mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2022/05/30 00:16:19
This commit is contained in:
parent
2d599c9c94
commit
655cb7323c
11 changed files with 35 additions and 91 deletions
|
@ -68,7 +68,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-28T02:47:22Z",
|
||||
"updated_at": "2022-05-28T15:06:54Z",
|
||||
"pushed_at": "2022-05-29T18:04:26Z",
|
||||
"pushed_at": "2022-05-29T18:04:45Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -936,17 +936,17 @@
|
|||
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
|
||||
"fork": false,
|
||||
"created_at": "2015-03-08T19:54:33Z",
|
||||
"updated_at": "2022-04-16T09:13:02Z",
|
||||
"updated_at": "2022-05-29T23:35:24Z",
|
||||
"pushed_at": "2021-02-20T19:41:03Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 43,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 43,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "APOLOGEE is a Python script and Metasploit module that enumerates a hidden directory on Siemens APOGEE PXC BACnet Automation Controllers (all versions prior to V3.5) and TALON TC BACnet Automation Controllers (all versions prior to V3.5). With a 7.5 CVSS, this exploit allows for an attacker to perform an authentication bypass using an alternate path or channel to access hidden directories in the web server. This repository takes advantage of CVE-2017-9947.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-26T01:13:42Z",
|
||||
"updated_at": "2022-05-28T06:06:22Z",
|
||||
"updated_at": "2022-05-29T23:05:25Z",
|
||||
"pushed_at": "2022-05-26T19:14:20Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "proxylogon exploit - CVE-2021-26857",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T17:32:32Z",
|
||||
"updated_at": "2022-05-29T16:59:18Z",
|
||||
"updated_at": "2022-05-29T22:51:56Z",
|
||||
"pushed_at": "2021-03-11T17:34:15Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 35,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 35,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -2176,7 +2176,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-01-28T13:38:24Z",
|
||||
"updated_at": "2022-01-28T13:42:53Z",
|
||||
"pushed_at": "2022-02-09T01:24:59Z",
|
||||
"pushed_at": "2022-05-29T20:00:19Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
|
|
|
@ -313,14 +313,14 @@
|
|||
"pushed_at": "2022-02-24T12:04:51Z",
|
||||
"stargazers_count": 987,
|
||||
"watchers_count": 987,
|
||||
"forks_count": 437,
|
||||
"forks_count": 438,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"log4shell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 437,
|
||||
"forks": 438,
|
||||
"watchers": 987,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -358,33 +358,6 @@
|
|||
"watchers": 123,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437026730,
|
||||
"name": "VictimApp",
|
||||
"full_name": "nkoneko\/VictimApp",
|
||||
"owner": {
|
||||
"login": "nkoneko",
|
||||
"id": 1922341,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1922341?v=4",
|
||||
"html_url": "https:\/\/github.com\/nkoneko"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/nkoneko\/VictimApp",
|
||||
"description": "Vulnerable to CVE-2021-44228. trustURLCodebase is not required.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T15:32:03Z",
|
||||
"updated_at": "2021-12-15T14:43:30Z",
|
||||
"pushed_at": "2021-12-10T22:40:15Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437031223,
|
||||
"name": "pulsar-docker-images-patch-CVE-2021-44228",
|
||||
|
@ -694,33 +667,6 @@
|
|||
"watchers": 1377,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437141854,
|
||||
"name": "cve-2021-44228-workaround-buildpack",
|
||||
"full_name": "alexandreroman\/cve-2021-44228-workaround-buildpack",
|
||||
"owner": {
|
||||
"login": "alexandreroman",
|
||||
"id": 665131,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/665131?v=4",
|
||||
"html_url": "https:\/\/github.com\/alexandreroman"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/alexandreroman\/cve-2021-44228-workaround-buildpack",
|
||||
"description": "Buildpack providing a workaround for CVE-2021-44228 (Log4j RCE exploit)",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-10T23:34:52Z",
|
||||
"updated_at": "2022-01-04T17:48:12Z",
|
||||
"pushed_at": "2021-12-10T23:47:14Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 437141974,
|
||||
"name": "minecraft-log4j-honeypot",
|
||||
|
|
|
@ -1687,17 +1687,17 @@
|
|||
"description": "This repository is developed to analysis and understand DirtyPipe exploit CVE-2022-0847",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-17T04:23:34Z",
|
||||
"updated_at": "2022-05-21T06:39:10Z",
|
||||
"updated_at": "2022-05-29T18:38:57Z",
|
||||
"pushed_at": "2022-05-21T05:43:17Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Documentation and proof of concept code for CVE-2022-24125 and CVE-2022-24126.",
|
||||
"fork": false,
|
||||
"created_at": "2022-01-28T20:37:14Z",
|
||||
"updated_at": "2022-05-26T10:43:41Z",
|
||||
"updated_at": "2022-05-29T22:30:42Z",
|
||||
"pushed_at": "2022-03-22T00:56:07Z",
|
||||
"stargazers_count": 92,
|
||||
"watchers_count": 92,
|
||||
"stargazers_count": 93,
|
||||
"watchers_count": 93,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 92,
|
||||
"watchers": 93,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Atlassian Bitbucket Data Center RCE(CVE-2022-26133) verification and exploitation.",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-09T12:07:51Z",
|
||||
"updated_at": "2022-05-27T17:42:20Z",
|
||||
"updated_at": "2022-05-29T19:22:03Z",
|
||||
"pushed_at": "2022-05-11T02:02:59Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 31,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 32,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 124,
|
||||
"forks": 32,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
|
||||
"fork": false,
|
||||
"created_at": "2022-04-20T21:23:52Z",
|
||||
"updated_at": "2022-05-23T04:13:02Z",
|
||||
"updated_at": "2022-05-29T19:19:34Z",
|
||||
"pushed_at": "2022-04-27T05:52:43Z",
|
||||
"stargazers_count": 277,
|
||||
"watchers_count": 277,
|
||||
"stargazers_count": 278,
|
||||
"watchers_count": 278,
|
||||
"forks_count": 65,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -25,7 +25,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 65,
|
||||
"watchers": 277,
|
||||
"watchers": 278,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -414,7 +414,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2022-05-26T22:02:45Z",
|
||||
"updated_at": "2022-05-26T22:02:56Z",
|
||||
"pushed_at": "2022-05-29T00:53:48Z",
|
||||
"pushed_at": "2022-05-29T19:16:06Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -5555,7 +5555,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [simonis/Log4jPatch](https://github.com/simonis/Log4jPatch)
|
||||
- [christophetd/log4shell-vulnerable-app](https://github.com/christophetd/log4shell-vulnerable-app)
|
||||
- [NorthwaveSecurity/log4jcheck](https://github.com/NorthwaveSecurity/log4jcheck)
|
||||
- [nkoneko/VictimApp](https://github.com/nkoneko/VictimApp)
|
||||
- [lhotari/pulsar-docker-images-patch-CVE-2021-44228](https://github.com/lhotari/pulsar-docker-images-patch-CVE-2021-44228)
|
||||
- [KosmX/CVE-2021-44228-example](https://github.com/KosmX/CVE-2021-44228-example)
|
||||
- [greymd/CVE-2021-44228](https://github.com/greymd/CVE-2021-44228)
|
||||
|
@ -5566,7 +5565,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
|
|||
- [Azeemering/CVE-2021-44228-DFIR-Notes](https://github.com/Azeemering/CVE-2021-44228-DFIR-Notes)
|
||||
- [Puliczek/CVE-2021-44228-PoC-log4j-bypass-words](https://github.com/Puliczek/CVE-2021-44228-PoC-log4j-bypass-words)
|
||||
- [kozmer/log4j-shell-poc](https://github.com/kozmer/log4j-shell-poc)
|
||||
- [alexandreroman/cve-2021-44228-workaround-buildpack](https://github.com/alexandreroman/cve-2021-44228-workaround-buildpack)
|
||||
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
|
||||
- [racoon-rac/CVE-2021-44228](https://github.com/racoon-rac/CVE-2021-44228)
|
||||
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
|
||||
|
|
Loading…
Add table
Reference in a new issue