mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2023/05/13 12:28:37
This commit is contained in:
parent
cf606aaa59
commit
6e34c9956d
17 changed files with 68 additions and 68 deletions
|
@ -71,7 +71,7 @@
|
|||
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
|
||||
"fork": false,
|
||||
"created_at": "2017-01-08T14:19:51Z",
|
||||
"updated_at": "2023-05-12T17:05:06Z",
|
||||
"updated_at": "2023-05-13T10:33:01Z",
|
||||
"pushed_at": "2018-04-07T01:10:06Z",
|
||||
"stargazers_count": 109,
|
||||
"watchers_count": 109,
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2018-19320 LPE Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-19T16:43:52Z",
|
||||
"updated_at": "2023-02-27T19:10:49Z",
|
||||
"updated_at": "2023-05-13T10:01:39Z",
|
||||
"pushed_at": "2021-08-19T16:54:18Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -71,10 +71,10 @@
|
|||
"description": "Unsigned driver loader using CVE-2018-19320",
|
||||
"fork": false,
|
||||
"created_at": "2022-11-12T05:48:13Z",
|
||||
"updated_at": "2023-05-10T14:16:15Z",
|
||||
"updated_at": "2023-05-13T10:02:02Z",
|
||||
"pushed_at": "2023-04-09T13:50:29Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"stargazers_count": 48,
|
||||
"watchers_count": 48,
|
||||
"has_discussions": false,
|
||||
"forks_count": 21,
|
||||
"allow_forking": true,
|
||||
|
@ -83,7 +83,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 21,
|
||||
"watchers": 47,
|
||||
"watchers": 48,
|
||||
"score": 0
|
||||
}
|
||||
]
|
File diff suppressed because one or more lines are too long
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux privilege escalation exploit via snapd (CVE-2019-7304)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T06:02:06Z",
|
||||
"updated_at": "2023-05-04T15:29:23Z",
|
||||
"updated_at": "2023-05-13T09:44:56Z",
|
||||
"pushed_at": "2019-05-09T21:34:26Z",
|
||||
"stargazers_count": 633,
|
||||
"watchers_count": 633,
|
||||
"stargazers_count": 635,
|
||||
"watchers_count": 635,
|
||||
"has_discussions": false,
|
||||
"forks_count": 159,
|
||||
"allow_forking": true,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 159,
|
||||
"watchers": 633,
|
||||
"watchers": 635,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-1337 Windows Print Spooler Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-21T08:01:20Z",
|
||||
"updated_at": "2023-04-23T11:24:16Z",
|
||||
"updated_at": "2023-05-13T11:31:58Z",
|
||||
"pushed_at": "2020-07-21T10:28:42Z",
|
||||
"stargazers_count": 152,
|
||||
"watchers_count": 152,
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"has_discussions": false,
|
||||
"forks_count": 31,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 31,
|
||||
"watchers": 152,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2023-05-12T09:32:07Z",
|
||||
"updated_at": "2023-05-13T10:31:28Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1688,
|
||||
"watchers_count": 1688,
|
||||
"stargazers_count": 1689,
|
||||
"watchers_count": 1689,
|
||||
"has_discussions": false,
|
||||
"forks_count": 588,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 588,
|
||||
"watchers": 1688,
|
||||
"watchers": 1689,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -778,12 +778,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-05-13T04:11:49Z",
|
||||
"updated_at": "2023-05-13T07:34:06Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 909,
|
||||
"watchers_count": 909,
|
||||
"stargazers_count": 910,
|
||||
"watchers_count": 910,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -796,8 +796,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 909,
|
||||
"forks": 115,
|
||||
"watchers": 910,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -249,10 +249,10 @@
|
|||
"description": "PoC for CVE-2021-3129 (Laravel)",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-01T09:09:38Z",
|
||||
"updated_at": "2022-09-03T22:05:43Z",
|
||||
"updated_at": "2023-05-13T07:46:29Z",
|
||||
"pushed_at": "2021-10-09T09:37:05Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"has_discussions": false,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
|
@ -261,7 +261,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1943,7 +1943,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-13T01:02:32Z",
|
||||
"updated_at": "2023-05-13T02:20:36Z",
|
||||
"pushed_at": "2023-05-13T06:12:17Z",
|
||||
"pushed_at": "2023-05-13T07:48:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -4180,10 +4180,10 @@
|
|||
"description": "This repository contains all gathered resources we used during our Incident Reponse on CVE-2021-44228 and CVE-2021-45046 aka Log4Shell.",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T11:34:54Z",
|
||||
"updated_at": "2023-01-30T21:58:00Z",
|
||||
"updated_at": "2023-05-13T12:05:27Z",
|
||||
"pushed_at": "2022-01-13T14:36:04Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
|
@ -4197,7 +4197,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -9532,12 +9532,12 @@
|
|||
"description": "Ansible playbook to verify target Linux hosts using the official Red Hat Log4j detector script RHSB-2021-009 for Log4Shell (CVE-2021-44228).",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-23T13:24:41Z",
|
||||
"updated_at": "2022-07-23T17:39:47Z",
|
||||
"updated_at": "2023-05-13T06:51:06Z",
|
||||
"pushed_at": "2022-01-10T22:21:34Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"has_discussions": false,
|
||||
"forks_count": 2,
|
||||
"forks_count": 3,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -9549,8 +9549,8 @@
|
|||
"security"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1175,7 +1175,7 @@
|
|||
"description": "A collection of exploits and documentation that can be used to exploit the Linux Dirty Pipe vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-12T20:57:24Z",
|
||||
"updated_at": "2023-05-09T11:02:01Z",
|
||||
"updated_at": "2023-05-13T08:27:35Z",
|
||||
"pushed_at": "2022-06-13T19:33:08Z",
|
||||
"stargazers_count": 397,
|
||||
"watchers_count": 397,
|
||||
|
|
|
@ -709,12 +709,12 @@
|
|||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005、One Access的CVE-2022-22954、CVE-2022-22972\/31656以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2023-05-13T04:11:49Z",
|
||||
"updated_at": "2023-05-13T07:34:06Z",
|
||||
"pushed_at": "2022-12-15T04:07:54Z",
|
||||
"stargazers_count": 909,
|
||||
"watchers_count": 909,
|
||||
"stargazers_count": 910,
|
||||
"watchers_count": 910,
|
||||
"has_discussions": false,
|
||||
"forks_count": 114,
|
||||
"forks_count": 115,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
|
@ -727,8 +727,8 @@
|
|||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 909,
|
||||
"forks": 115,
|
||||
"watchers": 910,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -304,10 +304,10 @@
|
|||
"description": "Exploit a vulnerable Spring application with the Spring4Shell (CVE-2022-22965) Vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-31T15:01:12Z",
|
||||
"updated_at": "2023-02-23T15:42:41Z",
|
||||
"updated_at": "2023-05-13T11:01:35Z",
|
||||
"pushed_at": "2022-04-06T15:00:14Z",
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"stargazers_count": 41,
|
||||
"watchers_count": 41,
|
||||
"has_discussions": false,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
|
@ -316,7 +316,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 40,
|
||||
"watchers": 41,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -221,7 +221,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2023-05-02T08:48:35Z",
|
||||
"updated_at": "2023-05-11T05:31:02Z",
|
||||
"pushed_at": "2023-05-08T16:52:44Z",
|
||||
"pushed_at": "2023-05-13T12:25:30Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"has_discussions": false,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
|
||||
"fork": false,
|
||||
"created_at": "2022-03-23T15:03:09Z",
|
||||
"updated_at": "2023-05-13T00:37:52Z",
|
||||
"updated_at": "2023-05-13T08:58:03Z",
|
||||
"pushed_at": "2022-03-26T05:52:15Z",
|
||||
"stargazers_count": 432,
|
||||
"watchers_count": 432,
|
||||
"stargazers_count": 433,
|
||||
"watchers_count": 433,
|
||||
"has_discussions": false,
|
||||
"forks_count": 61,
|
||||
"allow_forking": true,
|
||||
|
@ -25,7 +25,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 61,
|
||||
"watchers": 432,
|
||||
"watchers": 433,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -18,13 +18,13 @@
|
|||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"has_discussions": false,
|
||||
"forks_count": 7,
|
||||
"forks_count": 8,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 8,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -42,10 +42,10 @@
|
|||
"description": "CVE-2023-0386在ubuntu22.04上的提权",
|
||||
"fork": false,
|
||||
"created_at": "2023-05-05T03:02:13Z",
|
||||
"updated_at": "2023-05-13T02:34:11Z",
|
||||
"updated_at": "2023-05-13T11:39:31Z",
|
||||
"pushed_at": "2023-05-08T07:19:34Z",
|
||||
"stargazers_count": 273,
|
||||
"watchers_count": 273,
|
||||
"stargazers_count": 274,
|
||||
"watchers_count": 274,
|
||||
"has_discussions": false,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
|
@ -54,7 +54,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 273,
|
||||
"watchers": 274,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
Loading…
Reference in a new issue