mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/01/31 18:07:26
This commit is contained in:
parent
1dc40c4b8e
commit
79ab761f83
14 changed files with 63 additions and 87 deletions
|
@ -21,28 +21,5 @@
|
|||
"forks": 35,
|
||||
"watchers": 71,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 170086367,
|
||||
"name": "webkit-poc",
|
||||
"full_name": "pr0cf5\/webkit-poc",
|
||||
"owner": {
|
||||
"login": "pr0cf5",
|
||||
"id": 38807869,
|
||||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/38807869?v=4",
|
||||
"html_url": "https:\/\/github.com\/pr0cf5"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pr0cf5\/webkit-poc",
|
||||
"description": "a PoC for CVE-2016-4622",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-11T07:32:02Z",
|
||||
"updated_at": "2019-03-02T09:05:10Z",
|
||||
"pushed_at": "2019-03-02T09:05:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2017-12149 jboss反序列化 可回显",
|
||||
"fork": false,
|
||||
"created_at": "2017-11-28T02:52:47Z",
|
||||
"updated_at": "2020-01-21T22:50:39Z",
|
||||
"updated_at": "2020-01-31T04:09:41Z",
|
||||
"pushed_at": "2019-03-13T08:57:50Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 27,
|
||||
"forks": 27,
|
||||
"watchers": 86,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1,25 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 160582139,
|
||||
"id": 160592463,
|
||||
"name": "CVE-2018-15982",
|
||||
"full_name": "prsecurity\/CVE-2018-15982",
|
||||
"full_name": "FlatL1neAPT\/CVE-2018-15982",
|
||||
"owner": {
|
||||
"login": "prsecurity",
|
||||
"id": 39584779,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/39584779?v=4",
|
||||
"html_url": "https:\/\/github.com\/prsecurity"
|
||||
"login": "FlatL1neAPT",
|
||||
"id": 33692082,
|
||||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/33692082?v=4",
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/prsecurity\/CVE-2018-15982",
|
||||
"html_url": "https:\/\/github.com\/FlatL1neAPT\/CVE-2018-15982",
|
||||
"description": "Flash sources for CVE-2018-15982 used by NK",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-05T21:40:34Z",
|
||||
"updated_at": "2020-01-15T10:43:45Z",
|
||||
"created_at": "2018-12-05T23:41:37Z",
|
||||
"updated_at": "2020-01-31T04:28:28Z",
|
||||
"pushed_at": "2018-12-05T21:42:10Z",
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 47,
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-21T22:45:55Z",
|
||||
"updated_at": "2020-01-29T04:20:27Z",
|
||||
"updated_at": "2020-01-31T04:01:16Z",
|
||||
"pushed_at": "2020-01-05T21:46:25Z",
|
||||
"stargazers_count": 150,
|
||||
"watchers_count": 150,
|
||||
"stargazers_count": 151,
|
||||
"watchers_count": 151,
|
||||
"forks_count": 31,
|
||||
"forks": 31,
|
||||
"watchers": 150,
|
||||
"watchers": 151,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-26T06:58:56Z",
|
||||
"updated_at": "2020-01-29T09:18:33Z",
|
||||
"updated_at": "2020-01-31T07:51:55Z",
|
||||
"pushed_at": "2019-12-26T08:44:54Z",
|
||||
"stargazers_count": 98,
|
||||
"watchers_count": 98,
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 98,
|
||||
"watchers": 99,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2020-01-31T00:00:42Z",
|
||||
"updated_at": "2020-01-31T04:52:08Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 99,
|
||||
"watchers_count": 99,
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"watchers": 99,
|
||||
"watchers": 100,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-14T14:16:54Z",
|
||||
"stargazers_count": 220,
|
||||
"watchers_count": 220,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"forks_count": 52,
|
||||
"forks": 52,
|
||||
"watchers": 220,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Local privilege escalation PoC exploit for CVE-2019-16098",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-10T15:57:36Z",
|
||||
"updated_at": "2020-01-31T02:38:41Z",
|
||||
"updated_at": "2020-01-31T08:05:56Z",
|
||||
"pushed_at": "2019-09-13T20:05:43Z",
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"stargazers_count": 114,
|
||||
"watchers_count": 114,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 113,
|
||||
"watchers": 114,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "CVE-2019-17570 details and proof of concept",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T11:32:18Z",
|
||||
"updated_at": "2020-01-30T09:17:33Z",
|
||||
"updated_at": "2020-01-31T08:29:02Z",
|
||||
"pushed_at": "2020-01-24T11:52:15Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-10T22:56:35Z",
|
||||
"updated_at": "2020-01-31T01:02:20Z",
|
||||
"updated_at": "2020-01-31T08:32:18Z",
|
||||
"pushed_at": "2020-01-18T07:01:29Z",
|
||||
"stargazers_count": 297,
|
||||
"watchers_count": 297,
|
||||
"stargazers_count": 298,
|
||||
"watchers_count": 298,
|
||||
"forks_count": 80,
|
||||
"forks": 80,
|
||||
"watchers": 297,
|
||||
"watchers": 298,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "DFIR notes for Citrix ADC (NetScaler) appliances vulnerable to CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-12T23:13:56Z",
|
||||
"updated_at": "2020-01-30T18:42:00Z",
|
||||
"updated_at": "2020-01-31T05:15:59Z",
|
||||
"pushed_at": "2020-01-29T08:42:44Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 30,
|
||||
"watchers_count": 30,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 29,
|
||||
"watchers": 30,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 153,
|
||||
"watchers_count": 153,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"forks_count": 40,
|
||||
"forks": 40,
|
||||
"watchers": 153,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC for the Remote Desktop Gateway vulnerability - CVE-2020-0609 & CVE-2020-0610",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-24T19:47:45Z",
|
||||
"updated_at": "2020-01-30T14:00:27Z",
|
||||
"updated_at": "2020-01-31T05:13:31Z",
|
||||
"pushed_at": "2020-01-26T12:58:05Z",
|
||||
"stargazers_count": 54,
|
||||
"watchers_count": 54,
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 54,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Juniper Junos Space (CVE-2020-1611) (PoC)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T13:45:21Z",
|
||||
"updated_at": "2020-01-31T02:44:04Z",
|
||||
"updated_at": "2020-01-31T05:45:44Z",
|
||||
"pushed_at": "2020-01-22T14:01:32Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Python exploit of cve-2020-7247",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-30T19:29:27Z",
|
||||
"updated_at": "2020-01-31T02:52:02Z",
|
||||
"updated_at": "2020-01-31T07:15:46Z",
|
||||
"pushed_at": "2020-01-30T19:37:51Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1553,7 +1553,6 @@
|
|||
|
||||
### CVE-2016-4622
|
||||
- [saelo/jscpwn](https://github.com/saelo/jscpwn)
|
||||
- [pr0cf5/webkit-poc](https://github.com/pr0cf5/webkit-poc)
|
||||
|
||||
### CVE-2016-4631
|
||||
- [hansnielsen/tiffdisabler](https://github.com/hansnielsen/tiffdisabler)
|
||||
|
@ -3234,7 +3233,7 @@
|
|||
- [sharmasandeepkr/cve-2018-15968](https://github.com/sharmasandeepkr/cve-2018-15968)
|
||||
|
||||
### CVE-2018-15982
|
||||
- [prsecurity/CVE-2018-15982](https://github.com/prsecurity/CVE-2018-15982)
|
||||
- [FlatL1neAPT/CVE-2018-15982](https://github.com/FlatL1neAPT/CVE-2018-15982)
|
||||
- [AirEvan/CVE-2018-15982_PoC](https://github.com/AirEvan/CVE-2018-15982_PoC)
|
||||
- [Ridter/CVE-2018-15982_EXP](https://github.com/Ridter/CVE-2018-15982_EXP)
|
||||
- [kphongagsorn/adobe-flash-cve2018-15982](https://github.com/kphongagsorn/adobe-flash-cve2018-15982)
|
||||
|
|
Loading…
Reference in a new issue