mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/03/28 00:07:27
This commit is contained in:
parent
02a5add105
commit
56f6737a44
29 changed files with 128 additions and 200 deletions
|
@ -44,74 +44,5 @@
|
|||
"forks": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 211957347,
|
||||
"name": "smb_usermap",
|
||||
"full_name": "b1fair\/smb_usermap",
|
||||
"owner": {
|
||||
"login": "b1fair",
|
||||
"id": 43326124,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/43326124?v=4",
|
||||
"html_url": "https:\/\/github.com\/b1fair"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/b1fair\/smb_usermap",
|
||||
"description": "A simple exploit for CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T21:06:09Z",
|
||||
"updated_at": "2019-10-01T18:44:18Z",
|
||||
"pushed_at": "2019-10-01T18:44:16Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 225688290,
|
||||
"name": "exploit_smb_usermap_script",
|
||||
"full_name": "Unam3dd\/exploit_smb_usermap_script",
|
||||
"owner": {
|
||||
"login": "Unam3dd",
|
||||
"id": 34691959,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/34691959?v=4",
|
||||
"html_url": "https:\/\/github.com\/Unam3dd"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Unam3dd\/exploit_smb_usermap_script",
|
||||
"description": "Python Script Exploit SMB Usermap Script CVE-2007-2447",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-03T18:25:41Z",
|
||||
"updated_at": "2019-12-04T21:34:38Z",
|
||||
"pushed_at": "2019-12-03T18:36:28Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 235003634,
|
||||
"name": "CVE-2007-2447",
|
||||
"full_name": "JoseBarrios\/CVE-2007-2447",
|
||||
"owner": {
|
||||
"login": "JoseBarrios",
|
||||
"id": 794342,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/794342?v=4",
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JoseBarrios\/CVE-2007-2447",
|
||||
"description": "Remote Command Injection Vulnerability (CVE-2007-2447), allows remote attackers to execute arbitrary commands by specifying a Samba username containing shell meta characters.",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-20T02:30:35Z",
|
||||
"updated_at": "2020-01-20T02:30:39Z",
|
||||
"pushed_at": "2020-01-20T02:30:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T10:10:43Z",
|
||||
"updated_at": "2020-03-17T03:46:26Z",
|
||||
"updated_at": "2020-03-27T13:45:01Z",
|
||||
"pushed_at": "2015-07-02T14:47:31Z",
|
||||
"stargazers_count": 570,
|
||||
"watchers_count": 570,
|
||||
"stargazers_count": 571,
|
||||
"watchers_count": 571,
|
||||
"forks_count": 231,
|
||||
"forks": 231,
|
||||
"watchers": 570,
|
||||
"watchers": 571,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,12 +36,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-02-17T08:52:02Z",
|
||||
"updated_at": "2020-03-27T09:59:29Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,12 +13,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2020-02-17T08:52:02Z",
|
||||
"updated_at": "2020-03-27T09:59:29Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"forks_count": 87,
|
||||
"forks": 87,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -201,8 +201,8 @@
|
|||
"pushed_at": "2017-11-28T03:06:32Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 34,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,12 +36,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for CVE-2018-11235 allowing RCE on git clone --recurse-submodules",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-30T22:56:29Z",
|
||||
"updated_at": "2019-10-11T19:04:32Z",
|
||||
"updated_at": "2020-03-27T10:32:44Z",
|
||||
"pushed_at": "2018-06-03T18:55:07Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 42,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -431,8 +431,8 @@
|
|||
"pushed_at": "2019-01-07T12:13:37Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -450,12 +450,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-03-25T11:59:35Z",
|
||||
"updated_at": "2020-03-27T11:48:20Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 206,
|
||||
"watchers_count": 206,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 206,
|
||||
"stargazers_count": 207,
|
||||
"watchers_count": 207,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 207,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -473,13 +473,13 @@
|
|||
"description": "CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-15T17:56:22Z",
|
||||
"updated_at": "2019-11-10T11:55:50Z",
|
||||
"updated_at": "2020-03-27T11:43:40Z",
|
||||
"pushed_at": "2019-05-29T10:17:16Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1025,13 +1025,13 @@
|
|||
"description": "dump",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-21T06:57:19Z",
|
||||
"updated_at": "2020-03-26T06:44:59Z",
|
||||
"updated_at": "2020-03-27T10:57:00Z",
|
||||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 454,
|
||||
"watchers_count": 454,
|
||||
"stargazers_count": 455,
|
||||
"watchers_count": 455,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 454,
|
||||
"watchers": 455,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1144,8 +1144,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1094,
|
||||
"watchers_count": 1094,
|
||||
"forks_count": 369,
|
||||
"forks": 369,
|
||||
"forks_count": 370,
|
||||
"forks": 370,
|
||||
"watchers": 1094,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1351,8 +1351,8 @@
|
|||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 700,
|
||||
"watchers_count": 700,
|
||||
"forks_count": 163,
|
||||
"forks": 163,
|
||||
"forks_count": 164,
|
||||
"forks": 164,
|
||||
"watchers": 700,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -2175,13 +2175,13 @@
|
|||
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-07T05:15:23Z",
|
||||
"updated_at": "2020-03-04T08:49:50Z",
|
||||
"updated_at": "2020-03-27T11:30:24Z",
|
||||
"pushed_at": "2019-09-20T04:53:41Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-09T16:49:19Z",
|
||||
"stargazers_count": 214,
|
||||
"watchers_count": 214,
|
||||
"forks_count": 92,
|
||||
"forks": 92,
|
||||
"forks_count": 93,
|
||||
"forks": 93,
|
||||
"watchers": 214,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1550,
|
||||
"watchers_count": 1550,
|
||||
"forks_count": 220,
|
||||
"forks": 220,
|
||||
"forks_count": 218,
|
||||
"forks": 218,
|
||||
"watchers": 1550,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T13:45:44Z",
|
||||
"updated_at": "2020-03-14T17:16:16Z",
|
||||
"updated_at": "2020-03-27T10:33:59Z",
|
||||
"pushed_at": "2019-12-13T19:07:53Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-03-04T07:05:24Z",
|
||||
"stargazers_count": 79,
|
||||
"watchers_count": 79,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 79,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC exploit for the CVE-2019-15126 kr00k vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T14:53:54Z",
|
||||
"updated_at": "2020-03-26T22:11:32Z",
|
||||
"updated_at": "2020-03-27T14:39:11Z",
|
||||
"pushed_at": "2020-03-22T19:46:04Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 106,
|
||||
"stargazers_count": 108,
|
||||
"watchers_count": 108,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 108,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-01-10T10:58:44Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-03-25T00:35:41Z",
|
||||
"updated_at": "2020-03-27T14:54:27Z",
|
||||
"pushed_at": "2019-12-18T15:32:15Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"stargazers_count": 119,
|
||||
"watchers_count": 119,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 116,
|
||||
"watchers": 119,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -151,12 +151,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-08-19T17:33:56Z",
|
||||
"stargazers_count": 44,
|
||||
"watchers_count": 44,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 44,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2020-01-15T08:36:05Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Zimbra邮件系统漏洞 XXE\/RCE\/SSRF\/Upload GetShell Exploit 1. (CVE-2019-9621 Zimbra<8.8.11 XXE GetShell Exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-06T15:47:20Z",
|
||||
"updated_at": "2020-03-27T06:01:09Z",
|
||||
"updated_at": "2020-03-27T09:08:30Z",
|
||||
"pushed_at": "2019-05-08T16:22:58Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"stargazers_count": 39,
|
||||
"watchers_count": 39,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 38,
|
||||
"watchers": 39,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-03-27T01:25:49Z",
|
||||
"updated_at": "2020-03-27T10:16:23Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 134,
|
||||
"watchers_count": 134,
|
||||
"stargazers_count": 136,
|
||||
"watchers_count": 136,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 134,
|
||||
"watchers": 136,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Weaponized PoC for SMBv3 TCP codec\/compression vulnerability",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T21:40:57Z",
|
||||
"updated_at": "2020-03-18T16:13:20Z",
|
||||
"updated_at": "2020-03-27T10:30:03Z",
|
||||
"pushed_at": "2020-03-12T22:58:25Z",
|
||||
"stargazers_count": 18,
|
||||
"watchers_count": 18,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 18,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -749,13 +749,13 @@
|
|||
"description": "基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-14T23:39:25Z",
|
||||
"updated_at": "2020-03-18T04:48:25Z",
|
||||
"updated_at": "2020-03-27T10:26:14Z",
|
||||
"pushed_at": "2020-03-18T04:48:23Z",
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 10,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2020-1938",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T16:32:52Z",
|
||||
"updated_at": "2020-03-20T13:57:08Z",
|
||||
"updated_at": "2020-03-27T12:07:31Z",
|
||||
"pushed_at": "2020-02-25T02:04:16Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 142,
|
||||
"watchers_count": 142,
|
||||
"forks_count": 82,
|
||||
"forks": 82,
|
||||
"watchers": 141,
|
||||
"watchers": 142,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -316,8 +316,8 @@
|
|||
"pushed_at": "2020-03-09T14:51:43Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -427,8 +427,8 @@
|
|||
"description": "CVE-2020-1938 \/ CNVD-2020-1048 Detection Tools",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-27T08:33:28Z",
|
||||
"updated_at": "2020-03-27T09:07:19Z",
|
||||
"pushed_at": "2020-03-27T09:07:17Z",
|
||||
"updated_at": "2020-03-27T09:09:56Z",
|
||||
"pushed_at": "2020-03-27T09:09:54Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,12 +13,12 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含 CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2020-03-26T04:46:50Z",
|
||||
"pushed_at": "2020-03-07T13:15:39Z",
|
||||
"updated_at": "2020-03-27T09:16:43Z",
|
||||
"pushed_at": "2020-03-27T09:16:40Z",
|
||||
"stargazers_count": 308,
|
||||
"watchers_count": 308,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"forks_count": 69,
|
||||
"forks": 69,
|
||||
"watchers": 308,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-03-26T01:34:38Z",
|
||||
"updated_at": "2020-03-27T05:43:46Z",
|
||||
"updated_at": "2020-03-27T10:53:25Z",
|
||||
"pushed_at": "2020-03-26T06:49:17Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 41,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "TP-Link Archer C50 V3 devices before Build 200318 Rel. 62209 allows remote attackers to cause a denial of service via a crafted HTTP Header containing an unexpected Referer field.",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-25T18:18:15Z",
|
||||
"updated_at": "2020-03-26T19:21:11Z",
|
||||
"updated_at": "2020-03-27T12:03:33Z",
|
||||
"pushed_at": "2020-03-26T08:12:50Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -12542,9 +12542,6 @@ The MS-RPC functionality in smbd in Samba 3.0.0 through 3.0.25rc3 allows remote
|
|||
|
||||
- [noondi/metasploitable2](https://github.com/noondi/metasploitable2)
|
||||
- [amriunix/CVE-2007-2447](https://github.com/amriunix/CVE-2007-2447)
|
||||
- [b1fair/smb_usermap](https://github.com/b1fair/smb_usermap)
|
||||
- [Unam3dd/exploit_smb_usermap_script](https://github.com/Unam3dd/exploit_smb_usermap_script)
|
||||
- [JoseBarrios/CVE-2007-2447](https://github.com/JoseBarrios/CVE-2007-2447)
|
||||
|
||||
### CVE-2007-3830
|
||||
|
||||
|
|
Loading…
Reference in a new issue