mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
Auto Update 2021/06/04 06:13:13
This commit is contained in:
parent
bf4bd13168
commit
5fe37f8267
27 changed files with 111 additions and 111 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2021-05-30T05:32:18Z",
|
||||
"updated_at": "2021-06-03T18:46:19Z",
|
||||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2256,
|
||||
"watchers_count": 2256,
|
||||
"stargazers_count": 2257,
|
||||
"watchers_count": 2257,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 2256,
|
||||
"watchers": 2257,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -588,13 +588,13 @@
|
|||
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-16T22:21:54Z",
|
||||
"updated_at": "2021-05-10T19:54:11Z",
|
||||
"updated_at": "2021-06-03T16:10:08Z",
|
||||
"pushed_at": "2020-11-16T22:32:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "generate RTF exploit payload. uses cve-2017-11882, cve-2017-8570, cve-2018-0802, and cve-2018-8174.",
|
||||
"fork": false,
|
||||
"created_at": "2020-11-16T22:21:54Z",
|
||||
"updated_at": "2021-05-10T19:54:11Z",
|
||||
"updated_at": "2021-06-03T16:10:08Z",
|
||||
"pushed_at": "2020-11-16T22:32:12Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-01-08T10:31:22Z",
|
||||
"stargazers_count": 481,
|
||||
"watchers_count": 481,
|
||||
"forks_count": 159,
|
||||
"forks": 159,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"watchers": 481,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2021-06-02T13:32:46Z",
|
||||
"updated_at": "2021-06-03T18:30:16Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1657,
|
||||
"watchers_count": 1657,
|
||||
"stargazers_count": 1658,
|
||||
"watchers_count": 1658,
|
||||
"forks_count": 252,
|
||||
"forks": 252,
|
||||
"watchers": 1657,
|
||||
"watchers": 1658,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit and Mass Pwn3r for CVE-2019-16920",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T17:54:03Z",
|
||||
"updated_at": "2021-02-11T18:08:44Z",
|
||||
"updated_at": "2021-06-03T18:45:54Z",
|
||||
"pushed_at": "2019-12-21T17:31:56Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"forks_count": 14,
|
||||
"forks": 14,
|
||||
"watchers": 26,
|
||||
"watchers": 27,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -684,8 +684,8 @@
|
|||
"pushed_at": "2020-03-25T05:07:43Z",
|
||||
"stargazers_count": 84,
|
||||
"watchers_count": 84,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 84,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repo contains a proof-of-concept for 📱🚀👑⚡, a deserialization vuln for local escalation of privilege to system_server in Android 10. This proof-of-concept only activates a privileged intent.",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-23T14:00:55Z",
|
||||
"updated_at": "2021-04-05T03:37:59Z",
|
||||
"updated_at": "2021-06-03T20:49:09Z",
|
||||
"pushed_at": "2021-02-23T14:03:00Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T06:22:40Z",
|
||||
"updated_at": "2021-05-24T08:21:41Z",
|
||||
"updated_at": "2021-06-03T18:36:21Z",
|
||||
"pushed_at": "2020-02-20T11:03:18Z",
|
||||
"stargazers_count": 180,
|
||||
"watchers_count": 180,
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 48,
|
||||
"forks": 48,
|
||||
"watchers": 180,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": "Test tool for CVE-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-08T08:58:37Z",
|
||||
"updated_at": "2021-06-03T12:23:21Z",
|
||||
"updated_at": "2021-06-03T17:54:27Z",
|
||||
"pushed_at": "2020-10-21T12:10:28Z",
|
||||
"stargazers_count": 1288,
|
||||
"watchers_count": 1288,
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T16:56:51Z",
|
||||
"updated_at": "2021-05-24T08:38:18Z",
|
||||
"updated_at": "2021-06-03T18:26:58Z",
|
||||
"pushed_at": "2020-11-03T09:45:24Z",
|
||||
"stargazers_count": 793,
|
||||
"watchers_count": 793,
|
||||
"stargazers_count": 794,
|
||||
"watchers_count": 794,
|
||||
"forks_count": 228,
|
||||
"forks": 228,
|
||||
"watchers": 793,
|
||||
"watchers": 794,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-06-01T09:38:45Z",
|
||||
"updated_at": "2021-06-03T18:17:01Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 309,
|
||||
"watchers_count": 309,
|
||||
"stargazers_count": 310,
|
||||
"watchers_count": 310,
|
||||
"forks_count": 100,
|
||||
"forks": 100,
|
||||
"watchers": 309,
|
||||
"watchers": 310,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-02-20T17:00:02Z",
|
||||
"updated_at": "2021-04-26T21:17:02Z",
|
||||
"updated_at": "2021-06-03T19:03:22Z",
|
||||
"pushed_at": "2020-03-02T20:25:35Z",
|
||||
"stargazers_count": 34,
|
||||
"watchers_count": 34,
|
||||
"stargazers_count": 35,
|
||||
"watchers_count": 35,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 34,
|
||||
"watchers": 35,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-05-28T17:59:37Z",
|
||||
"updated_at": "2021-06-03T17:39:51Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "BuddyPress is an open source WordPress plugin to build a community site. In releases of BuddyPress from 5.0.0 before 7.2.1 it's possible for a non-privileged, regular user to obtain administrator rights by exploiting an issue in the REST API members endpoint. The vulnerability has been fixed in BuddyPress 7.2.1. Existing installations of the plugin should be updated to this version to mitigate the issue.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T14:12:26Z",
|
||||
"updated_at": "2021-05-31T15:28:34Z",
|
||||
"updated_at": "2021-06-03T16:41:19Z",
|
||||
"pushed_at": "2021-05-31T14:16:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,7 +82,7 @@
|
|||
"description": "arbitrary kernel read\/write in dbutil_2_3.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-30T10:15:10Z",
|
||||
"updated_at": "2021-06-03T13:01:07Z",
|
||||
"updated_at": "2021-06-03T17:32:02Z",
|
||||
"pushed_at": "2021-06-03T14:47:05Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -36,7 +36,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-29T13:07:14Z",
|
||||
"updated_at": "2021-06-03T10:19:10Z",
|
||||
"updated_at": "2021-06-03T16:04:36Z",
|
||||
"pushed_at": "2021-06-03T10:04:41Z",
|
||||
"stargazers_count": 82,
|
||||
"watchers_count": 82,
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2021-21985 vmware vcenter 远程代码执行 EXP",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T09:59:21Z",
|
||||
"updated_at": "2021-06-03T14:42:51Z",
|
||||
"updated_at": "2021-06-03T19:27:38Z",
|
||||
"pushed_at": "2021-06-03T11:07:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC and tools for exploiting CVE-2020-6516 (Chrome) and CVE-2021-24027 (WhatsApp)",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T15:27:25Z",
|
||||
"updated_at": "2021-05-28T17:59:37Z",
|
||||
"updated_at": "2021-06-03T17:39:51Z",
|
||||
"pushed_at": "2021-05-25T11:14:56Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,7 +13,7 @@
|
|||
"description": "This script can be used to gain access to a victim's Samsung Account if they have a specific version of Samsung Members installed on their Samsung Device, and if the victim's device is from the US or Korea region.",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-10T09:23:52Z",
|
||||
"updated_at": "2021-05-11T10:47:32Z",
|
||||
"updated_at": "2021-06-03T21:00:52Z",
|
||||
"pushed_at": "2021-04-28T17:56:04Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2021-05-10T02:09:51Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -730,8 +730,8 @@
|
|||
"pushed_at": "2021-03-24T10:39:34Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit script for CVE-2021-27211",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-15T17:54:49Z",
|
||||
"updated_at": "2021-03-22T16:56:22Z",
|
||||
"updated_at": "2021-06-03T18:37:40Z",
|
||||
"pushed_at": "2021-02-15T17:58:59Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T01:40:47Z",
|
||||
"updated_at": "2021-06-03T13:09:57Z",
|
||||
"updated_at": "2021-06-03T18:03:28Z",
|
||||
"pushed_at": "2021-05-16T05:54:07Z",
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 41,
|
||||
"watchers": 42,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "stack based buffer overflow in MsIo64.sys, Proof of Concept Local Privilege Escalation to nt authority\/system",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-03T12:39:11Z",
|
||||
"updated_at": "2021-06-03T14:03:54Z",
|
||||
"updated_at": "2021-06-03T17:32:25Z",
|
||||
"pushed_at": "2021-06-03T13:57:17Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-31T18:02:39Z",
|
||||
"updated_at": "2021-06-03T14:06:06Z",
|
||||
"updated_at": "2021-06-03T15:40:49Z",
|
||||
"pushed_at": "2021-06-01T15:08:23Z",
|
||||
"stargazers_count": 141,
|
||||
"watchers_count": 141,
|
||||
"stargazers_count": 143,
|
||||
"watchers_count": 143,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 141,
|
||||
"watchers": 143,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-11T10:40:20Z",
|
||||
"updated_at": "2021-05-21T01:58:32Z",
|
||||
"updated_at": "2021-06-03T21:14:52Z",
|
||||
"pushed_at": "2021-05-11T10:42:40Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2021-05-10T02:08:26Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
||||
"fork": false,
|
||||
"created_at": "2021-05-16T16:15:56Z",
|
||||
"updated_at": "2021-06-03T07:00:35Z",
|
||||
"updated_at": "2021-06-03T18:26:53Z",
|
||||
"pushed_at": "2021-05-21T23:58:50Z",
|
||||
"stargazers_count": 721,
|
||||
"watchers_count": 721,
|
||||
"forks_count": 116,
|
||||
"forks": 116,
|
||||
"watchers": 721,
|
||||
"stargazers_count": 720,
|
||||
"watchers_count": 720,
|
||||
"forks_count": 117,
|
||||
"forks": 117,
|
||||
"watchers": 720,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -657,13 +657,13 @@
|
|||
"description": "Root shell PoC for CVE-2021-3156",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-03T19:57:56Z",
|
||||
"updated_at": "2021-06-03T02:04:12Z",
|
||||
"updated_at": "2021-06-03T17:36:57Z",
|
||||
"pushed_at": "2021-02-03T22:28:14Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -726,13 +726,13 @@
|
|||
"description": "CVE-2021-3156: Sudo heap overflow exploit for Debain 10",
|
||||
"fork": false,
|
||||
"created_at": "2021-02-08T18:21:58Z",
|
||||
"updated_at": "2021-05-29T10:48:57Z",
|
||||
"updated_at": "2021-06-03T18:45:03Z",
|
||||
"pushed_at": "2021-05-29T10:48:54Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
Loading…
Reference in a new issue