Auto Update 2024/12/15 18:31:45

This commit is contained in:
motikan2010-bot 2024-12-16 03:31:45 +09:00
parent 3cdb1a186f
commit 53f1d6f570
23 changed files with 85 additions and 85 deletions

View file

@ -19,7 +19,7 @@
"stargazers_count": 187,
"watchers_count": 187,
"has_discussions": false,
"forks_count": 27,
"forks_count": 26,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -46,7 +46,7 @@
"tls"
],
"visibility": "public",
"forks": 27,
"forks": 26,
"watchers": 187,
"score": 0,
"subscribers_count": 8

View file

@ -14,8 +14,8 @@
"description": "Fork of the send module to deal with CVE-2017-20165",
"fork": false,
"created_at": "2023-01-11T10:20:27Z",
"updated_at": "2024-12-08T16:16:44Z",
"pushed_at": "2024-12-08T16:16:43Z",
"updated_at": "2024-12-15T16:51:00Z",
"pushed_at": "2024-12-15T16:50:59Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,

View file

@ -92,10 +92,10 @@
"description": "Exploit written in Python for CVE-2018-15473 with threading and export formats",
"fork": false,
"created_at": "2018-08-21T00:09:56Z",
"updated_at": "2024-12-10T19:31:33Z",
"updated_at": "2024-12-15T16:48:36Z",
"pushed_at": "2024-07-12T08:47:49Z",
"stargazers_count": 520,
"watchers_count": 520,
"stargazers_count": 521,
"watchers_count": 521,
"has_discussions": false,
"forks_count": 183,
"allow_forking": true,
@ -104,7 +104,7 @@
"topics": [],
"visibility": "public",
"forks": 183,
"watchers": 520,
"watchers": 521,
"score": 0,
"subscribers_count": 21
},

View file

@ -92,7 +92,7 @@
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 0
"subscribers_count": 1
},
{
"id": 121002284,

View file

@ -14,10 +14,10 @@
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
"fork": false,
"created_at": "2019-09-03T15:08:49Z",
"updated_at": "2024-12-10T06:49:39Z",
"updated_at": "2024-12-15T12:35:15Z",
"pushed_at": "2019-09-08T06:09:11Z",
"stargazers_count": 799,
"watchers_count": 799,
"stargazers_count": 800,
"watchers_count": 800,
"has_discussions": false,
"forks_count": 69,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 69,
"watchers": 799,
"watchers": 800,
"score": 0,
"subscribers_count": 34
}

View file

@ -14,10 +14,10 @@
"description": "USB device fuzzing on Android Phone",
"fork": false,
"created_at": "2020-04-05T05:45:29Z",
"updated_at": "2024-12-12T14:13:19Z",
"updated_at": "2024-12-15T14:44:37Z",
"pushed_at": "2021-10-16T15:23:41Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 30,
"watchers": 31,
"score": 0,
"subscribers_count": 3
}

View file

@ -45,10 +45,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-14T21:15:38Z",
"updated_at": "2024-12-15T14:24:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4142,
"watchers_count": 4142,
"stargazers_count": 4143,
"watchers_count": 4143,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -77,7 +77,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4142,
"watchers": 4143,
"score": 0,
"subscribers_count": 149
},

View file

@ -50,13 +50,13 @@
"stargazers_count": 642,
"watchers_count": 642,
"has_discussions": false,
"forks_count": 163,
"forks_count": 164,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 163,
"forks": 164,
"watchers": 642,
"score": 0,
"subscribers_count": 13

View file

@ -275,10 +275,10 @@
"description": "CVE-2020-11651&&CVE-2020-11652 EXP",
"fork": false,
"created_at": "2020-05-07T09:17:39Z",
"updated_at": "2024-10-07T03:30:01Z",
"updated_at": "2024-12-15T15:30:53Z",
"pushed_at": "2023-03-21T10:02:22Z",
"stargazers_count": 23,
"watchers_count": 23,
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -287,7 +287,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 23,
"watchers": 24,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2024-12-14T21:15:38Z",
"updated_at": "2024-12-15T14:24:45Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 4142,
"watchers_count": 4142,
"stargazers_count": 4143,
"watchers_count": 4143,
"has_discussions": false,
"forks_count": 1100,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 1100,
"watchers": 4142,
"watchers": 4143,
"score": 0,
"subscribers_count": 149
},

View file

@ -386,10 +386,10 @@
"description": "Ghostcat read file\/code execute,CNVD-2020-10487(CVE-2020-1938) ",
"fork": false,
"created_at": "2020-02-22T16:16:20Z",
"updated_at": "2024-12-13T20:29:20Z",
"updated_at": "2024-12-15T13:01:38Z",
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 368,
"watchers_count": 368,
"stargazers_count": 369,
"watchers_count": 369,
"has_discussions": false,
"forks_count": 111,
"allow_forking": true,
@ -404,7 +404,7 @@
],
"visibility": "public",
"forks": 111,
"watchers": 368,
"watchers": 369,
"score": 0,
"subscribers_count": 5
},

View file

@ -1271,10 +1271,10 @@
"description": "Automated Exploit Tool for Grafana CVE-2021-43798: Scanning common files that contain juicy informations and extracting SSH keys from compromised users.",
"fork": false,
"created_at": "2024-12-14T14:06:59Z",
"updated_at": "2024-12-14T17:30:16Z",
"updated_at": "2024-12-15T14:00:48Z",
"pushed_at": "2024-12-14T17:30:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1283,7 +1283,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2024-12-13T06:37:28Z",
"updated_at": "2024-12-15T14:16:32Z",
"pushed_at": "2023-02-26T14:06:05Z",
"stargazers_count": 1171,
"watchers_count": 1171,
"stargazers_count": 1172,
"watchers_count": 1172,
"has_discussions": true,
"forks_count": 190,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 190,
"watchers": 1171,
"watchers": 1172,
"score": 0,
"subscribers_count": 19
},

View file

@ -14,10 +14,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-15T12:18:17Z",
"updated_at": "2024-12-15T13:55:19Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -37,7 +37,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,19 +14,19 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2024-12-15T03:37:39Z",
"updated_at": "2024-12-15T18:10:45Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1291,
"watchers_count": 1291,
"stargazers_count": 1293,
"watchers_count": 1293,
"has_discussions": false,
"forks_count": 220,
"forks_count": 221,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 220,
"watchers": 1291,
"forks": 221,
"watchers": 1293,
"score": 0,
"subscribers_count": 21
},

View file

@ -146,8 +146,8 @@
"description": "CVE-2024-10914 is a critical command injection vulnerability affecting several legacy D-Link Network Attached Storage (NAS) devices.",
"fork": false,
"created_at": "2024-11-16T16:32:05Z",
"updated_at": "2024-12-15T12:30:32Z",
"pushed_at": "2024-12-15T12:30:28Z",
"updated_at": "2024-12-15T15:57:26Z",
"pushed_at": "2024-12-15T15:57:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,

View file

@ -19,13 +19,13 @@
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"forks": 8,
"watchers": 16,
"score": 0,
"subscribers_count": 1

View file

@ -355,10 +355,10 @@
"description": "CVE-2024-38077: Remote Code Execution Vulnerability in Windows Remote Desktop Licensing Service",
"fork": false,
"created_at": "2024-10-09T06:39:21Z",
"updated_at": "2024-11-21T09:33:12Z",
"updated_at": "2024-12-15T14:51:21Z",
"pushed_at": "2024-10-09T06:42:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -378,7 +378,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-03T08:56:59Z",
"updated_at": "2024-12-13T15:07:54Z",
"updated_at": "2024-12-15T14:33:25Z",
"pushed_at": "2024-11-18T23:48:31Z",
"stargazers_count": 37,
"watchers_count": 37,
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 37,
"watchers": 38,
"score": 0,
"subscribers_count": 0
}

View file

@ -45,10 +45,10 @@
"description": "Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-38475 , CVE-2024-38474 , CVE-2024-38473 , CVE-2023-38709",
"fork": false,
"created_at": "2024-10-05T20:32:45Z",
"updated_at": "2024-12-15T12:18:17Z",
"updated_at": "2024-12-15T13:55:19Z",
"pushed_at": "2024-10-05T20:37:02Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -68,7 +68,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 25,
"watchers": 26,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-14T09:22:33Z",
"updated_at": "2024-12-15T07:46:38Z",
"updated_at": "2024-12-15T16:33:04Z",
"pushed_at": "2024-12-14T10:13:45Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 2
}

View file

@ -14,10 +14,10 @@
"description": "s2-067(CVE-2024-53677)",
"fork": false,
"created_at": "2024-12-12T08:30:14Z",
"updated_at": "2024-12-13T09:18:45Z",
"updated_at": "2024-12-15T14:21:42Z",
"pushed_at": "2024-12-12T08:33:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 3,
"score": 0,
"subscribers_count": 2
},
@ -45,10 +45,10 @@
"description": "A critical vulnerability, CVE-2024-53677, has been identified in the popular Apache Struts framework, potentially allowing attackers to execute arbitrary code remotely. This vulnerability arises from flaws in the file upload logic, which can be exploited to perform path traversal and malicious file uploads.",
"fork": false,
"created_at": "2024-12-13T17:42:55Z",
"updated_at": "2024-12-15T11:08:19Z",
"updated_at": "2024-12-15T14:22:43Z",
"pushed_at": "2024-12-15T05:12:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"watchers": 5,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2024-12-10T06:59:00Z",
"updated_at": "2024-12-11T13:28:38Z",
"updated_at": "2024-12-15T16:54:02Z",
"pushed_at": "2024-12-10T07:05:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}