Auto Update 2020/06/04 00:08:59

This commit is contained in:
motikan2010-bot 2020-06-04 00:08:59 +09:00
parent c92e113ccb
commit 6b434cf420
24 changed files with 108 additions and 108 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-05-07T19:35:14Z",
"stargazers_count": 2241,
"watchers_count": 2241,
"forks_count": 484,
"forks": 484,
"forks_count": 483,
"forks": 483,
"watchers": 2241,
"score": 0
},

View file

@ -63,8 +63,8 @@
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 121,
"forks": 121,
"forks_count": 120,
"forks": 120,
"watchers": 192,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "CVE-2015-1805 root tool",
"fork": false,
"created_at": "2016-04-01T12:10:14Z",
"updated_at": "2020-04-10T02:35:11Z",
"updated_at": "2020-06-03T13:53:58Z",
"pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 251,
"watchers_count": 251,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 149,
"forks": 149,
"watchers": 251,
"watchers": 250,
"score": 0
},
{

View file

@ -381,13 +381,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-27T09:59:10Z",
"updated_at": "2020-06-03T14:27:42Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 65,
"forks": 65,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "An exploit for Apache Struts CVE-2017-9805",
"fork": false,
"created_at": "2017-09-09T01:32:57Z",
"updated_at": "2020-05-26T07:07:31Z",
"updated_at": "2020-06-03T09:50:03Z",
"pushed_at": "2017-11-07T19:24:00Z",
"stargazers_count": 234,
"watchers_count": 234,
"stargazers_count": 235,
"watchers_count": 235,
"forks_count": 77,
"forks": 77,
"watchers": 234,
"watchers": 235,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2019-10-03T08:56:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-05-29T16:50:13Z",
"updated_at": "2020-06-03T12:50:09Z",
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 349,
"watchers_count": 349,
"forks_count": 320,
"forks": 320,
"watchers": 347,
"watchers": 349,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
"fork": false,
"created_at": "2019-02-22T04:52:08Z",
"updated_at": "2020-05-29T12:55:34Z",
"updated_at": "2020-06-03T09:43:55Z",
"pushed_at": "2019-08-05T10:45:34Z",
"stargazers_count": 399,
"watchers_count": 399,
"stargazers_count": 400,
"watchers_count": 400,
"forks_count": 181,
"forks": 181,
"watchers": 399,
"watchers": 400,
"score": 0
},
{

View file

@ -128,13 +128,13 @@
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
"fork": false,
"created_at": "2018-09-23T20:58:40Z",
"updated_at": "2020-05-23T16:34:40Z",
"updated_at": "2020-06-03T09:57:50Z",
"pushed_at": "2018-10-11T16:54:31Z",
"stargazers_count": 64,
"watchers_count": 64,
"forks_count": 35,
"forks": 35,
"watchers": 64,
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 36,
"forks": 36,
"watchers": 65,
"score": 0
},
{

View file

@ -1439,13 +1439,13 @@
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
"fork": false,
"created_at": "2019-05-28T02:25:21Z",
"updated_at": "2020-05-15T03:25:08Z",
"updated_at": "2020-06-03T10:09:57Z",
"pushed_at": "2019-05-28T02:46:19Z",
"stargazers_count": 111,
"watchers_count": 111,
"stargazers_count": 112,
"watchers_count": 112,
"forks_count": 38,
"forks": 38,
"watchers": 111,
"watchers": 112,
"score": 0
},
{
@ -2520,13 +2520,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-06-02T07:52:55Z",
"updated_at": "2020-06-03T14:14:05Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 10,
"forks": 10,
"watchers": 14,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 11,
"forks": 11,
"watchers": 19,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-12-26T06:58:56Z",
"updated_at": "2020-05-27T08:16:05Z",
"updated_at": "2020-06-03T13:54:22Z",
"pushed_at": "2019-12-26T08:44:54Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 21,
"forks": 21,
"watchers": 104,
"watchers": 105,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2020-01-06T22:34:16Z",
"updated_at": "2020-06-02T13:38:53Z",
"updated_at": "2020-06-03T09:08:52Z",
"pushed_at": "2020-01-07T14:29:45Z",
"stargazers_count": 124,
"watchers_count": 124,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 39,
"forks": 39,
"watchers": 124,
"watchers": 125,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Directory transversal to remote code execution",
"fork": false,
"created_at": "2019-10-15T03:40:13Z",
"updated_at": "2020-05-18T10:43:21Z",
"updated_at": "2020-06-03T09:52:17Z",
"pushed_at": "2019-10-15T03:53:55Z",
"stargazers_count": 62,
"watchers_count": 62,
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 25,
"forks": 25,
"watchers": 62,
"watchers": 63,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2020-05-27T09:59:10Z",
"updated_at": "2020-06-03T14:27:42Z",
"pushed_at": "2019-08-28T12:05:45Z",
"stargazers_count": 191,
"watchers_count": 191,
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 65,
"forks": 65,
"watchers": 191,
"watchers": 192,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
"fork": false,
"created_at": "2019-10-21T15:31:13Z",
"updated_at": "2020-05-25T04:27:55Z",
"updated_at": "2020-06-03T12:04:14Z",
"pushed_at": "2019-10-23T07:10:35Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 31,
"forks": 31,
"watchers": 69,
"watchers": 73,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
"fork": false,
"created_at": "2020-03-10T17:00:01Z",
"updated_at": "2020-04-25T21:25:41Z",
"updated_at": "2020-06-03T10:10:38Z",
"pushed_at": "2020-03-10T17:10:12Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 5,
"forks": 5,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2020-05-30T12:31:14Z",
"updated_at": "2020-06-03T09:41:54Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 138,
"watchers_count": 138,
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 41,
"forks": 41,
"watchers": 138,
"watchers": 137,
"score": 0
}
]

View file

@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-06-01T18:16:24Z",
"updated_at": "2020-06-03T12:25:57Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 165,
"watchers_count": 165,
"stargazers_count": 166,
"watchers_count": 166,
"forks_count": 52,
"forks": 52,
"watchers": 165,
"watchers": 166,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-04-14T11:38:39Z",
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 28,
"score": 0
},
@ -82,13 +82,13 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2020-06-03T08:01:18Z",
"updated_at": "2020-06-03T14:52:37Z",
"pushed_at": "2020-03-13T09:54:16Z",
"stargazers_count": 456,
"watchers_count": 456,
"forks_count": 137,
"forks": 137,
"watchers": 456,
"stargazers_count": 459,
"watchers_count": 459,
"forks_count": 138,
"forks": 138,
"watchers": 459,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-06-03T06:04:15Z",
"updated_at": "2020-06-03T13:45:06Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 224,
"watchers_count": 224,
"stargazers_count": 226,
"watchers_count": 226,
"forks_count": 84,
"forks": 84,
"watchers": 224,
"watchers": 226,
"score": 0
},
{
@ -933,13 +933,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-06-03T06:51:40Z",
"updated_at": "2020-06-03T14:57:48Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 916,
"watchers_count": 916,
"forks_count": 282,
"forks": 282,
"watchers": 916,
"stargazers_count": 922,
"watchers_count": 922,
"forks_count": 284,
"forks": 284,
"watchers": 922,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE 2020-10135 a.k.a BIAS (Bluetooth Impersonation Attack)",
"fork": false,
"created_at": "2020-06-01T07:36:37Z",
"updated_at": "2020-06-03T07:03:44Z",
"updated_at": "2020-06-03T11:37:40Z",
"pushed_at": "2020-06-01T10:11:32Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -82,13 +82,13 @@
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
"fork": false,
"created_at": "2020-04-16T09:40:15Z",
"updated_at": "2020-06-03T09:06:52Z",
"updated_at": "2020-06-03T09:49:37Z",
"pushed_at": "2020-05-26T10:23:34Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-01T09:04:18Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 23,
"forks": 23,
"forks_count": 24,
"forks": 24,
"watchers": 98,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
"updated_at": "2020-06-03T08:43:59Z",
"updated_at": "2020-06-03T12:43:19Z",
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 16,
"forks": 16,
"watchers": 45,
"watchers": 48,
"score": 0
}
]

View file

@ -13,8 +13,8 @@
"description": "Exploit for CVE-2020-9283 based on Go ",
"fork": false,
"created_at": "2020-06-02T10:55:37Z",
"updated_at": "2020-06-02T11:21:10Z",
"pushed_at": "2020-06-02T11:22:05Z",
"updated_at": "2020-06-03T13:48:43Z",
"pushed_at": "2020-06-03T13:48:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,