30T11:53:08Z",
"stargazers_count": 332,
"watchers_count": 332,
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 332,
"watchers": 331,
"score": 0,
"subscribers_count": 7
},
@ -73,10 +73,10 @@
"description": "CVE-2018-8581",
"fork": false,
"created_at": "2019-01-24T06:08:23Z",
"updated_at": "2023-09-28T10:57:49Z",
"updated_at": "2023-11-24T19:47:00Z",
"pushed_at": "2022-10-21T08:29:33Z",
"stargazers_count": 366,
"watchers_count": 366,
"stargazers_count": 365,
"watchers_count": 365,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 366,
"watchers": 365,
"score": 0,
"subscribers_count": 10
}

View file

@ -13,10 +13,10 @@
"description": "Implements the POP\/MOV SS (CVE-2018-8897) vulnerability by bugchecking the machine (local DoS). ",
"fork": false,
"created_at": "2018-05-10T20:46:30Z",
"updated_at": "2023-01-13T06:15:54Z",
"updated_at": "2023-11-24T19:39:50Z",
"pushed_at": "2018-05-10T20:47:59Z",
"stargazers_count": 74,
"watchers_count": 74,
"stargazers_count": 73,
"watchers_count": 73,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 74,
"watchers": 73,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "(CVE-2018-9995) Get DVR Credentials",
"fork": false,
"created_at": "2018-04-29T20:00:06Z",
"updated_at": "2023-11-17T18:10:38Z",
"updated_at": "2023-11-24T19:39:34Z",
"pushed_at": "2019-01-23T14:27:21Z",
"stargazers_count": 511,
"watchers_count": 511,
"stargazers_count": 510,
"watchers_count": 510,
"has_discussions": false,
"forks_count": 202,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 202,
"watchers": 511,
"watchers": 510,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "RCE on Apache Solr using deserialization of untrusted data via jmx.serviceUrl",
"fork": false,
"created_at": "2019-03-10T11:35:26Z",
"updated_at": "2023-09-28T10:59:14Z",
"updated_at": "2023-11-24T19:48:28Z",
"pushed_at": "2019-03-10T18:33:43Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 61,
"watchers": 212,
"watchers": 211,
"score": 0,
"subscribers_count": 8
},

View file

@ -408,10 +408,10 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2023-11-22T10:32:49Z",
"updated_at": "2023-11-24T19:50:44Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 384,
"watchers_count": 384,
"stargazers_count": 383,
"watchers_count": 383,
"has_discussions": false,
"forks_count": 196,
"allow_forking": true,
@ -431,7 +431,7 @@
],
"visibility": "public",
"forks": 196,
"watchers": 384,
"watchers": 383,
"score": 0,
"subscribers_count": 16
},
@ -1171,10 +1171,10 @@
"description": "dump",
"fork": false,
"created_at": "2019-05-21T06:57:19Z",
"updated_at": "2023-11-10T06:30:47Z",
"updated_at": "2023-11-24T19:50:54Z",
"pushed_at": "2019-06-01T05:15:11Z",
"stargazers_count": 490,
"watchers_count": 490,
"stargazers_count": 489,
"watchers_count": 489,
"has_discussions": false,
"forks_count": 188,
"allow_forking": true,
@ -1183,7 +1183,7 @@
"topics": [],
"visibility": "public",
"forks": 188,
"watchers": 490,
"watchers": 489,
"score": 0,
"subscribers_count": 34
},
@ -1566,10 +1566,10 @@
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
"fork": false,
"created_at": "2019-05-23T22:50:12Z",
"updated_at": "2023-11-17T21:31:40Z",
"updated_at": "2023-11-24T19:50:59Z",
"pushed_at": "2019-06-22T21:48:45Z",
"stargazers_count": 883,
"watchers_count": 883,
"stargazers_count": 882,
"watchers_count": 882,
"has_discussions": false,
"forks_count": 293,
"allow_forking": true,
@ -1578,7 +1578,7 @@
"topics": [],
"visibility": "public",
"forks": 293,
"watchers": 883,
"watchers": 882,
"score": 0,
"subscribers_count": 55
},
@ -1691,10 +1691,10 @@
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
"fork": false,
"created_at": "2019-05-28T02:25:21Z",
"updated_at": "2023-10-26T11:23:07Z",
"updated_at": "2023-11-24T19:51:07Z",
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 43,
"allow_forking": true,
@ -1703,7 +1703,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 127,
"watchers": 126,
"score": 0,
"subscribers_count": 10
},
@ -1841,10 +1841,10 @@
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2023-11-23T06:17:41Z",
"updated_at": "2023-11-24T19:51:12Z",
"pushed_at": "2021-12-02T12:00:46Z",
"stargazers_count": 1154,
"watchers_count": 1154,
"stargazers_count": 1153,
"watchers_count": 1153,
"has_discussions": false,
"forks_count": 355,
"allow_forking": true,
@ -1853,7 +1853,7 @@
"topics": [],
"visibility": "public",
"forks": 355,
"watchers": 1154,
"watchers": 1153,
"score": 0,
"subscribers_count": 69
},
@ -1931,10 +1931,10 @@
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2023-10-24T14:03:13Z",
"updated_at": "2023-11-24T19:51:15Z",
"pushed_at": "2021-01-10T04:31:22Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 346,
"watchers_count": 346,
"has_discussions": false,
"forks_count": 130,
"allow_forking": true,
@ -1943,7 +1943,7 @@
"topics": [],
"visibility": "public",
"forks": 130,
"watchers": 347,
"watchers": 346,
"score": 0,
"subscribers_count": 30
},
@ -2417,10 +2417,10 @@
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2023-09-28T11:04:22Z",
"updated_at": "2023-11-24T19:52:47Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 293,
"watchers_count": 293,
"stargazers_count": 292,
"watchers_count": 292,
"has_discussions": false,
"forks_count": 98,
"allow_forking": true,
@ -2429,7 +2429,7 @@
"topics": [],
"visibility": "public",
"forks": 98,
"watchers": 293,
"watchers": 292,
"score": 0,
"subscribers_count": 21
},
@ -3107,10 +3107,10 @@
"description": "CVE-2019-0708 (BlueKeep) proof of concept allowing pre-auth RCE on Windows7",
"fork": false,
"created_at": "2020-03-15T19:33:53Z",
"updated_at": "2023-11-03T08:00:35Z",
"updated_at": "2023-11-24T20:00:06Z",
"pushed_at": "2022-03-28T04:10:20Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -3119,7 +3119,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 112,
"watchers": 111,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2023-11-10T07:53:46Z",
"updated_at": "2023-11-24T19:51:46Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 242,
"watchers_count": 242,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 243,
"watchers": 242,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "CVE-2019-1040 with Kerberos delegation",
"fork": false,
"created_at": "2019-06-18T12:10:26Z",
"updated_at": "2023-03-28T22:34:50Z",
"updated_at": "2023-11-24T19:51:52Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 32,
"watchers": 31,
"score": 0,
"subscribers_count": 3
},
@ -103,10 +103,10 @@
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2023-11-04T22:02:48Z",
"updated_at": "2023-11-24T19:52:02Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 278,
"watchers_count": 278,
"stargazers_count": 277,
"watchers_count": 277,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 278,
"watchers": 277,
"score": 0,
"subscribers_count": 9
},
@ -133,10 +133,10 @@
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2023-09-16T12:12:19Z",
"updated_at": "2023-11-24T20:10:22Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 72,
"watchers": 71,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2023-11-16T08:02:41Z",
"updated_at": "2023-11-24T19:54:43Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1773,
"watchers_count": 1773,
"stargazers_count": 1771,
"watchers_count": 1771,
"has_discussions": false,
"forks_count": 260,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 260,
"watchers": 1773,
"watchers": 1771,
"score": 0,
"subscribers_count": 38
},

View file

@ -13,10 +13,10 @@
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
"fork": false,
"created_at": "2019-09-04T13:06:02Z",
"updated_at": "2023-10-06T21:38:47Z",
"updated_at": "2023-11-24T19:54:10Z",
"pushed_at": "2022-02-11T00:00:44Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 134,
"watchers": 133,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2023-10-05T16:19:33Z",
"updated_at": "2023-11-24T19:54:55Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 609,
"watchers_count": 609,
"stargazers_count": 608,
"watchers_count": 608,
"has_discussions": false,
"forks_count": 85,
"allow_forking": true,
@ -33,7 +33,7 @@
],
"visibility": "public",
"forks": 85,
"watchers": 609,
"watchers": 608,
"score": 0,
"subscribers_count": 19
}

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2023-10-22T15:50:28Z",
"updated_at": "2023-11-24T19:54:08Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 774,
"watchers_count": 774,
"stargazers_count": 773,
"watchers_count": 773,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 774,
"watchers": 773,
"score": 0,
"subscribers_count": 33
}

View file

@ -13,10 +13,10 @@
"description": "Privilege Escalation: Weaponizing CVE-2019-1405 and CVE-2019-1322",
"fork": false,
"created_at": "2019-11-13T16:34:03Z",
"updated_at": "2023-11-08T21:19:38Z",
"updated_at": "2023-11-24T19:05:03Z",
"pushed_at": "2019-11-14T14:16:54Z",
"stargazers_count": 346,
"watchers_count": 346,
"stargazers_count": 347,
"watchers_count": 347,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 346,
"watchers": 347,
"score": 0,
"subscribers_count": 12
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-15107 Webmin RCE (unauthorized)",
"fork": false,
"created_at": "2019-08-19T07:43:16Z",
"updated_at": "2023-09-28T11:05:17Z",
"updated_at": "2023-11-24T23:47:22Z",
"pushed_at": "2019-09-02T16:06:19Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 58,
"watchers": 59,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
"fork": false,
"created_at": "2020-03-13T14:53:54Z",
"updated_at": "2023-10-09T13:35:11Z",
"updated_at": "2023-11-24T20:00:01Z",
"pushed_at": "2020-03-22T19:46:04Z",
"stargazers_count": 212,
"watchers_count": 212,
"stargazers_count": 211,
"watchers_count": 211,
"has_discussions": false,
"forks_count": 64,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 64,
"watchers": 212,
"watchers": 211,
"score": 0,
"subscribers_count": 16
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2019-1652 \/CVE-2019-1653 Exploits For Dumping Cisco RV320 Configurations & Debugging Data AND Remote Root Exploit!",
"fork": false,
"created_at": "2019-01-24T10:12:44Z",
"updated_at": "2023-09-28T10:57:49Z",
"updated_at": "2023-11-24T19:47:00Z",
"pushed_at": "2019-02-08T12:38:05Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 223,
"watchers_count": 223,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 71,
"watchers": 224,
"watchers": 223,
"score": 0,
"subscribers_count": 15
}

View file

@ -43,10 +43,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-24T06:42:07Z",
"updated_at": "2023-11-24T20:00:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3930,
"watchers_count": 3930,
"stargazers_count": 3929,
"watchers_count": 3929,
"has_discussions": false,
"forks_count": 1095,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 1095,
"watchers": 3930,
"watchers": 3929,
"score": 0,
"subscribers_count": 155
},

View file

@ -1,32 +0,0 @@
[
{
"id": 231370688,
"name": "CVE-2019-18890",
"full_name": "RealLinkers\/CVE-2019-18890",
"owner": {
"login": "RealLinkers",
"id": 22389074,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22389074?v=4",
"html_url": "https:\/\/github.com\/RealLinkers"
},
"html_url": "https:\/\/github.com\/RealLinkers\/CVE-2019-18890",
"description": "CVE-2019-18890 POC (Proof of Concept)",
"fork": false,
"created_at": "2020-01-02T11:44:47Z",
"updated_at": "2023-09-28T11:09:35Z",
"pushed_at": "2020-01-06T13:13:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 11,
"score": 0,
"subscribers_count": 1
}
]

View file

@ -43,10 +43,10 @@
"description": "This is a tool published for the Citrix ADC (NetScaler) vulnerability. We are only disclosing this due to others publishing the exploit code first.",
"fork": false,
"created_at": "2020-01-11T00:08:27Z",
"updated_at": "2023-11-16T07:39:30Z",
"updated_at": "2023-11-24T19:57:56Z",
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 570,
"watchers_count": 570,
"stargazers_count": 569,
"watchers_count": 569,
"has_discussions": false,
"forks_count": 133,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 133,
"watchers": 570,
"watchers": 569,
"score": 0,
"subscribers_count": 29
},
@ -73,10 +73,10 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2023-11-08T02:37:20Z",
"updated_at": "2023-11-24T19:57:56Z",
"pushed_at": "2020-10-23T19:35:42Z",
"stargazers_count": 108,
"watchers_count": 108,
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -90,7 +90,7 @@
],
"visibility": "public",
"forks": 28,
"watchers": 108,
"watchers": 107,
"score": 0,
"subscribers_count": 17
},

View file

@ -103,10 +103,10 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2023-11-16T08:10:16Z",
"updated_at": "2023-11-24T19:51:58Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 920,
"watchers_count": 920,
"stargazers_count": 919,
"watchers_count": 919,
"has_discussions": false,
"forks_count": 181,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 181,
"watchers": 920,
"watchers": 919,
"score": 0,
"subscribers_count": 19
},
@ -193,10 +193,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -226,7 +226,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
}

View file

@ -223,10 +223,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2023-10-09T07:15:22Z",
"updated_at": "2023-11-24T19:51:09Z",
"pushed_at": "2023-05-08T16:23:06Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 436,
"watchers_count": 436,
"has_discussions": false,
"forks_count": 162,
"allow_forking": true,
@ -235,7 +235,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 438,
"watchers": 436,
"score": 0,
"subscribers_count": 10
},

View file

@ -237,7 +237,7 @@
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
"subscribers_count": 3
},
{
"id": 469838090,

View file

@ -43,10 +43,10 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2023-11-08T11:47:57Z",
"updated_at": "2023-11-24T19:47:35Z",
"pushed_at": "2022-01-05T04:09:42Z",
"stargazers_count": 627,
"watchers_count": 627,
"stargazers_count": 626,
"watchers_count": 626,
"has_discussions": false,
"forks_count": 169,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 169,
"watchers": 627,
"watchers": 626,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2023-11-24T12:39:01Z",
"updated_at": "2023-11-24T19:46:34Z",
"pushed_at": "2023-09-28T18:58:28Z",
"stargazers_count": 670,
"watchers_count": 670,
"stargazers_count": 669,
"watchers_count": 669,
"has_discussions": false,
"forks_count": 137,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 670,
"watchers": 669,
"score": 0,
"subscribers_count": 44
},

View file

@ -13,10 +13,10 @@
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
"fork": false,
"created_at": "2019-02-12T06:02:06Z",
"updated_at": "2023-11-08T15:51:28Z",
"updated_at": "2023-11-24T19:47:33Z",
"pushed_at": "2019-05-09T21:34:26Z",
"stargazers_count": 645,
"watchers_count": 645,
"stargazers_count": 644,
"watchers_count": 644,
"has_discussions": false,
"forks_count": 158,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 158,
"watchers": 645,
"watchers": 644,
"score": 0,
"subscribers_count": 19
},

View file

@ -76,10 +76,10 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2023-11-15T13:34:12Z",
"updated_at": "2023-11-24T19:55:36Z",
"pushed_at": "2023-08-29T17:49:28Z",
"stargazers_count": 156,
"watchers_count": 156,
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 68,
"watchers": 156,
"watchers": 155,
"score": 0,
"subscribers_count": 8
},

View file

@ -136,10 +136,10 @@
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
"fork": false,
"created_at": "2020-01-24T19:47:45Z",
"updated_at": "2023-09-28T11:10:29Z",
"updated_at": "2023-11-24T19:58:19Z",
"pushed_at": "2020-01-31T13:49:06Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -148,7 +148,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 77,
"watchers": 76,
"score": 0,
"subscribers_count": 13
}

View file

@ -13,10 +13,10 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2023-09-28T11:11:44Z",
"updated_at": "2023-11-24T19:59:19Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 161,
"watchers_count": 161,
"stargazers_count": 160,
"watchers_count": 160,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 161,
"watchers": 160,
"score": 0,
"subscribers_count": 6
},
@ -75,10 +75,10 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2023-11-20T03:17:14Z",
"updated_at": "2023-11-24T19:59:21Z",
"pushed_at": "2023-07-04T05:16:05Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 320,
"watchers_count": 320,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
@ -87,7 +87,7 @@
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 321,
"watchers": 320,
"score": 0,
"subscribers_count": 10
},

View file

@ -133,10 +133,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2023-11-22T06:44:43Z",
"updated_at": "2023-11-24T19:59:55Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 646,
"watchers_count": 646,
"stargazers_count": 645,
"watchers_count": 645,
"has_discussions": false,
"forks_count": 206,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 206,
"watchers": 646,
"watchers": 645,
"score": 0,
"subscribers_count": 27
},
@ -446,10 +446,10 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2023-11-17T21:31:41Z",
"updated_at": "2023-11-24T19:59:58Z",
"pushed_at": "2023-02-26T07:01:03Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 310,
"watchers_count": 310,
"has_discussions": false,
"forks_count": 122,
"allow_forking": true,
@ -463,7 +463,7 @@
],
"visibility": "public",
"forks": 122,
"watchers": 311,
"watchers": 310,
"score": 0,
"subscribers_count": 19
},
@ -511,10 +511,10 @@
"description": "Scanner for CVE-2020-0796 - A SMBv3.1.1 + SMB compression RCE ",
"fork": false,
"created_at": "2020-03-12T19:33:18Z",
"updated_at": "2023-09-28T11:12:27Z",
"updated_at": "2023-11-24T19:59:58Z",
"pushed_at": "2020-03-13T07:38:43Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -523,7 +523,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 57,
"watchers": 56,
"score": 0,
"subscribers_count": 4
},
@ -1096,10 +1096,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2023-11-24T07:23:11Z",
"updated_at": "2023-11-24T20:00:45Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1277,
"watchers_count": 1277,
"stargazers_count": 1276,
"watchers_count": 1276,
"has_discussions": false,
"forks_count": 369,
"allow_forking": true,
@ -1114,7 +1114,7 @@
],
"visibility": "public",
"forks": 369,
"watchers": 1277,
"watchers": 1276,
"score": 0,
"subscribers_count": 34
},
@ -1444,10 +1444,10 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2023-11-14T07:16:10Z",
"updated_at": "2023-11-24T20:01:38Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 503,
"watchers_count": 503,
"stargazers_count": 502,
"watchers_count": 502,
"has_discussions": false,
"forks_count": 163,
"allow_forking": true,
@ -1462,7 +1462,7 @@
],
"visibility": "public",
"forks": 163,
"watchers": 503,
"watchers": 502,
"score": 0,
"subscribers_count": 26
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-1066-EXP支持Windows 7和Windows Server 2008 R2操作系统",
"fork": false,
"created_at": "2020-06-01T04:44:05Z",
"updated_at": "2023-09-28T11:16:08Z",
"updated_at": "2023-11-24T20:03:14Z",
"pushed_at": "2020-06-17T00:56:08Z",
"stargazers_count": 186,
"watchers_count": 186,
"stargazers_count": 185,
"watchers_count": 185,
"has_discussions": false,
"forks_count": 48,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 186,
"watchers": 185,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "Salt security backports for CVE-2020-11651 & CVE-2020-11652",
"fork": false,
"created_at": "2020-05-01T20:53:49Z",
"updated_at": "2023-09-28T11:14:53Z",
"updated_at": "2023-11-24T20:02:10Z",
"pushed_at": "2020-05-18T17:36:18Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 108,
"watchers_count": 108,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -60,7 +60,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 109,
"watchers": 108,
"score": 0,
"subscribers_count": 8
},
@ -78,10 +78,10 @@
"description": null,
"fork": false,
"created_at": "2020-05-04T08:01:37Z",
"updated_at": "2023-09-28T11:14:59Z",
"updated_at": "2023-11-24T20:02:15Z",
"pushed_at": "2020-05-04T08:11:21Z",
"stargazers_count": 102,
"watchers_count": 102,
"stargazers_count": 101,
"watchers_count": 101,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -90,7 +90,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 102,
"watchers": 101,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Vulnerability checker for Callstranger (CVE-2020-12695)",
"fork": false,
"created_at": "2020-06-08T07:37:49Z",
"updated_at": "2023-10-09T20:33:43Z",
"updated_at": "2023-11-24T20:03:28Z",
"pushed_at": "2021-08-07T16:48:55Z",
"stargazers_count": 393,
"watchers_count": 393,
"stargazers_count": 392,
"watchers_count": 392,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 393,
"watchers": 392,
"score": 0,
"subscribers_count": 11
},

View file

@ -113,10 +113,10 @@
"description": "poc for CVE-2020-1337 (Windows Print Spooler Elevation of Privilege)",
"fork": false,
"created_at": "2020-08-12T10:05:36Z",
"updated_at": "2023-09-28T11:18:53Z",
"updated_at": "2023-11-24T20:06:00Z",
"pushed_at": "2020-08-13T07:16:12Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 172,
"watchers_count": 172,
"has_discussions": false,
"forks_count": 49,
"allow_forking": true,
@ -129,7 +129,7 @@
],
"visibility": "public",
"forks": 49,
"watchers": 174,
"watchers": 172,
"score": 0,
"subscribers_count": 11
},

View file

@ -43,10 +43,10 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2023-11-24T00:44:28Z",
"updated_at": "2023-11-24T20:06:48Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1652,
"watchers_count": 1652,
"stargazers_count": 1650,
"watchers_count": 1650,
"has_discussions": false,
"forks_count": 364,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 364,
"watchers": 1652,
"watchers": 1650,
"score": 0,
"subscribers_count": 89
},
@ -103,10 +103,10 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2023-11-24T09:12:25Z",
"updated_at": "2023-11-24T20:06:59Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1097,
"watchers_count": 1097,
"stargazers_count": 1096,
"watchers_count": 1096,
"has_discussions": false,
"forks_count": 285,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 285,
"watchers": 1097,
"watchers": 1096,
"score": 0,
"subscribers_count": 35
},
@ -133,10 +133,10 @@
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2023-11-24T09:12:25Z",
"updated_at": "2023-11-24T20:06:59Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 355,
"watchers_count": 355,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 356,
"watchers": 355,
"score": 0,
"subscribers_count": 9
},
@ -170,10 +170,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2023-11-22T14:57:06Z",
"updated_at": "2023-11-24T20:06:59Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 564,
"watchers_count": 564,
"stargazers_count": 562,
"watchers_count": 562,
"has_discussions": false,
"forks_count": 144,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 144,
"watchers": 564,
"watchers": 562,
"score": 0,
"subscribers_count": 14
},
@ -200,10 +200,10 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2023-11-03T04:39:06Z",
"updated_at": "2023-11-24T20:06:59Z",
"pushed_at": "2023-03-02T19:40:19Z",
"stargazers_count": 170,
"watchers_count": 170,
"stargazers_count": 169,
"watchers_count": 169,
"has_discussions": false,
"forks_count": 44,
"allow_forking": true,
@ -212,7 +212,7 @@
"topics": [],
"visibility": "public",
"forks": 44,
"watchers": 170,
"watchers": 169,
"score": 0,
"subscribers_count": 7
},
@ -1717,10 +1717,10 @@
"description": "CVE-2020-1472 C++",
"fork": false,
"created_at": "2022-08-31T06:01:02Z",
"updated_at": "2023-10-23T11:11:35Z",
"updated_at": "2023-11-24T20:28:04Z",
"pushed_at": "2022-09-02T16:25:01Z",
"stargazers_count": 83,
"watchers_count": 83,
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -1729,7 +1729,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 83,
"watchers": 82,
"score": 0,
"subscribers_count": 5
},

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2023-11-24T06:42:07Z",
"updated_at": "2023-11-24T20:00:51Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3930,
"watchers_count": 3930,
"stargazers_count": 3929,
"watchers_count": 3929,
"has_discussions": false,
"forks_count": 1095,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1095,
"watchers": 3930,
"watchers": 3929,
"score": 0,
"subscribers_count": 155
},
@ -303,10 +303,10 @@
"description": "CVE-2020-14882_ALL综合利用工具支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。",
"fork": false,
"created_at": "2020-11-03T10:49:35Z",
"updated_at": "2023-10-26T06:44:53Z",
"updated_at": "2023-11-24T20:08:40Z",
"pushed_at": "2022-03-29T02:08:45Z",
"stargazers_count": 140,
"watchers_count": 140,
"stargazers_count": 139,
"watchers_count": 139,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -315,7 +315,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 140,
"watchers": 139,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2023-11-03T10:57:37Z",
"updated_at": "2023-11-24T20:07:45Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 205,
"watchers_count": 205,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 31,
"watchers": 207,
"watchers": 205,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-17008 splWOW64 Elevation of Privilege",
"fork": false,
"created_at": "2020-12-24T04:00:29Z",
"updated_at": "2023-11-03T10:19:13Z",
"updated_at": "2023-11-24T20:10:10Z",
"pushed_at": "2020-12-24T06:02:53Z",
"stargazers_count": 50,
"watchers_count": 50,
"stargazers_count": 49,
"watchers_count": 49,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 50,
"watchers": 49,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Apache Flink 目录遍历漏洞批量检测 (CVE-2020-17519)",
"fork": false,
"created_at": "2021-01-06T02:15:39Z",
"updated_at": "2023-09-28T11:23:41Z",
"updated_at": "2023-11-24T20:10:28Z",
"pushed_at": "2021-01-06T23:51:32Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 2
},

View file

@ -43,10 +43,10 @@
"description": "S2-061 的payload以及对应简单的PoC\/Exp",
"fork": false,
"created_at": "2020-12-10T17:42:37Z",
"updated_at": "2023-09-28T11:22:51Z",
"updated_at": "2023-11-24T20:09:45Z",
"pushed_at": "2020-12-18T00:57:50Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2020-02-20T17:00:02Z",
"updated_at": "2023-09-28T11:11:32Z",
"updated_at": "2023-11-24T19:59:09Z",
"pushed_at": "2020-03-02T20:25:35Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 46,
"watchers_count": 46,
"has_discussions": false,
"forks_count": 37,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 37,
"watchers": 47,
"watchers": 46,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "CNVD-2020-10487(CVE-2020-1938), tomcat ajp 文件读取漏洞poc",
"fork": false,
"created_at": "2020-02-20T17:57:54Z",
"updated_at": "2023-11-20T08:14:07Z",
"updated_at": "2023-11-24T19:59:09Z",
"pushed_at": "2020-02-23T17:06:06Z",
"stargazers_count": 114,
"watchers_count": 114,
"stargazers_count": 113,
"watchers_count": 113,
"has_discussions": false,
"forks_count": 72,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 72,
"watchers": 114,
"watchers": 113,
"score": 0,
"subscribers_count": 3
},
@ -103,10 +103,10 @@
"description": "Cnvd-2020-10487 \/ cve-2020-1938, scanner tool",
"fork": false,
"created_at": "2020-02-20T21:00:15Z",
"updated_at": "2023-10-23T08:56:42Z",
"updated_at": "2023-11-24T19:59:09Z",
"pushed_at": "2021-11-26T07:40:35Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 289,
"watchers_count": 289,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 101,
"watchers": 290,
"watchers": 289,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2023-11-24T03:57:21Z",
"updated_at": "2023-11-24T19:58:03Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1839,
"watchers_count": 1839,
"stargazers_count": 1836,
"watchers_count": 1836,
"has_discussions": false,
"forks_count": 338,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1839,
"watchers": 1836,
"score": 0,
"subscribers_count": 34
},

View file

@ -13,10 +13,10 @@
"description": "Demo exploit code for CVE-2020-27904, a tfp0 bug.",
"fork": false,
"created_at": "2021-03-31T09:11:29Z",
"updated_at": "2023-09-28T11:26:20Z",
"updated_at": "2023-11-24T20:13:15Z",
"pushed_at": "2021-04-29T07:14:33Z",
"stargazers_count": 67,
"watchers_count": 67,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 67,
"watchers": 66,
"score": 0,
"subscribers_count": 5
}

View file

@ -57,6 +57,6 @@
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
}
]

View file

@ -73,10 +73,10 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2023-10-12T10:57:41Z",
"updated_at": "2023-11-24T20:01:28Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 271,
"watchers_count": 271,
"stargazers_count": 270,
"watchers_count": 270,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 271,
"watchers": 270,
"score": 0,
"subscribers_count": 13
},

View file

@ -43,10 +43,10 @@
"description": "Automated script for F5 BIG-IP scanner (CVE-2020-5902) using hosts retrieved from Shodan API.",
"fork": false,
"created_at": "2020-07-05T06:19:09Z",
"updated_at": "2023-09-28T11:17:31Z",
"updated_at": "2023-11-24T20:04:34Z",
"pushed_at": "2022-12-08T11:03:15Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 54,
"watchers": 53,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)",
"fork": false,
"created_at": "2021-01-14T10:49:40Z",
"updated_at": "2023-09-28T11:23:57Z",
"updated_at": "2023-11-24T20:10:41Z",
"pushed_at": "2021-01-15T16:25:19Z",
"stargazers_count": 82,
"watchers_count": 82,
"stargazers_count": 81,
"watchers_count": 81,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 82,
"watchers": 81,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2023-11-24T08:31:29Z",
"updated_at": "2023-11-24T20:05:00Z",
"pushed_at": "2020-09-29T17:20:12Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 210,
"watchers_count": 210,
"has_discussions": false,
"forks_count": 68,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 68,
"watchers": 211,
"watchers": 210,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2023-10-26T14:36:46Z",
"updated_at": "2023-11-24T20:12:29Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 143,
"watchers": 142,
"score": 0,
"subscribers_count": 17
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-8597",
"fork": false,
"created_at": "2020-02-24T08:37:50Z",
"updated_at": "2023-09-28T11:11:40Z",
"updated_at": "2023-11-24T19:59:14Z",
"pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 65,
"watchers": 64,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "The official exploit for Cacti v1.2.8 Remote Code Execution CVE-2020-8813",
"fork": false,
"created_at": "2020-02-22T16:27:41Z",
"updated_at": "2023-09-28T11:11:37Z",
"updated_at": "2023-11-24T19:59:12Z",
"pushed_at": "2020-02-22T16:33:31Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 20,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 68,
"watchers": 67,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-9992 - A design flaw in MobileDevice.framework\/Xcode and iOS\/iPadOS\/tvOS Development Tools allows an attacker in the same network to gain remote code execution on a target device",
"fork": false,
"created_at": "2020-09-16T23:35:22Z",
"updated_at": "2023-11-03T07:31:51Z",
"updated_at": "2023-11-24T20:07:04Z",
"pushed_at": "2020-09-23T14:52:06Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 65,
"watchers": 64,
"score": 0,
"subscribers_count": 7
}

View file

@ -43,10 +43,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2023-11-23T03:18:51Z",
"updated_at": "2023-11-24T20:16:00Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1760,
"watchers_count": 1760,
"stargazers_count": 1759,
"watchers_count": 1759,
"has_discussions": false,
"forks_count": 585,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 585,
"watchers": 1760,
"watchers": 1759,
"score": 0,
"subscribers_count": 44
},
@ -172,10 +172,10 @@
"description": "Local Privilege Escalation Edition for CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:47:13Z",
"updated_at": "2023-11-03T09:31:40Z",
"updated_at": "2023-11-24T20:16:03Z",
"pushed_at": "2021-07-05T06:46:12Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 332,
"watchers_count": 332,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -193,7 +193,7 @@
],
"visibility": "public",
"forks": 79,
"watchers": 333,
"watchers": 332,
"score": 0,
"subscribers_count": 14
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2023-10-26T20:54:27Z",
"updated_at": "2023-11-24T20:28:07Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 98,
"watchers_count": 98,
"stargazers_count": 97,
"watchers_count": 97,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 98,
"watchers": 97,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "Exploit to SYSTEM for CVE-2021-21551",
"fork": false,
"created_at": "2021-05-13T13:23:38Z",
"updated_at": "2023-11-03T09:36:33Z",
"updated_at": "2023-11-24T20:14:34Z",
"pushed_at": "2021-05-20T20:33:09Z",
"stargazers_count": 238,
"watchers_count": 238,
"stargazers_count": 236,
"watchers_count": 236,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 238,
"watchers": 236,
"score": 0,
"subscribers_count": 10
},

View file

@ -60,10 +60,10 @@
"description": null,
"fork": false,
"created_at": "2021-02-24T09:56:21Z",
"updated_at": "2023-09-28T11:25:14Z",
"updated_at": "2023-11-24T20:11:55Z",
"pushed_at": "2021-03-01T02:10:44Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 133,
"watchers_count": 133,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
@ -72,7 +72,7 @@
"topics": [],
"visibility": "public",
"forks": 66,
"watchers": 134,
"watchers": 133,
"score": 0,
"subscribers_count": 9
},
@ -90,10 +90,10 @@
"description": "CVE-2021-21972 Exploit",
"fork": false,
"created_at": "2021-02-24T11:14:58Z",
"updated_at": "2023-11-24T02:50:03Z",
"updated_at": "2023-11-24T20:11:55Z",
"pushed_at": "2023-06-08T04:01:33Z",
"stargazers_count": 462,
"watchers_count": 462,
"stargazers_count": 461,
"watchers_count": 461,
"has_discussions": false,
"forks_count": 152,
"allow_forking": true,
@ -104,7 +104,7 @@
],
"visibility": "public",
"forks": 152,
"watchers": 462,
"watchers": 461,
"score": 0,
"subscribers_count": 8
},
@ -152,10 +152,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2023-11-06T09:50:59Z",
"updated_at": "2023-11-24T20:11:56Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 241,
"watchers_count": 241,
"stargazers_count": 240,
"watchers_count": 240,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
@ -164,7 +164,7 @@
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 241,
"watchers": 240,
"score": 0,
"subscribers_count": 10
},

View file

@ -140,10 +140,10 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2023-09-28T11:28:19Z",
"updated_at": "2023-11-24T20:15:13Z",
"pushed_at": "2022-01-10T07:01:58Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 38,
"allow_forking": true,
@ -152,7 +152,7 @@
"topics": [],
"visibility": "public",
"forks": 38,
"watchers": 112,
"watchers": 111,
"score": 0,
"subscribers_count": 4
},

View file

@ -283,10 +283,10 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2023-11-10T09:39:25Z",
"updated_at": "2023-11-24T20:21:04Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 171,
"watchers_count": 171,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 46,
"watchers": 172,
"watchers": 171,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "Pocsuite3 For CVE-2021-22205",
"fork": false,
"created_at": "2021-10-28T06:29:37Z",
"updated_at": "2023-09-28T11:32:43Z",
"updated_at": "2023-11-24T19:17:45Z",
"pushed_at": "2021-10-28T08:54:26Z",
"stargazers_count": 89,
"watchers_count": 89,
"stargazers_count": 88,
"watchers_count": 88,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 89,
"watchers": 88,
"score": 0,
"subscribers_count": 1
},
@ -133,10 +133,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2023-11-14T09:36:57Z",
"updated_at": "2023-11-24T20:19:38Z",
"pushed_at": "2022-11-16T08:14:33Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 245,
"watchers_count": 245,
"has_discussions": false,
"forks_count": 101,
"allow_forking": true,
@ -147,7 +147,7 @@
],
"visibility": "public",
"forks": 101,
"watchers": 246,
"watchers": 245,
"score": 0,
"subscribers_count": 3
},
@ -473,10 +473,10 @@
"description": "GitLab CE\/EE Preauth RCE using ExifTool",
"fork": false,
"created_at": "2021-11-11T04:34:07Z",
"updated_at": "2023-10-23T08:56:45Z",
"updated_at": "2023-11-24T20:19:57Z",
"pushed_at": "2022-01-16T15:54:14Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 193,
"watchers_count": 193,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
@ -492,7 +492,7 @@
],
"visibility": "public",
"forks": 39,
"watchers": 194,
"watchers": 193,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "com_media allowed paths that are not intended for image uploads to RCE",
"fork": false,
"created_at": "2021-03-03T02:13:57Z",
"updated_at": "2023-09-28T11:25:26Z",
"updated_at": "2023-11-24T20:12:11Z",
"pushed_at": "2021-03-03T03:52:10Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 71,
"watchers_count": 71,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 72,
"watchers": 71,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
"fork": false,
"created_at": "2021-03-11T15:27:25Z",
"updated_at": "2023-10-26T14:36:46Z",
"updated_at": "2023-11-24T20:12:29Z",
"pushed_at": "2021-05-25T11:14:56Z",
"stargazers_count": 143,
"watchers_count": 143,
"stargazers_count": 142,
"watchers_count": 142,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 143,
"watchers": 142,
"score": 0,
"subscribers_count": 17
}

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-24086, a NULL dereference in tcpip.sys triggered remotely.",
"fork": false,
"created_at": "2021-04-07T11:10:40Z",
"updated_at": "2023-09-28T11:26:33Z",
"updated_at": "2023-11-24T20:13:28Z",
"pushed_at": "2021-04-15T12:46:54Z",
"stargazers_count": 223,
"watchers_count": 223,
"stargazers_count": 222,
"watchers_count": 222,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 223,
"watchers": 222,
"score": 0,
"subscribers_count": 6
},

View file

@ -133,10 +133,10 @@
"description": "Confluence Server Webwork OGNL injection",
"fork": false,
"created_at": "2021-09-01T07:15:17Z",
"updated_at": "2023-11-03T08:33:50Z",
"updated_at": "2023-11-24T20:17:53Z",
"pushed_at": "2021-12-03T22:09:31Z",
"stargazers_count": 299,
"watchers_count": 299,
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": false,
"forks_count": 84,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 84,
"watchers": 299,
"watchers": 298,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2023-11-24T09:12:29Z",
"updated_at": "2023-11-24T20:10:22Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 116,
"watchers_count": 116,
"stargazers_count": 115,
"watchers_count": 115,
"has_discussions": true,
"forks_count": 23,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 116,
"watchers": 115,
"score": 0,
"subscribers_count": 11
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2023-10-13T20:27:11Z",
"updated_at": "2023-11-24T20:18:58Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 126,
"watchers_count": 126,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 127,
"watchers": 126,
"score": 0,
"subscribers_count": 5
},

View file

@ -43,10 +43,10 @@
"description": "Collection of materials relating to FORCEDENTRY, will eventually delete this repo and migrate the materials to my main exploit repo once finished",
"fork": false,
"created_at": "2021-12-25T03:00:01Z",
"updated_at": "2023-10-23T11:10:34Z",
"updated_at": "2023-11-24T20:21:13Z",
"pushed_at": "2023-08-13T21:00:46Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 66,
"watchers": 65,
"score": 0,
"subscribers_count": 5
}

View file

@ -103,10 +103,10 @@
"description": "iOS 15.1 kernel exploit POC for CVE-2021-30955",
"fork": false,
"created_at": "2022-03-01T12:41:03Z",
"updated_at": "2023-09-16T21:51:44Z",
"updated_at": "2023-11-24T20:22:52Z",
"pushed_at": "2022-03-01T16:11:31Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 250,
"watchers_count": 250,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 251,
"watchers": 250,
"score": 0,
"subscribers_count": 8
},

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2023-11-14T06:52:09Z",
"updated_at": "2023-11-24T20:14:38Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 821,
"watchers_count": 821,
"stargazers_count": 819,
"watchers_count": 819,
"has_discussions": false,
"forks_count": 139,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 821,
"watchers": 819,
"score": 0,
"subscribers_count": 24
},

View file

@ -376,10 +376,10 @@
"description": "Notes regarding CVE-2021-3156: Heap-Based Buffer Overflow in Sudo",
"fork": false,
"created_at": "2021-01-29T19:24:41Z",
"updated_at": "2023-04-21T16:40:49Z",
"updated_at": "2023-11-24T20:11:09Z",
"pushed_at": "2021-01-31T02:21:37Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -392,7 +392,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 39,
"watchers": 38,
"score": 0,
"subscribers_count": 6
},
@ -410,10 +410,10 @@
"description": "PoC for CVE-2021-3156 (sudo heap overflow)",
"fork": false,
"created_at": "2021-01-30T03:22:04Z",
"updated_at": "2023-11-03T08:41:10Z",
"updated_at": "2023-11-24T20:11:10Z",
"pushed_at": "2022-04-14T11:51:18Z",
"stargazers_count": 430,
"watchers_count": 430,
"stargazers_count": 429,
"watchers_count": 429,
"has_discussions": false,
"forks_count": 115,
"allow_forking": true,
@ -422,7 +422,7 @@
"topics": [],
"visibility": "public",
"forks": 115,
"watchers": 430,
"watchers": 429,
"score": 0,
"subscribers_count": 8
},
@ -1074,10 +1074,10 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2023-11-20T14:25:37Z",
"updated_at": "2023-11-24T20:12:35Z",
"pushed_at": "2022-01-13T05:48:01Z",
"stargazers_count": 679,
"watchers_count": 679,
"stargazers_count": 677,
"watchers_count": 677,
"has_discussions": false,
"forks_count": 170,
"allow_forking": true,
@ -1086,7 +1086,7 @@
"topics": [],
"visibility": "public",
"forks": 170,
"watchers": 679,
"watchers": 677,
"score": 0,
"subscribers_count": 11
},
@ -1224,10 +1224,10 @@
"description": "CVE-2021-3156 - Sudo Baron Samedit",
"fork": false,
"created_at": "2021-04-29T06:29:26Z",
"updated_at": "2023-11-03T10:07:49Z",
"updated_at": "2023-11-24T20:14:10Z",
"pushed_at": "2022-02-12T19:33:07Z",
"stargazers_count": 210,
"watchers_count": 210,
"stargazers_count": 209,
"watchers_count": 209,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -1236,7 +1236,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 210,
"watchers": 209,
"score": 0,
"subscribers_count": 8
},
@ -1464,10 +1464,10 @@
"description": "CVE-2021-3156 - sudo exploit for ubuntu 18.04 & 20.04",
"fork": false,
"created_at": "2021-09-25T16:11:19Z",
"updated_at": "2023-10-25T18:10:04Z",
"updated_at": "2023-11-24T18:29:15Z",
"pushed_at": "2021-09-25T16:13:19Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -1476,7 +1476,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "远程代码执行S2-062 CVE-2021-31805验证POC",
"fork": false,
"created_at": "2022-04-15T01:50:14Z",
"updated_at": "2023-11-01T10:45:38Z",
"updated_at": "2023-11-24T20:24:30Z",
"pushed_at": "2022-04-17T08:19:59Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 130,
"watchers": 129,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "S2-062 (CVE-2021-31805) \/ S2-061 \/ S2-059 RCE",
"fork": false,
"created_at": "2022-04-15T04:23:44Z",
"updated_at": "2023-11-10T01:13:31Z",
"updated_at": "2023-11-24T20:24:30Z",
"pushed_at": "2022-04-15T08:52:11Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 36,
"watchers_count": 36,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 37,
"watchers": 36,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2021-32537: an out-of-bounds memory access that leads to pool corruption in the Windows kernel.",
"fork": false,
"created_at": "2021-06-09T15:44:00Z",
"updated_at": "2023-09-28T11:28:31Z",
"updated_at": "2023-11-24T20:15:25Z",
"pushed_at": "2021-06-26T18:31:23Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 58,
"watchers": 57,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2021-3449 OpenSSL denial-of-service exploit 👨🏻‍💻",
"fork": false,
"created_at": "2021-03-26T01:09:25Z",
"updated_at": "2023-09-28T23:35:15Z",
"updated_at": "2023-11-24T20:13:00Z",
"pushed_at": "2021-08-25T01:00:49Z",
"stargazers_count": 225,
"watchers_count": 225,
"stargazers_count": 224,
"watchers_count": 224,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 42,
"watchers": 225,
"watchers": 224,
"score": 0,
"subscribers_count": 6
}

Some files were not shown because too many files have changed in this diff Show more