Auto Update 2022/07/05 12:17:50

This commit is contained in:
motikan2010-bot 2022-07-05 21:17:50 +09:00
parent d162cb6f46
commit 811292d843
48 changed files with 662 additions and 546 deletions

View file

@ -17,13 +17,13 @@
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 22,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"forks": 23,
"watchers": 36,
"score": 0
},

View file

@ -444,10 +444,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-06-28T08:15:09Z",
"updated_at": "2022-07-05T07:36:05Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@ -455,7 +455,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 347,
"watchers": 348,
"score": 0
},
{

View file

@ -41,10 +41,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2022-06-22T10:52:07Z",
"updated_at": "2022-07-05T08:51:31Z",
"pushed_at": "2022-03-29T21:56:08Z",
"stargazers_count": 481,
"watchers_count": 481,
"stargazers_count": 482,
"watchers_count": 482,
"forks_count": 121,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 121,
"watchers": 481,
"watchers": 482,
"score": 0
},
{

View file

@ -209,10 +209,10 @@
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
"fork": false,
"created_at": "2019-09-09T15:58:39Z",
"updated_at": "2022-06-16T11:16:04Z",
"updated_at": "2022-07-05T08:40:48Z",
"pushed_at": "2020-01-15T17:01:50Z",
"stargazers_count": 126,
"watchers_count": 126,
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 58,
"allow_forking": true,
"is_template": false,
@ -229,7 +229,7 @@
],
"visibility": "public",
"forks": 58,
"watchers": 126,
"watchers": 125,
"score": 0
},
{

View file

@ -41,7 +41,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-05T03:54:35Z",
"updated_at": "2022-07-05T09:33:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3406,
"watchers_count": 3406,

View file

@ -13,10 +13,10 @@
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具采用JDK 1.8+NetBeans8.2开发软件运行必须安装JDK 1.8或者以上版本。 支持weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
"fork": false,
"created_at": "2018-09-13T09:44:18Z",
"updated_at": "2022-06-28T08:15:09Z",
"updated_at": "2022-07-05T07:36:05Z",
"pushed_at": "2020-10-01T20:20:41Z",
"stargazers_count": 347,
"watchers_count": 347,
"stargazers_count": 348,
"watchers_count": 348,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 114,
"watchers": 347,
"watchers": 348,
"score": 0
},
{
@ -181,10 +181,10 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2022-06-13T07:35:45Z",
"updated_at": "2022-07-05T10:27:21Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 420,
"watchers_count": 420,
"stargazers_count": 421,
"watchers_count": 421,
"forks_count": 162,
"allow_forking": true,
"is_template": false,
@ -192,7 +192,7 @@
"topics": [],
"visibility": "public",
"forks": 162,
"watchers": 420,
"watchers": 421,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Page Cache Side Channel Attacks (CVE-2019-5489) proof of concept for Linux",
"fork": false,
"created_at": "2019-12-06T05:37:08Z",
"updated_at": "2022-03-01T08:57:54Z",
"updated_at": "2022-07-05T07:20:44Z",
"pushed_at": "2021-10-02T00:15:11Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -17,13 +17,13 @@
"pushed_at": "2019-02-25T07:37:07Z",
"stargazers_count": 148,
"watchers_count": 148,
"forks_count": 57,
"forks_count": 56,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 57,
"forks": 56,
"watchers": 148,
"score": 0
},

View file

@ -1054,10 +1054,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2022-07-03T15:31:26Z",
"updated_at": "2022-07-05T09:34:29Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1200,
"watchers_count": 1200,
"stargazers_count": 1202,
"watchers_count": 1202,
"forks_count": 372,
"allow_forking": true,
"is_template": false,
@ -1071,7 +1071,7 @@
],
"visibility": "public",
"forks": 372,
"watchers": 1200,
"watchers": 1202,
"score": 0
},
{

View file

@ -1634,7 +1634,7 @@
"fork": false,
"created_at": "2022-06-23T07:18:17Z",
"updated_at": "2022-07-04T13:52:48Z",
"pushed_at": "2022-07-04T06:45:59Z",
"pushed_at": "2022-07-05T09:50:45Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,

View file

@ -13,7 +13,7 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-07-05T03:54:35Z",
"updated_at": "2022-07-05T09:33:34Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3406,
"watchers_count": 3406,

View file

@ -125,10 +125,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-06-29T09:39:00Z",
"updated_at": "2022-07-05T09:34:37Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 973,
"watchers_count": 973,
"stargazers_count": 974,
"watchers_count": 974,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 973,
"watchers": 974,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Bypassing NTFS permissions to read any files as unprivileged user.",
"fork": false,
"created_at": "2020-10-21T15:38:22Z",
"updated_at": "2022-06-09T16:31:29Z",
"updated_at": "2022-07-05T07:20:25Z",
"pushed_at": "2020-10-21T15:39:00Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 178,
"watchers": 179,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for VMware Cloud Director RCE (CVE-2020-3956)",
"fork": false,
"created_at": "2020-06-01T18:26:32Z",
"updated_at": "2022-06-20T12:51:13Z",
"updated_at": "2022-07-05T07:20:48Z",
"pushed_at": "2020-06-02T08:30:22Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 84,
"watchers": 83,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Spring 安全漏洞 CVE-2020-5421复现 ",
"fork": false,
"created_at": "2021-01-10T12:26:00Z",
"updated_at": "2021-06-28T01:37:18Z",
"updated_at": "2022-07-05T09:12:58Z",
"pushed_at": "2021-01-10T12:48:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -41,10 +41,10 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2022-07-04T16:10:53Z",
"updated_at": "2022-07-05T11:34:58Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1574,
"watchers_count": 1574,
"stargazers_count": 1575,
"watchers_count": 1575,
"forks_count": 567,
"allow_forking": true,
"is_template": false,
@ -52,7 +52,7 @@
"topics": [],
"visibility": "public",
"forks": 567,
"watchers": 1574,
"watchers": 1575,
"score": 0
},
{

View file

@ -196,10 +196,10 @@
"description": "Cobalt Strike (CS) Beacon Object File (BOF) foundation for kernel exploitation using CVE-2021-21551.",
"fork": false,
"created_at": "2022-06-25T11:13:45Z",
"updated_at": "2022-07-01T19:02:02Z",
"updated_at": "2022-07-05T09:47:54Z",
"pushed_at": "2022-07-01T19:02:25Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 16,
"allow_forking": true,
"is_template": false,
@ -215,7 +215,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -132,10 +132,10 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2022-07-04T07:50:44Z",
"updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 342,
"watchers_count": 342,
"stargazers_count": 341,
"watchers_count": 341,
"forks_count": 74,
"allow_forking": true,
"is_template": false,
@ -143,7 +143,7 @@
"topics": [],
"visibility": "public",
"forks": 74,
"watchers": 342,
"watchers": 341,
"score": 0
},
{
@ -160,10 +160,10 @@
"description": "cve-2021-21985 exploit",
"fork": false,
"created_at": "2021-06-03T12:17:06Z",
"updated_at": "2022-06-28T14:16:29Z",
"updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2022-01-10T07:01:58Z",
"stargazers_count": 101,
"watchers_count": 101,
"stargazers_count": 100,
"watchers_count": 100,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
@ -171,7 +171,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 101,
"watchers": 100,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Gitlab CI Lint API未授权 SSRF漏洞 (CVE-2021-22214)",
"fork": false,
"created_at": "2021-06-22T03:04:50Z",
"updated_at": "2022-06-17T03:05:38Z",
"updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-22T04:35:08Z",
"stargazers_count": 63,
"watchers_count": 63,
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 63,
"watchers": 62,
"score": 0
},
{

View file

@ -214,10 +214,10 @@
"description": "F5 BIG-IP远程代码执行cve-2021-22986批量检测命令执行利用",
"fork": false,
"created_at": "2021-03-26T03:32:06Z",
"updated_at": "2021-12-15T14:41:44Z",
"updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-26T05:09:54Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -225,7 +225,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 11,
"watchers": 10,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2022-06-29T09:39:00Z",
"updated_at": "2022-07-05T09:34:37Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 973,
"watchers_count": 973,
"stargazers_count": 974,
"watchers_count": 974,
"forks_count": 306,
"allow_forking": true,
"is_template": false,
@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 306,
"watchers": 973,
"watchers": 974,
"score": 0
},
{

View file

@ -166,10 +166,10 @@
"description": "PoC for CVE-2021-26855 -Just a checker-",
"fork": false,
"created_at": "2021-03-06T23:12:22Z",
"updated_at": "2022-05-03T06:37:51Z",
"updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-09T22:07:46Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -177,7 +177,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"watchers": 17,
"score": 0
},
{
@ -281,10 +281,10 @@
"description": "CVE-2021-26855 exp",
"fork": false,
"created_at": "2021-03-08T08:39:05Z",
"updated_at": "2022-06-09T03:00:43Z",
"updated_at": "2022-07-05T07:21:07Z",
"pushed_at": "2021-03-08T08:09:01Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 110,
"watchers_count": 110,
"forks_count": 75,
"allow_forking": true,
"is_template": false,
@ -292,7 +292,7 @@
"topics": [],
"visibility": "public",
"forks": 75,
"watchers": 112,
"watchers": 110,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2",
"fork": false,
"created_at": "2021-05-16T01:40:47Z",
"updated_at": "2022-06-30T07:46:24Z",
"updated_at": "2022-07-05T12:00:48Z",
"pushed_at": "2021-05-16T05:54:07Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 59,
"watchers": 60,
"score": 0
},
{

View file

@ -1,30 +0,0 @@
[
{
"id": 411162655,
"name": "CVE-2021-30632",
"full_name": "CrackerCat\/CVE-2021-30632",
"owner": {
"login": "CrackerCat",
"id": 17995064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17995064?v=4",
"html_url": "https:\/\/github.com\/CrackerCat"
},
"html_url": "https:\/\/github.com\/CrackerCat\/CVE-2021-30632",
"description": null,
"fork": false,
"created_at": "2021-09-28T06:27:49Z",
"updated_at": "2022-02-16T03:32:22Z",
"pushed_at": "2021-12-13T06:02:21Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
"fork": false,
"created_at": "2021-05-16T16:15:56Z",
"updated_at": "2022-07-03T06:04:11Z",
"updated_at": "2022-07-05T07:21:08Z",
"pushed_at": "2021-06-12T08:27:09Z",
"stargazers_count": 813,
"watchers_count": 813,
"stargazers_count": 812,
"watchers_count": 812,
"forks_count": 137,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 137,
"watchers": 813,
"watchers": 812,
"score": 0
},
{

View file

@ -125,10 +125,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2022-06-23T16:11:34Z",
"updated_at": "2022-07-05T07:21:06Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 22,
"watchers": 54,
"watchers": 53,
"score": 0
},
{

View file

@ -75,10 +75,10 @@
"description": "CVE-2021-4034 1day",
"fork": false,
"created_at": "2022-01-25T23:51:37Z",
"updated_at": "2022-07-05T02:53:15Z",
"updated_at": "2022-07-05T11:39:34Z",
"pushed_at": "2022-06-08T04:00:28Z",
"stargazers_count": 1596,
"watchers_count": 1596,
"stargazers_count": 1597,
"watchers_count": 1597,
"forks_count": 462,
"allow_forking": true,
"is_template": false,
@ -86,7 +86,7 @@
"topics": [],
"visibility": "public",
"forks": 462,
"watchers": 1596,
"watchers": 1597,
"score": 0
},
{
@ -159,11 +159,11 @@
"description": "PoC for PwnKit: Local Privilege Escalation Vulnerability in polkits pkexec (CVE-2021-4034)",
"fork": false,
"created_at": "2022-01-26T00:56:36Z",
"updated_at": "2022-07-03T21:31:34Z",
"updated_at": "2022-07-05T09:34:55Z",
"pushed_at": "2022-02-12T05:22:58Z",
"stargazers_count": 875,
"watchers_count": 875,
"forks_count": 285,
"stargazers_count": 876,
"watchers_count": 876,
"forks_count": 286,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -173,8 +173,8 @@
"poc"
],
"visibility": "public",
"forks": 285,
"watchers": 875,
"forks": 286,
"watchers": 876,
"score": 0
},
{

View file

@ -45,7 +45,7 @@
"pushed_at": "2022-06-22T20:21:42Z",
"stargazers_count": 683,
"watchers_count": 683,
"forks_count": 157,
"forks_count": 158,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -58,7 +58,7 @@
"remote-code-execution"
],
"visibility": "public",
"forks": 157,
"forks": 158,
"watchers": 683,
"score": 0
},

View file

@ -13,18 +13,18 @@
"description": "CVE-2021-41773 Path Traversal vulnerability in Apache 2.4.49.",
"fork": false,
"created_at": "2021-10-05T16:13:38Z",
"updated_at": "2022-06-10T09:08:10Z",
"updated_at": "2022-07-05T07:53:35Z",
"pushed_at": "2022-03-10T14:02:09Z",
"stargazers_count": 39,
"watchers_count": 39,
"forks_count": 11,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 39,
"forks": 12,
"watchers": 40,
"score": 0
},
{

View file

@ -227,34 +227,6 @@
"watchers": 1,
"score": 0
},
{
"id": 437761790,
"name": "Grafana-CVE-2021-43798",
"full_name": "Awrrays\/Grafana-CVE-2021-43798",
"owner": {
"login": "Awrrays",
"id": 55682880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55682880?v=4",
"html_url": "https:\/\/github.com\/Awrrays"
},
"html_url": "https:\/\/github.com\/Awrrays\/Grafana-CVE-2021-43798",
"description": "Grafana任意文件读取",
"fork": false,
"created_at": "2021-12-13T06:32:39Z",
"updated_at": "2022-04-05T16:48:25Z",
"pushed_at": "2021-12-13T06:36:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 438335194,
"name": "CVE-2021-43798",

View file

@ -525,10 +525,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-07-04T19:03:11Z",
"updated_at": "2022-07-05T09:35:02Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 814,
"watchers_count": 814,
"stargazers_count": 815,
"watchers_count": 815,
"forks_count": 131,
"allow_forking": true,
"is_template": false,
@ -556,7 +556,7 @@
],
"visibility": "public",
"forks": 131,
"watchers": 814,
"watchers": 815,
"score": 0
},
{
@ -689,34 +689,6 @@
"watchers": 42,
"score": 0
},
{
"id": 437170557,
"name": "sample-ldap-exploit",
"full_name": "phoswald\/sample-ldap-exploit",
"owner": {
"login": "phoswald",
"id": 12776329,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12776329?v=4",
"html_url": "https:\/\/github.com\/phoswald"
},
"html_url": "https:\/\/github.com\/phoswald\/sample-ldap-exploit",
"description": "A short demo of CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T02:45:39Z",
"updated_at": "2022-05-22T14:45:42Z",
"pushed_at": "2021-12-13T09:20:35Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 7,
"score": 0
},
{
"id": 437174339,
"name": "jndi-ldap-test-server",
@ -765,10 +737,10 @@
"description": "CVE-2021-44228 Log4j2 BurpSuite Scanner,Customize ceye.io api or other apis,including internal networks",
"fork": false,
"created_at": "2021-12-11T07:19:11Z",
"updated_at": "2022-07-04T09:27:12Z",
"updated_at": "2022-07-05T07:43:08Z",
"pushed_at": "2022-06-02T02:16:13Z",
"stargazers_count": 399,
"watchers_count": 399,
"stargazers_count": 400,
"watchers_count": 400,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
@ -781,7 +753,35 @@
],
"visibility": "public",
"forks": 86,
"watchers": 399,
"watchers": 400,
"score": 0
},
{
"id": 437248883,
"name": "log4shell-mitigation-tester",
"full_name": "lhotari\/log4shell-mitigation-tester",
"owner": {
"login": "lhotari",
"id": 66864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66864?v=4",
"html_url": "https:\/\/github.com\/lhotari"
},
"html_url": "https:\/\/github.com\/lhotari\/log4shell-mitigation-tester",
"description": "Log4Shell CVE-2021-44228 mitigation tester",
"fork": false,
"created_at": "2021-12-11T10:16:58Z",
"updated_at": "2021-12-21T20:05:48Z",
"pushed_at": "2021-12-13T17:24:37Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 16,
"score": 0
},
{
@ -853,34 +853,6 @@
"watchers": 2,
"score": 0
},
{
"id": 437265792,
"name": "log4j2021_vul_test",
"full_name": "gauthamg\/log4j2021_vul_test",
"owner": {
"login": "gauthamg",
"id": 8748677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8748677?v=4",
"html_url": "https:\/\/github.com\/gauthamg"
},
"html_url": "https:\/\/github.com\/gauthamg\/log4j2021_vul_test",
"description": "Test the CVE https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T11:41:04Z",
"updated_at": "2021-12-13T06:49:35Z",
"pushed_at": "2021-12-13T06:49:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437273514,
"name": "CVE-2021-44228-playground",
@ -965,34 +937,6 @@
"watchers": 11,
"score": 0
},
{
"id": 437316134,
"name": "log4j2-vulnerable-spring-app",
"full_name": "zzzz0317\/log4j2-vulnerable-spring-app",
"owner": {
"login": "zzzz0317",
"id": 16097046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16097046?v=4",
"html_url": "https:\/\/github.com\/zzzz0317"
},
"html_url": "https:\/\/github.com\/zzzz0317\/log4j2-vulnerable-spring-app",
"description": "CVE-2021-44228",
"fork": false,
"created_at": "2021-12-11T15:18:42Z",
"updated_at": "2022-03-23T06:42:48Z",
"pushed_at": "2021-12-13T02:14:14Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 437319619,
"name": "test-44228",
@ -1307,34 +1251,6 @@
"watchers": 14,
"score": 0
},
{
"id": 437518939,
"name": "CVE-2021-44228-docker-example",
"full_name": "DiCanio\/CVE-2021-44228-docker-example",
"owner": {
"login": "DiCanio",
"id": 6052859,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6052859?v=4",
"html_url": "https:\/\/github.com\/DiCanio"
},
"html_url": "https:\/\/github.com\/DiCanio\/CVE-2021-44228-docker-example",
"description": null,
"fork": false,
"created_at": "2021-12-12T10:53:15Z",
"updated_at": "2021-12-13T03:58:51Z",
"pushed_at": "2021-12-13T00:03:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 437526168,
"name": "Log4JShell-Bytecode-Detector",
@ -1550,34 +1466,6 @@
"watchers": 0,
"score": 0
},
{
"id": 437574258,
"name": "log4j-poc",
"full_name": "fireflyingup\/log4j-poc",
"owner": {
"login": "fireflyingup",
"id": 48504204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48504204?v=4",
"html_url": "https:\/\/github.com\/fireflyingup"
},
"html_url": "https:\/\/github.com\/fireflyingup\/log4j-poc",
"description": "CVE-2021-44228 test demo",
"fork": false,
"created_at": "2021-12-12T14:54:25Z",
"updated_at": "2021-12-13T05:10:53Z",
"pushed_at": "2021-12-13T05:10:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437582859,
"name": "log4j-jndi-be-gone",
@ -1792,43 +1680,6 @@
"watchers": 0,
"score": 0
},
{
"id": 437660117,
"name": "Log4j-RCE",
"full_name": "momos1337\/Log4j-RCE",
"owner": {
"login": "momos1337",
"id": 64172550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64172550?v=4",
"html_url": "https:\/\/github.com\/momos1337"
},
"html_url": "https:\/\/github.com\/momos1337\/Log4j-RCE",
"description": "Log4j RCE - (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-12T21:26:44Z",
"updated_at": "2021-12-23T14:39:40Z",
"pushed_at": "2021-12-13T00:54:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bughunter",
"cve-2021-44228",
"exploit",
"hacking",
"log4j",
"log4j-rce",
"rce",
"remote-code-execution"
],
"visibility": "public",
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 437660360,
"name": "cve-2021-44228-log4j-mitigation",
@ -1919,6 +1770,41 @@
"watchers": 330,
"score": 0
},
{
"id": 437681598,
"name": "CVE-2021-44228-PoC",
"full_name": "sunnyvale-it\/CVE-2021-44228-PoC",
"owner": {
"login": "sunnyvale-it",
"id": 44291039,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291039?v=4",
"html_url": "https:\/\/github.com\/sunnyvale-it"
},
"html_url": "https:\/\/github.com\/sunnyvale-it\/CVE-2021-44228-PoC",
"description": "CVE-2021-44228 (Log4Shell) Proof of Concept",
"fork": false,
"created_at": "2021-12-12T23:37:39Z",
"updated_at": "2022-03-18T18:44:50Z",
"pushed_at": "2021-12-13T21:23:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cybersecurity",
"java",
"log4j",
"log4j2",
"security"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 437685288,
"name": "log4j2-CVE-2021-44228",
@ -2031,34 +1917,6 @@
"watchers": 2,
"score": 0
},
{
"id": 437704633,
"name": "Log4j-check",
"full_name": "bigsizeme\/Log4j-check",
"owner": {
"login": "bigsizeme",
"id": 17845094,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17845094?v=4",
"html_url": "https:\/\/github.com\/bigsizeme"
},
"html_url": "https:\/\/github.com\/bigsizeme\/Log4j-check",
"description": "log4J burp被扫插件、CVE-2021-44228、支持dnclog.cn和burp内置DNS、可配合JNDIExploit生成payload",
"fork": false,
"created_at": "2021-12-13T01:55:51Z",
"updated_at": "2022-06-29T07:51:19Z",
"pushed_at": "2021-12-13T09:18:19Z",
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 44,
"score": 0
},
{
"id": 437709337,
"name": "exploit-CVE-2021-44228",
@ -2343,41 +2201,6 @@
"watchers": 1,
"score": 0
},
{
"id": 437784907,
"name": "aws-log4j-mitigations",
"full_name": "markuman\/aws-log4j-mitigations",
"owner": {
"login": "markuman",
"id": 3920157,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3920157?v=4",
"html_url": "https:\/\/github.com\/markuman"
},
"html_url": "https:\/\/github.com\/markuman\/aws-log4j-mitigations",
"description": "CVE-2021-44228 log4j mitigation using aws wafv2 with ansible",
"fork": false,
"created_at": "2021-12-13T08:01:55Z",
"updated_at": "2021-12-13T08:05:42Z",
"pushed_at": "2021-12-13T08:03:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ansible",
"aws",
"cve-2021-44228",
"log4j",
"mitigation",
"waf"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437788180,
"name": "Log4shell",
@ -2854,6 +2677,34 @@
"watchers": 4,
"score": 0
},
{
"id": 437902732,
"name": "JndiLookup",
"full_name": "madCdan\/JndiLookup",
"owner": {
"login": "madCdan",
"id": 10784600,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10784600?v=4",
"html_url": "https:\/\/github.com\/madCdan"
},
"html_url": "https:\/\/github.com\/madCdan\/JndiLookup",
"description": "Some tools to help mitigating Apache Log4j 2 CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T14:22:34Z",
"updated_at": "2021-12-18T02:12:49Z",
"pushed_at": "2021-12-13T17:07:42Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 437904012,
"name": "MC-Log4j-Patcher",
@ -3064,6 +2915,34 @@
"watchers": 11,
"score": 0
},
{
"id": 437960695,
"name": "CVE-2021-44228",
"full_name": "taurusxin\/CVE-2021-44228",
"owner": {
"login": "taurusxin",
"id": 17809960,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17809960?v=4",
"html_url": "https:\/\/github.com\/taurusxin"
},
"html_url": "https:\/\/github.com\/taurusxin\/CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-13T17:17:37Z",
"updated_at": "2021-12-13T17:22:22Z",
"pushed_at": "2021-12-13T17:22:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437965181,
"name": "log4j2-prosecutor",
@ -3094,6 +2973,34 @@
"watchers": 0,
"score": 0
},
{
"id": 437968616,
"name": "CVE-2021-44228_Log4Shell",
"full_name": "yanghaoi\/CVE-2021-44228_Log4Shell",
"owner": {
"login": "yanghaoi",
"id": 21354684,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21354684?v=4",
"html_url": "https:\/\/github.com\/yanghaoi"
},
"html_url": "https:\/\/github.com\/yanghaoi\/CVE-2021-44228_Log4Shell",
"description": "Log4Shell A test for CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T17:44:01Z",
"updated_at": "2021-12-13T18:03:51Z",
"pushed_at": "2021-12-13T18:06:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 437983994,
"name": "log4j_checker",
@ -3131,6 +3038,90 @@
"watchers": 8,
"score": 0
},
{
"id": 437988861,
"name": "Log4j-IOCs",
"full_name": "threatmonit\/Log4j-IOCs",
"owner": {
"login": "threatmonit",
"id": 90388073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90388073?v=4",
"html_url": "https:\/\/github.com\/threatmonit"
},
"html_url": "https:\/\/github.com\/threatmonit\/Log4j-IOCs",
"description": "Public IOCs about log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T18:52:19Z",
"updated_at": "2022-01-18T23:50:50Z",
"pushed_at": "2021-12-13T19:11:30Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 437995131,
"name": "l4j-info",
"full_name": "ben-smash\/l4j-info",
"owner": {
"login": "ben-smash",
"id": 95368649,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95368649?v=4",
"html_url": "https:\/\/github.com\/ben-smash"
},
"html_url": "https:\/\/github.com\/ben-smash\/l4j-info",
"description": "Compiling links of value i find regarding CVE-2021-44228",
"fork": false,
"created_at": "2021-12-13T19:14:23Z",
"updated_at": "2021-12-13T21:11:09Z",
"pushed_at": "2021-12-13T21:11:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438003225,
"name": "log4j-test",
"full_name": "strawhatasif\/log4j-test",
"owner": {
"login": "strawhatasif",
"id": 10750101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10750101?v=4",
"html_url": "https:\/\/github.com\/strawhatasif"
},
"html_url": "https:\/\/github.com\/strawhatasif\/log4j-test",
"description": "Demonstration of CVE-2021-44228 with a possible strategic fix.",
"fork": false,
"created_at": "2021-12-13T19:43:01Z",
"updated_at": "2021-12-13T20:26:40Z",
"pushed_at": "2021-12-13T20:26:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438012376,
"name": "nmap-log4shell",
@ -3166,6 +3157,34 @@
"watchers": 45,
"score": 0
},
{
"id": 438013062,
"name": "Siem-queries-for-CVE-2021-44228",
"full_name": "tica506\/Siem-queries-for-CVE-2021-44228",
"owner": {
"login": "tica506",
"id": 93236626,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/93236626?v=4",
"html_url": "https:\/\/github.com\/tica506"
},
"html_url": "https:\/\/github.com\/tica506\/Siem-queries-for-CVE-2021-44228",
"description": null,
"fork": false,
"created_at": "2021-12-13T20:19:57Z",
"updated_at": "2021-12-13T20:56:54Z",
"pushed_at": "2021-12-13T20:56:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438021782,
"name": "log4shell-example",
@ -3230,6 +3249,34 @@
"watchers": 4,
"score": 0
},
{
"id": 438028657,
"name": "log4j2-CVE-2021-44228-poc-local",
"full_name": "snatalius\/log4j2-CVE-2021-44228-poc-local",
"owner": {
"login": "snatalius",
"id": 22771118,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22771118?v=4",
"html_url": "https:\/\/github.com\/snatalius"
},
"html_url": "https:\/\/github.com\/snatalius\/log4j2-CVE-2021-44228-poc-local",
"description": "Just a personal proof of concept of CVE-2021-44228 on log4j2",
"fork": false,
"created_at": "2021-12-13T21:21:53Z",
"updated_at": "2021-12-13T21:21:56Z",
"pushed_at": "2021-12-13T21:21:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 438032780,
"name": "CVE-2021-44228",
@ -3599,10 +3646,10 @@
"description": "A fully automated, reliable, super-fast, mass scanning and validation toolkit for the Log4J RCE CVE-2021-44228 vulnerability.",
"fork": false,
"created_at": "2021-12-14T06:37:59Z",
"updated_at": "2022-07-04T00:10:34Z",
"updated_at": "2022-07-05T09:27:59Z",
"pushed_at": "2022-04-24T08:56:47Z",
"stargazers_count": 321,
"watchers_count": 321,
"stargazers_count": 322,
"watchers_count": 322,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
@ -3616,7 +3663,7 @@
],
"visibility": "public",
"forks": 45,
"watchers": 321,
"watchers": 322,
"score": 0
},
{
@ -3779,10 +3826,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false,
"created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-06-29T19:36:55Z",
"updated_at": "2022-07-05T09:29:39Z",
"pushed_at": "2022-01-27T16:08:20Z",
"stargazers_count": 425,
"watchers_count": 425,
"stargazers_count": 426,
"watchers_count": 426,
"forks_count": 94,
"allow_forking": true,
"is_template": false,
@ -3799,7 +3846,7 @@
],
"visibility": "public",
"forks": 94,
"watchers": 425,
"watchers": 426,
"score": 0
},
{
@ -4040,18 +4087,18 @@
"description": "Tools for investigating Log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T19:08:14Z",
"updated_at": "2022-06-17T15:17:52Z",
"updated_at": "2022-07-05T08:10:28Z",
"pushed_at": "2021-12-23T21:03:08Z",
"stargazers_count": 86,
"watchers_count": 86,
"forks_count": 11,
"stargazers_count": 87,
"watchers_count": 87,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 86,
"forks": 12,
"watchers": 87,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-0543_RCE,Redis Lua沙盒绕过 命令执行",
"fork": false,
"created_at": "2022-03-16T06:41:50Z",
"updated_at": "2022-06-21T05:56:17Z",
"updated_at": "2022-07-05T10:35:04Z",
"pushed_at": "2022-03-16T06:48:01Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 48,
"watchers": 51,
"score": 0
}
]

View file

@ -209,10 +209,10 @@
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
"fork": false,
"created_at": "2022-05-09T10:22:31Z",
"updated_at": "2022-07-01T12:56:19Z",
"updated_at": "2022-07-05T07:31:32Z",
"pushed_at": "2022-06-28T18:14:40Z",
"stargazers_count": 71,
"watchers_count": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
@ -220,7 +220,7 @@
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 71,
"watchers": 72,
"score": 0
},
{
@ -520,10 +520,10 @@
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
"fork": false,
"created_at": "2022-05-10T02:57:31Z",
"updated_at": "2022-06-25T15:12:05Z",
"updated_at": "2022-07-05T08:55:52Z",
"pushed_at": "2022-05-10T08:38:58Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -531,7 +531,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"watchers": 9,
"score": 0
},
{

30
2022/CVE-2022-20124.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 510660359,
"name": "Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"full_name": "nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/Frameworks_base_AOSP10_r33__CVE-2022-20124-",
"description": null,
"fork": false,
"created_at": "2022-07-05T08:59:44Z",
"updated_at": "2022-07-05T09:52:45Z",
"pushed_at": "2022-07-05T09:52:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

30
2022/CVE-2022-20135.json Normal file
View file

@ -0,0 +1,30 @@
[
{
"id": 510684846,
"name": "frameworks_base_AOSP10_r33_CVE-2022-20135-",
"full_name": "nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"owner": {
"login": "nidhi7598",
"id": 106973537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106973537?v=4",
"html_url": "https:\/\/github.com\/nidhi7598"
},
"html_url": "https:\/\/github.com\/nidhi7598\/frameworks_base_AOSP10_r33_CVE-2022-20135-",
"description": null,
"fork": false,
"created_at": "2022-07-05T10:15:49Z",
"updated_at": "2022-07-05T10:42:21Z",
"pushed_at": "2022-07-05T10:41:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -73,13 +73,13 @@
"pushed_at": "2022-02-04T02:20:47Z",
"stargazers_count": 167,
"watchers_count": 167,
"forks_count": 44,
"forks_count": 45,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 44,
"forks": 45,
"watchers": 167,
"score": 0
},

View file

@ -1258,18 +1258,18 @@
"description": "CVE-2022-22947 注入Godzilla内存马",
"fork": false,
"created_at": "2022-04-26T05:48:27Z",
"updated_at": "2022-07-05T05:52:29Z",
"updated_at": "2022-07-05T09:22:56Z",
"pushed_at": "2022-04-26T05:55:58Z",
"stargazers_count": 81,
"watchers_count": 81,
"forks_count": 12,
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 81,
"forks": 13,
"watchers": 84,
"score": 0
},
{

View file

@ -1819,10 +1819,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:30:29Z",
"updated_at": "2022-07-05T02:30:45Z",
"updated_at": "2022-07-05T09:20:53Z",
"pushed_at": "2022-07-05T02:32:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -1830,7 +1830,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 3,
"score": 0
},
{

View file

@ -17,13 +17,13 @@
"pushed_at": "2022-06-23T09:53:01Z",
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 6,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"forks": 7,
"watchers": 29,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
"fork": false,
"created_at": "2022-06-07T03:20:23Z",
"updated_at": "2022-07-05T05:22:00Z",
"updated_at": "2022-07-05T06:59:58Z",
"pushed_at": "2022-06-07T03:41:13Z",
"stargazers_count": 467,
"watchers_count": 467,
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 77,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 77,
"watchers": 467,
"watchers": 468,
"score": 0
},
{

View file

@ -13,11 +13,11 @@
"description": "PoC for CVE-2022-24342: account takeover via CSRF in GitHub authentication",
"fork": false,
"created_at": "2022-07-02T22:04:29Z",
"updated_at": "2022-07-05T00:37:02Z",
"updated_at": "2022-07-05T12:14:02Z",
"pushed_at": "2022-07-03T08:53:04Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 3,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -31,8 +31,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 3,
"watchers": 24,
"forks": 4,
"watchers": 26,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "【懒人神器】一款图形化、批量采集url、批量对采集的url进行各种nday检测的工具。可用于src挖掘、cnvd挖掘、0day利用、打造自己的武器库等场景。可以批量利用Actively Exploited Atlassian Confluence 0Day CVE-2022-26134和DedeCMS v5.7.87 SQL注入 CVE-2022-23337。",
"fork": false,
"created_at": "2022-05-31T07:44:01Z",
"updated_at": "2022-07-05T06:06:07Z",
"updated_at": "2022-07-05T12:12:32Z",
"pushed_at": "2022-07-05T01:29:14Z",
"stargazers_count": 182,
"watchers_count": 182,
"forks_count": 33,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -30,8 +30,8 @@
"nday"
],
"visibility": "public",
"forks": 33,
"watchers": 182,
"forks": 35,
"watchers": 190,
"score": 0
},
{
@ -137,10 +137,10 @@
"description": "CVE-2022-26134 Proof of Concept",
"fork": false,
"created_at": "2022-06-03T13:59:19Z",
"updated_at": "2022-07-05T00:54:45Z",
"updated_at": "2022-07-05T07:32:28Z",
"pushed_at": "2022-06-06T16:38:49Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
@ -152,7 +152,7 @@
],
"visibility": "public",
"forks": 37,
"watchers": 125,
"watchers": 126,
"score": 0
},
{
@ -197,11 +197,11 @@
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-06-03T21:07:30Z",
"updated_at": "2022-07-05T01:10:58Z",
"updated_at": "2022-07-05T07:10:35Z",
"pushed_at": "2022-06-06T20:24:06Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 61,
"stargazers_count": 240,
"watchers_count": 240,
"forks_count": 62,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -219,8 +219,8 @@
"vulnerability"
],
"visibility": "public",
"forks": 61,
"watchers": 238,
"forks": 62,
"watchers": 240,
"score": 0
},
{
@ -399,18 +399,18 @@
"description": null,
"fork": false,
"created_at": "2022-06-05T12:23:34Z",
"updated_at": "2022-07-04T08:47:54Z",
"updated_at": "2022-07-05T07:53:51Z",
"pushed_at": "2022-06-06T07:47:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"forks": 1,
"watchers": 3,
"score": 0
},
{
@ -1326,5 +1326,33 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 510624422,
"name": "CVE-2022-26134",
"full_name": "Debajyoti0-0\/CVE-2022-26134",
"owner": {
"login": "Debajyoti0-0",
"id": 79437050,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79437050?v=4",
"html_url": "https:\/\/github.com\/Debajyoti0-0"
},
"html_url": "https:\/\/github.com\/Debajyoti0-0\/CVE-2022-26134",
"description": "Atlassian Confluence (CVE-2022-26134) - Unauthenticated OGNL injection vulnerability (RCE).",
"fork": false,
"created_at": "2022-07-05T07:04:50Z",
"updated_at": "2022-07-05T10:20:09Z",
"pushed_at": "2022-07-05T09:40:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-07-04T10:46:42Z",
"updated_at": "2022-07-05T10:21:21Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 349,
"watchers_count": 349,
"stargazers_count": 350,
"watchers_count": 350,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 349,
"watchers": 350,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WSO2 RCE (CVE-2022-29464) exploit and writeup.",
"fork": false,
"created_at": "2022-04-20T21:23:52Z",
"updated_at": "2022-07-05T03:21:43Z",
"updated_at": "2022-07-05T10:33:11Z",
"pushed_at": "2022-04-27T05:52:43Z",
"stargazers_count": 288,
"watchers_count": 288,
"stargazers_count": 289,
"watchers_count": 289,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
@ -26,7 +26,7 @@
],
"visibility": "public",
"forks": 66,
"watchers": 288,
"watchers": 289,
"score": 0
},
{
@ -507,5 +507,33 @@
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 510649929,
"name": "WSO2RCE",
"full_name": "Pasch0\/WSO2RCE",
"owner": {
"login": "Pasch0",
"id": 78447612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78447612?v=4",
"html_url": "https:\/\/github.com\/Pasch0"
},
"html_url": "https:\/\/github.com\/Pasch0\/WSO2RCE",
"description": "CVE-2022-29464 Exploit",
"fork": false,
"created_at": "2022-07-05T08:27:04Z",
"updated_at": "2022-07-05T11:55:14Z",
"pushed_at": "2022-07-05T08:58:58Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -13,18 +13,18 @@
"description": "Apache Tomcat CVE-2022-29885",
"fork": false,
"created_at": "2022-04-30T02:30:00Z",
"updated_at": "2022-07-04T10:25:57Z",
"updated_at": "2022-07-05T07:06:43Z",
"pushed_at": "2022-06-30T13:46:47Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 2,
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 14,
"forks": 3,
"watchers": 15,
"score": 0
},
{
@ -41,8 +41,8 @@
"description": "Apache Tomcat DoS (CVE-2022-29885) Exploit",
"fork": false,
"created_at": "2022-07-01T09:02:10Z",
"updated_at": "2022-07-01T09:02:10Z",
"pushed_at": "2022-07-01T09:02:10Z",
"updated_at": "2022-07-05T06:23:21Z",
"pushed_at": "2022-07-05T06:23:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-05-30T18:17:38Z",
"updated_at": "2022-07-04T08:39:31Z",
"updated_at": "2022-07-05T10:20:07Z",
"pushed_at": "2022-06-05T21:06:13Z",
"stargazers_count": 131,
"watchers_count": 131,
"stargazers_count": 132,
"watchers_count": 132,
"forks_count": 51,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 51,
"watchers": 131,
"watchers": 132,
"score": 0
},
{
@ -772,10 +772,10 @@
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2022-07-05T02:05:39Z",
"updated_at": "2022-07-05T08:00:07Z",
"pushed_at": "2022-06-06T07:19:53Z",
"stargazers_count": 302,
"watchers_count": 302,
"stargazers_count": 303,
"watchers_count": 303,
"forks_count": 43,
"allow_forking": true,
"is_template": false,
@ -783,7 +783,7 @@
"topics": [],
"visibility": "public",
"forks": 43,
"watchers": 302,
"watchers": 303,
"score": 0
},
{
@ -1753,18 +1753,18 @@
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
"fork": false,
"created_at": "2022-06-15T02:22:53Z",
"updated_at": "2022-06-23T20:26:56Z",
"updated_at": "2022-07-05T08:07:41Z",
"pushed_at": "2022-06-15T02:24:00Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 1,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 26,
"forks": 2,
"watchers": 27,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-07-05T02:35:12Z",
"updated_at": "2022-07-05T09:10:18Z",
"pushed_at": "2022-07-05T02:58:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
@ -24,7 +24,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 2,
"score": 0
}
]

View file

@ -474,6 +474,14 @@ In startActivityForAttachedApplicationIfNeeded of RootWindowContainer.java, ther
- [Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007](https://github.com/Trinadh465/frameworks_base_AOSP10_r33_CVE-2022-20007)
### CVE-2022-20124 (2022-06-15)
<code>
In deletePackageX of DeletePackageHelper.java, there is a possible way for a Guest user to reset pre-loaded applications for other users due to a permissions bypass. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-170646036
</code>
- [nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-](https://github.com/nidhi7598/Frameworks_base_AOSP10_r33__CVE-2022-20124-)
### CVE-2022-20130 (2022-06-15)
<code>
@ -482,6 +490,14 @@ In transportDec_OutOfBandConfig of tpdec_lib.cpp, there is a possible out of bou
- [Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130](https://github.com/Satheesh575555/external_aac_AOSP10_r33_CVE-2022-20130)
### CVE-2022-20135 (2022-06-15)
<code>
In writeToParcel of GateKeeperResponse.java, there is a possible parcel format mismatch. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10 Android-11 Android-12 Android-12LAndroid ID: A-220303465
</code>
- [nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-](https://github.com/nidhi7598/frameworks_base_AOSP10_r33_CVE-2022-20135-)
### CVE-2022-20142 (2022-06-15)
<code>
@ -1661,6 +1677,7 @@ In affected versions of Confluence Server and Data Center, an OGNL injection vul
- [Luchoane/CVE-2022-26134_conFLU](https://github.com/Luchoane/CVE-2022-26134_conFLU)
- [r1skkam/TryHackMe-Atlassian-CVE-2022-26134](https://github.com/r1skkam/TryHackMe-Atlassian-CVE-2022-26134)
- [nxtexploit/CVE-2022-26134](https://github.com/nxtexploit/CVE-2022-26134)
- [Debajyoti0-0/CVE-2022-26134](https://github.com/Debajyoti0-0/CVE-2022-26134)
### CVE-2022-26155 (2022-02-28)
@ -2149,6 +2166,7 @@ Certain WSO2 products allow unrestricted file upload with resultant remote code
- [trhacknon/CVE-2022-29464-mass](https://github.com/trhacknon/CVE-2022-29464-mass)
- [jimidk/Better-CVE-2022-29464](https://github.com/jimidk/Better-CVE-2022-29464)
- [electr0lulz/Mass-exploit-CVE-2022-29464](https://github.com/electr0lulz/Mass-exploit-CVE-2022-29464)
- [Pasch0/WSO2RCE](https://github.com/Pasch0/WSO2RCE)
### CVE-2022-29548 (2022-04-20)
@ -5009,14 +5027,6 @@ Valve Steam through 2021-04-10, when a Source engine game is installed, allows r
- [floesen/CVE-2021-30481](https://github.com/floesen/CVE-2021-30481)
### CVE-2021-30632 (2021-10-08)
<code>
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
</code>
- [CrackerCat/CVE-2021-30632](https://github.com/CrackerCat/CVE-2021-30632)
### CVE-2021-30682 (2021-09-08)
<code>
@ -6250,7 +6260,6 @@ Grafana is an open-source platform for monitoring and observability. Grafana ver
- [s1gh/CVE-2021-43798](https://github.com/s1gh/CVE-2021-43798)
- [fanygit/Grafana-CVE-2021-43798Exp](https://github.com/fanygit/Grafana-CVE-2021-43798Exp)
- [LongWayHomie/CVE-2021-43798](https://github.com/LongWayHomie/CVE-2021-43798)
- [Awrrays/Grafana-CVE-2021-43798](https://github.com/Awrrays/Grafana-CVE-2021-43798)
- [Ryze-T/CVE-2021-43798](https://github.com/Ryze-T/CVE-2021-43798)
- [k3rwin/CVE-2021-43798-Grafana](https://github.com/k3rwin/CVE-2021-43798-Grafana)
- [gps1949/CVE-2021-43798](https://github.com/gps1949/CVE-2021-43798)
@ -6397,16 +6406,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [Adikso/minecraft-log4j-honeypot](https://github.com/Adikso/minecraft-log4j-honeypot)
- [TheArqsz/CVE-2021-44228-PoC](https://github.com/TheArqsz/CVE-2021-44228-PoC)
- [1lann/log4shelldetect](https://github.com/1lann/log4shelldetect)
- [phoswald/sample-ldap-exploit](https://github.com/phoswald/sample-ldap-exploit)
- [rakutentech/jndi-ldap-test-server](https://github.com/rakutentech/jndi-ldap-test-server)
- [f0ng/log4j2burpscanner](https://github.com/f0ng/log4j2burpscanner)
- [lhotari/log4shell-mitigation-tester](https://github.com/lhotari/log4shell-mitigation-tester)
- [logpresso/CVE-2021-44228-Scanner](https://github.com/logpresso/CVE-2021-44228-Scanner)
- [vorburger/Log4j_CVE-2021-44228](https://github.com/vorburger/Log4j_CVE-2021-44228)
- [gauthamg/log4j2021_vul_test](https://github.com/gauthamg/log4j2021_vul_test)
- [b-abderrahmane/CVE-2021-44228-playground](https://github.com/b-abderrahmane/CVE-2021-44228-playground)
- [js-on/jndiRep](https://github.com/js-on/jndiRep)
- [Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs](https://github.com/Sh0ckFR/log4j-CVE-2021-44228-Public-IoCs)
- [zzzz0317/log4j2-vulnerable-spring-app](https://github.com/zzzz0317/log4j2-vulnerable-spring-app)
- [datadavev/test-44228](https://github.com/datadavev/test-44228)
- [LemonCraftRu/JndiRemover](https://github.com/LemonCraftRu/JndiRemover)
- [darkarnium/Log4j-CVE-Detect](https://github.com/darkarnium/Log4j-CVE-Detect)
@ -6417,7 +6424,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [alexandre-lavoie/python-log4rce](https://github.com/alexandre-lavoie/python-log4rce)
- [RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs](https://github.com/RedDrip7/Log4Shell_CVE-2021-44228_related_attacks_IOCs)
- [blake-fm/vcenter-log4j](https://github.com/blake-fm/vcenter-log4j)
- [DiCanio/CVE-2021-44228-docker-example](https://github.com/DiCanio/CVE-2021-44228-docker-example)
- [CodeShield-Security/Log4JShell-Bytecode-Detector](https://github.com/CodeShield-Security/Log4JShell-Bytecode-Detector)
- [dtact/divd-2021-00038--log4j-scanner](https://github.com/dtact/divd-2021-00038--log4j-scanner)
- [kali-dass/CVE-2021-44228-log4Shell](https://github.com/kali-dass/CVE-2021-44228-log4Shell)
@ -6425,7 +6431,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [infiniroot/nginx-mitigate-log4shell](https://github.com/infiniroot/nginx-mitigate-log4shell)
- [authomize/log4j-log4shell-affected](https://github.com/authomize/log4j-log4shell-affected)
- [guardicode/CVE-2021-44228_IoCs](https://github.com/guardicode/CVE-2021-44228_IoCs)
- [fireflyingup/log4j-poc](https://github.com/fireflyingup/log4j-poc)
- [nccgroup/log4j-jndi-be-gone](https://github.com/nccgroup/log4j-jndi-be-gone)
- [qingtengyun/cve-2021-44228-qingteng-online-patch](https://github.com/qingtengyun/cve-2021-44228-qingteng-online-patch)
- [tasooshi/horrors-log4shell](https://github.com/tasooshi/horrors-log4shell)
@ -6433,15 +6438,14 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [OlafHaalstra/log4jcheck](https://github.com/OlafHaalstra/log4jcheck)
- [psychose-club/Saturn](https://github.com/psychose-club/Saturn)
- [Panyaprach/Proof-CVE-2021-44228](https://github.com/Panyaprach/Proof-CVE-2021-44228)
- [momos1337/Log4j-RCE](https://github.com/momos1337/Log4j-RCE)
- [palominoinc/cve-2021-44228-log4j-mitigation](https://github.com/palominoinc/cve-2021-44228-log4j-mitigation)
- [cyberxml/log4j-poc](https://github.com/cyberxml/log4j-poc)
- [Diverto/nse-log4shell](https://github.com/Diverto/nse-log4shell)
- [sunnyvale-it/CVE-2021-44228-PoC](https://github.com/sunnyvale-it/CVE-2021-44228-PoC)
- [maxant/log4j2-CVE-2021-44228](https://github.com/maxant/log4j2-CVE-2021-44228)
- [atnetws/fail2ban-log4j](https://github.com/atnetws/fail2ban-log4j)
- [kimobu/cve-2021-44228](https://github.com/kimobu/cve-2021-44228)
- [KainsRache/anti-jndi](https://github.com/KainsRache/anti-jndi)
- [bigsizeme/Log4j-check](https://github.com/bigsizeme/Log4j-check)
- [pedrohavay/exploit-CVE-2021-44228](https://github.com/pedrohavay/exploit-CVE-2021-44228)
- [0xRyan/log4j-nullroute](https://github.com/0xRyan/log4j-nullroute)
- [fireeye/CVE-2021-44228](https://github.com/fireeye/CVE-2021-44228)
@ -6452,7 +6456,6 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [sourcegraph/log4j-cve-code-search-resources](https://github.com/sourcegraph/log4j-cve-code-search-resources)
- [thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832](https://github.com/thedevappsecguy/Log4J-Mitigation-CVE-2021-44228--CVE-2021-45046--CVE-2021-45105--CVE-2021-44832)
- [helsecert/CVE-2021-44228](https://github.com/helsecert/CVE-2021-44228)
- [markuman/aws-log4j-mitigations](https://github.com/markuman/aws-log4j-mitigations)
- [tuyenee/Log4shell](https://github.com/tuyenee/Log4shell)
- [JiuBanSec/Log4j-CVE-2021-44228](https://github.com/JiuBanSec/Log4j-CVE-2021-44228)
- [ycdxsb/Log4Shell-CVE-2021-44228-ENV](https://github.com/ycdxsb/Log4Shell-CVE-2021-44228-ENV)
@ -6470,6 +6473,7 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [VNYui/CVE-2021-44228](https://github.com/VNYui/CVE-2021-44228)
- [flxhaas/Scan-CVE-2021-44228](https://github.com/flxhaas/Scan-CVE-2021-44228)
- [justakazh/Log4j-CVE-2021-44228](https://github.com/justakazh/Log4j-CVE-2021-44228)
- [madCdan/JndiLookup](https://github.com/madCdan/JndiLookup)
- [Koupah/MC-Log4j-Patcher](https://github.com/Koupah/MC-Log4j-Patcher)
- [AlexandreHeroux/Fix-CVE-2021-44228](https://github.com/AlexandreHeroux/Fix-CVE-2021-44228)
- [kossatzd/log4j-CVE-2021-44228-test](https://github.com/kossatzd/log4j-CVE-2021-44228-test)
@ -6477,11 +6481,18 @@ Apache Log4j2 2.0-beta9 through 2.15.0 (excluding security releases 2.12.2, 2.12
- [hackinghippo/log4shell_ioc_ips](https://github.com/hackinghippo/log4shell_ioc_ips)
- [p3dr16k/log4j-1.2.15-mod](https://github.com/p3dr16k/log4j-1.2.15-mod)
- [claranet/ansible-role-log4shell](https://github.com/claranet/ansible-role-log4shell)
- [taurusxin/CVE-2021-44228](https://github.com/taurusxin/CVE-2021-44228)
- [rodfer20/log4j2-prosecutor](https://github.com/rodfer20/log4j2-prosecutor)
- [yanghaoi/CVE-2021-44228_Log4Shell](https://github.com/yanghaoi/CVE-2021-44228_Log4Shell)
- [lfama/log4j_checker](https://github.com/lfama/log4j_checker)
- [threatmonit/Log4j-IOCs](https://github.com/threatmonit/Log4j-IOCs)
- [ben-smash/l4j-info](https://github.com/ben-smash/l4j-info)
- [strawhatasif/log4j-test](https://github.com/strawhatasif/log4j-test)
- [giterlizzi/nmap-log4shell](https://github.com/giterlizzi/nmap-log4shell)
- [tica506/Siem-queries-for-CVE-2021-44228](https://github.com/tica506/Siem-queries-for-CVE-2021-44228)
- [chilit-nl/log4shell-example](https://github.com/chilit-nl/log4shell-example)
- [Occamsec/log4j-checker](https://github.com/Occamsec/log4j-checker)
- [snatalius/log4j2-CVE-2021-44228-poc-local](https://github.com/snatalius/log4j2-CVE-2021-44228-poc-local)
- [Contrast-Security-OSS/CVE-2021-44228](https://github.com/Contrast-Security-OSS/CVE-2021-44228)
- [back2root/log4shell-rex](https://github.com/back2root/log4shell-rex)
- [alexbakker/log4shell-tools](https://github.com/alexbakker/log4shell-tools)