mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
Auto Update 2020/06/04 00:08:59
This commit is contained in:
parent
c92e113ccb
commit
6b434cf420
24 changed files with 108 additions and 108 deletions
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2241,
|
||||
"watchers_count": 2241,
|
||||
"forks_count": 484,
|
||||
"forks": 484,
|
||||
"forks_count": 483,
|
||||
"forks": 483,
|
||||
"watchers": 2241,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2015-09-10T23:01:09Z",
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 121,
|
||||
"forks": 121,
|
||||
"forks_count": 120,
|
||||
"forks": 120,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2015-1805 root tool",
|
||||
"fork": false,
|
||||
"created_at": "2016-04-01T12:10:14Z",
|
||||
"updated_at": "2020-04-10T02:35:11Z",
|
||||
"updated_at": "2020-06-03T13:53:58Z",
|
||||
"pushed_at": "2017-11-23T20:55:03Z",
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"forks_count": 149,
|
||||
"forks": 149,
|
||||
"watchers": 251,
|
||||
"watchers": 250,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -381,13 +381,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-27T09:59:10Z",
|
||||
"updated_at": "2020-06-03T14:27:42Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-9805",
|
||||
"fork": false,
|
||||
"created_at": "2017-09-09T01:32:57Z",
|
||||
"updated_at": "2020-05-26T07:07:31Z",
|
||||
"updated_at": "2020-06-03T09:50:03Z",
|
||||
"pushed_at": "2017-11-07T19:24:00Z",
|
||||
"stargazers_count": 234,
|
||||
"watchers_count": 234,
|
||||
"stargazers_count": 235,
|
||||
"watchers_count": 235,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 234,
|
||||
"watchers": 235,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-10-03T08:56:37Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
||||
"fork": false,
|
||||
"created_at": "2018-06-24T05:34:05Z",
|
||||
"updated_at": "2020-05-29T16:50:13Z",
|
||||
"updated_at": "2020-06-03T12:50:09Z",
|
||||
"pushed_at": "2020-03-08T00:08:20Z",
|
||||
"stargazers_count": 347,
|
||||
"watchers_count": 347,
|
||||
"stargazers_count": 349,
|
||||
"watchers_count": 349,
|
||||
"forks_count": 320,
|
||||
"forks": 320,
|
||||
"watchers": 347,
|
||||
"watchers": 349,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "exp for https:\/\/research.checkpoint.com\/extracting-code-execution-from-winrar",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-22T04:52:08Z",
|
||||
"updated_at": "2020-05-29T12:55:34Z",
|
||||
"updated_at": "2020-06-03T09:43:55Z",
|
||||
"pushed_at": "2019-08-05T10:45:34Z",
|
||||
"stargazers_count": 399,
|
||||
"watchers_count": 399,
|
||||
"stargazers_count": 400,
|
||||
"watchers_count": 400,
|
||||
"forks_count": 181,
|
||||
"forks": 181,
|
||||
"watchers": 399,
|
||||
"watchers": 400,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "DVR-Exploiter a Bash Script Program Exploit The DVR's Based on CVE-2018-9995",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-23T20:58:40Z",
|
||||
"updated_at": "2020-05-23T16:34:40Z",
|
||||
"updated_at": "2020-06-03T09:57:50Z",
|
||||
"pushed_at": "2018-10-11T16:54:31Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1439,13 +1439,13 @@
|
|||
"description": "Only Hitting PoC [Tested on Windows Server 2008 r2]",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-28T02:25:21Z",
|
||||
"updated_at": "2020-05-15T03:25:08Z",
|
||||
"updated_at": "2020-06-03T10:09:57Z",
|
||||
"pushed_at": "2019-05-28T02:46:19Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2520,13 +2520,13 @@
|
|||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T02:22:29Z",
|
||||
"updated_at": "2020-06-02T07:52:55Z",
|
||||
"updated_at": "2020-06-03T14:14:05Z",
|
||||
"pushed_at": "2020-01-21T03:15:41Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-05-27T08:16:05Z",
|
||||
"updated_at": "2020-06-03T13:54:22Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 104,
|
||||
"watchers_count": 104,
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 104,
|
||||
"watchers": 105,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-01-06T22:34:16Z",
|
||||
"updated_at": "2020-06-02T13:38:53Z",
|
||||
"updated_at": "2020-06-03T09:08:52Z",
|
||||
"pushed_at": "2020-01-07T14:29:45Z",
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 124,
|
||||
"watchers": 125,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Directory transversal to remote code execution",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-15T03:40:13Z",
|
||||
"updated_at": "2020-05-18T10:43:21Z",
|
||||
"updated_at": "2020-06-03T09:52:17Z",
|
||||
"pushed_at": "2019-10-15T03:53:55Z",
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 25,
|
||||
"forks": 25,
|
||||
"watchers": 62,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||||
"fork": false,
|
||||
"created_at": "2018-09-13T09:44:18Z",
|
||||
"updated_at": "2020-05-27T09:59:10Z",
|
||||
"updated_at": "2020-06-03T14:27:42Z",
|
||||
"pushed_at": "2019-08-28T12:05:45Z",
|
||||
"stargazers_count": 191,
|
||||
"watchers_count": 191,
|
||||
"stargazers_count": 192,
|
||||
"watchers_count": 192,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 191,
|
||||
"watchers": 192,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "exploit CVE-2019-7609(kibana RCE) on right way by python2 scripts",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-21T15:31:13Z",
|
||||
"updated_at": "2020-05-25T04:27:55Z",
|
||||
"updated_at": "2020-06-03T12:04:14Z",
|
||||
"pushed_at": "2019-10-23T07:10:35Z",
|
||||
"stargazers_count": 69,
|
||||
"watchers_count": 69,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 69,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This repository contains the sources and documentation for the LVI-LFB Control Flow Hijacking attack PoC (CVE-2020-0551)",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-10T17:00:01Z",
|
||||
"updated_at": "2020-04-25T21:25:41Z",
|
||||
"updated_at": "2020-06-03T10:10:38Z",
|
||||
"pushed_at": "2020-03-10T17:10:12Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 5,
|
||||
"forks": 5,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-07T22:02:25Z",
|
||||
"updated_at": "2020-05-30T12:31:14Z",
|
||||
"updated_at": "2020-06-03T09:41:54Z",
|
||||
"pushed_at": "2020-05-15T09:03:36Z",
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"forks_count": 41,
|
||||
"forks": 41,
|
||||
"watchers": 138,
|
||||
"watchers": 137,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "Exploit and detect tools for CVE-2020-0688",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-01T12:57:32Z",
|
||||
"updated_at": "2020-06-01T18:16:24Z",
|
||||
"updated_at": "2020-06-03T12:25:57Z",
|
||||
"pushed_at": "2020-03-21T05:44:48Z",
|
||||
"stargazers_count": 165,
|
||||
"watchers_count": 165,
|
||||
"stargazers_count": 166,
|
||||
"watchers_count": 166,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 165,
|
||||
"watchers": 166,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2020-04-14T11:38:39Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -82,13 +82,13 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2020-06-03T08:01:18Z",
|
||||
"updated_at": "2020-06-03T14:52:37Z",
|
||||
"pushed_at": "2020-03-13T09:54:16Z",
|
||||
"stargazers_count": 456,
|
||||
"watchers_count": 456,
|
||||
"forks_count": 137,
|
||||
"forks": 137,
|
||||
"watchers": 456,
|
||||
"stargazers_count": 459,
|
||||
"watchers_count": 459,
|
||||
"forks_count": 138,
|
||||
"forks": 138,
|
||||
"watchers": 459,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -404,13 +404,13 @@
|
|||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-12T18:34:40Z",
|
||||
"updated_at": "2020-06-03T06:04:15Z",
|
||||
"updated_at": "2020-06-03T13:45:06Z",
|
||||
"pushed_at": "2020-03-14T10:04:59Z",
|
||||
"stargazers_count": 224,
|
||||
"watchers_count": 224,
|
||||
"stargazers_count": 226,
|
||||
"watchers_count": 226,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 224,
|
||||
"watchers": 226,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -933,13 +933,13 @@
|
|||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-30T11:42:56Z",
|
||||
"updated_at": "2020-06-03T06:51:40Z",
|
||||
"updated_at": "2020-06-03T14:57:48Z",
|
||||
"pushed_at": "2020-04-08T19:27:07Z",
|
||||
"stargazers_count": 916,
|
||||
"watchers_count": 916,
|
||||
"forks_count": 282,
|
||||
"forks": 282,
|
||||
"watchers": 916,
|
||||
"stargazers_count": 922,
|
||||
"watchers_count": 922,
|
||||
"forks_count": 284,
|
||||
"forks": 284,
|
||||
"watchers": 922,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE 2020-10135 a.k.a BIAS (Bluetooth Impersonation Attack)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T07:36:37Z",
|
||||
"updated_at": "2020-06-03T07:03:44Z",
|
||||
"updated_at": "2020-06-03T11:37:40Z",
|
||||
"pushed_at": "2020-06-01T10:11:32Z",
|
||||
"stargazers_count": 9,
|
||||
"watchers_count": 9,
|
||||
"stargazers_count": 10,
|
||||
"watchers_count": 10,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"watchers": 9,
|
||||
"watchers": 10,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": "CVE-2020-10199 Nexus <= 3.21.1 远程代码执行脚本(有回显)",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-16T09:40:15Z",
|
||||
"updated_at": "2020-06-03T09:06:52Z",
|
||||
"updated_at": "2020-06-03T09:49:37Z",
|
||||
"pushed_at": "2020-05-26T10:23:34Z",
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 15,
|
||||
"watchers": 16,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2020-06-01T09:04:18Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"forks_count": 24,
|
||||
"forks": 24,
|
||||
"watchers": 98,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-01T18:26:32Z",
|
||||
"updated_at": "2020-06-03T08:43:59Z",
|
||||
"updated_at": "2020-06-03T12:43:19Z",
|
||||
"pushed_at": "2020-06-02T08:30:22Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 45,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,8 +13,8 @@
|
|||
"description": "Exploit for CVE-2020-9283 based on Go ",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-02T10:55:37Z",
|
||||
"updated_at": "2020-06-02T11:21:10Z",
|
||||
"pushed_at": "2020-06-02T11:22:05Z",
|
||||
"updated_at": "2020-06-03T13:48:43Z",
|
||||
"pushed_at": "2020-06-03T13:48:40Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
Loading…
Add table
Reference in a new issue