mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/01/03 12:30:02
This commit is contained in:
parent
3d07d6396a
commit
591454768b
14 changed files with 64 additions and 64 deletions
|
@ -174,13 +174,13 @@
|
|||
"description": "Heartbleed (CVE-2014-0160) client exploit",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T16:41:51Z",
|
||||
"updated_at": "2019-11-29T23:58:29Z",
|
||||
"updated_at": "2020-01-02T23:56:58Z",
|
||||
"pushed_at": "2016-01-22T00:42:35Z",
|
||||
"stargazers_count": 302,
|
||||
"watchers_count": 302,
|
||||
"stargazers_count": 303,
|
||||
"watchers_count": 303,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 302,
|
||||
"watchers": 303,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-17T08:10:07Z",
|
||||
"updated_at": "2019-12-30T17:07:33Z",
|
||||
"updated_at": "2020-01-03T01:05:10Z",
|
||||
"pushed_at": "2017-11-19T11:01:16Z",
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"stargazers_count": 603,
|
||||
"watchers_count": 603,
|
||||
"forks_count": 273,
|
||||
"forks": 273,
|
||||
"watchers": 602,
|
||||
"watchers": 603,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -523,8 +523,8 @@
|
|||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-02T09:03:37Z",
|
||||
"stargazers_count": 115,
|
||||
"watchers_count": 115,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"forks_count": 49,
|
||||
"forks": 49,
|
||||
"watchers": 115,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Exploit for Drupal v7.x + v8.x (Drupalgeddon 2 \/ CVE-2018-7600 \/ SA-CORE-2018-002)",
|
||||
"fork": false,
|
||||
"created_at": "2018-04-12T22:53:14Z",
|
||||
"updated_at": "2020-01-01T16:49:57Z",
|
||||
"updated_at": "2020-01-03T03:03:41Z",
|
||||
"pushed_at": "2019-03-13T07:11:23Z",
|
||||
"stargazers_count": 398,
|
||||
"watchers_count": 398,
|
||||
"forks_count": 126,
|
||||
"forks": 126,
|
||||
"watchers": 398,
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"forks_count": 127,
|
||||
"forks": 127,
|
||||
"watchers": 399,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "cve-2018-8453 exp",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-18T10:40:03Z",
|
||||
"updated_at": "2019-12-26T05:29:37Z",
|
||||
"updated_at": "2020-01-03T02:43:41Z",
|
||||
"pushed_at": "2019-12-13T02:24:39Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-0859 1day Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-07T04:37:34Z",
|
||||
"updated_at": "2019-12-04T16:39:10Z",
|
||||
"updated_at": "2020-01-03T02:42:22Z",
|
||||
"pushed_at": "2019-06-20T01:45:10Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 109,
|
||||
"stargazers_count": 110,
|
||||
"watchers_count": 110,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"watchers": 110,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-01-02T17:23:16Z",
|
||||
"updated_at": "2020-01-02T22:23:39Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-12-28T18:23:58Z",
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 57,
|
||||
"forks": 57,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": " double-free bug in WhatsApp exploit poc",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-03T09:26:24Z",
|
||||
"updated_at": "2020-01-01T11:14:22Z",
|
||||
"updated_at": "2020-01-03T02:59:59Z",
|
||||
"pushed_at": "2019-10-03T09:43:55Z",
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"watchers": 229,
|
||||
"stargazers_count": 230,
|
||||
"watchers_count": 230,
|
||||
"forks_count": 71,
|
||||
"forks": 71,
|
||||
"watchers": 230,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-01-02T17:22:28Z",
|
||||
"updated_at": "2020-01-03T03:00:50Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 91,
|
||||
"watchers_count": 91,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 91,
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 92,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of ESP32\/8266 Wi-Fi vulnerabilties (CVE-2019-12586, CVE-2019-12587, CVE-2019-12588)",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-03T15:08:49Z",
|
||||
"updated_at": "2019-12-31T17:17:41Z",
|
||||
"updated_at": "2020-01-03T00:55:38Z",
|
||||
"pushed_at": "2019-09-08T06:09:11Z",
|
||||
"stargazers_count": 622,
|
||||
"watchers_count": 622,
|
||||
"stargazers_count": 623,
|
||||
"watchers_count": 623,
|
||||
"forks_count": 53,
|
||||
"forks": 53,
|
||||
"watchers": 622,
|
||||
"watchers": 623,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "sploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T00:44:25Z",
|
||||
"updated_at": "2019-12-31T09:01:07Z",
|
||||
"updated_at": "2020-01-03T00:23:53Z",
|
||||
"pushed_at": "2019-12-21T00:56:27Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 58,
|
||||
"watchers_count": 58,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 57,
|
||||
"watchers": 58,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Directory transversal to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T03:40:13Z",
|
||||
"updated_at": "2019-12-16T02:22:08Z",
|
||||
"updated_at": "2020-01-02T23:02:03Z",
|
||||
"pushed_at": "2019-10-15T03:53:55Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 53,
|
||||
"watchers": 54,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-29T02:06:00Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"forks_count": 32,
|
||||
"forks": 32,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 96,
|
||||
"score": 0
|
||||
},
|
||||
|
|
Loading…
Add table
Reference in a new issue