Auto Update 2024/08/13 00:29:46

This commit is contained in:
motikan2010-bot 2024-08-13 09:29:46 +09:00
parent 0be75a11de
commit 907e7e4dc8
1400 changed files with 10997 additions and 12596 deletions

View file

@ -13,10 +13,10 @@
"description": "CVE-2000-0170",
"fork": false,
"created_at": "2014-11-08T15:21:30Z",
"updated_at": "2023-09-28T10:26:31Z",
"updated_at": "2024-08-12T19:15:17Z",
"pushed_at": "2014-11-08T15:25:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2000-0979",
"fork": false,
"created_at": "2019-10-26T14:40:17Z",
"updated_at": "2023-09-28T11:07:29Z",
"updated_at": "2024-08-12T19:54:16Z",
"pushed_at": "2019-10-27T07:57:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Cooolsoft PowerFTP Server 2.0 3\/2.10 - Multiple Denial of Service Vulnerabilities",
"fork": false,
"created_at": "2018-04-03T02:21:39Z",
"updated_at": "2023-09-28T10:49:32Z",
"updated_at": "2024-08-12T19:37:27Z",
"pushed_at": "2018-04-03T02:26:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to list the contents of arbitrary drives via a ls (LIST) command that includes the drive letter as an argument, e.g. \"ls C:\".",
"fork": false,
"created_at": "2018-05-14T19:23:46Z",
"updated_at": "2023-09-28T10:50:41Z",
"updated_at": "2024-08-12T19:38:33Z",
"pushed_at": "2018-05-14T19:27:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical path of the server root via the pwd command, which lists the full pathname.",
"fork": false,
"created_at": "2018-05-14T19:53:05Z",
"updated_at": "2023-09-28T10:50:41Z",
"updated_at": "2024-08-12T19:38:33Z",
"pushed_at": "2018-05-14T19:54:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "ISC INN 2.x - Command-Line Buffer Overflow",
"fork": false,
"created_at": "2018-05-14T20:36:10Z",
"updated_at": "2023-09-28T10:50:41Z",
"updated_at": "2024-08-12T19:38:33Z",
"pushed_at": "2018-05-14T20:42:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service via an HTTP request for an MS-DOS device name.",
"fork": false,
"created_at": "2018-05-14T21:09:20Z",
"updated_at": "2023-09-28T10:50:41Z",
"updated_at": "2024-08-12T19:38:33Z",
"pushed_at": "2018-05-14T21:49:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Cyberstop Web Server for Windows 0.1 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP GET request, possibly triggering a buffer overflow.",
"fork": false,
"created_at": "2018-04-03T02:15:51Z",
"updated_at": "2023-09-28T10:49:32Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-05-14T22:25:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Phusion WebServer 1.0 - 'URL' Remote Buffer Overflow",
"fork": false,
"created_at": "2018-04-03T01:52:34Z",
"updated_at": "2023-09-28T10:49:32Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-04-03T02:03:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Xerver 2.10 - Multiple Request Denial of Service Vulnerabilities",
"fork": false,
"created_at": "2018-04-03T01:38:08Z",
"updated_at": "2023-09-28T10:49:31Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-04-03T01:41:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange. (read-only clone of the original GitLab project)",
"fork": false,
"created_at": "2021-08-31T09:51:12Z",
"updated_at": "2024-08-08T06:58:03Z",
"updated_at": "2024-08-12T20:16:02Z",
"pushed_at": "2024-05-03T22:24:07Z",
"stargazers_count": 174,
"watchers_count": 174,
"stargazers_count": 173,
"watchers_count": 173,
"has_discussions": false,
"forks_count": 29,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 29,
"watchers": 174,
"watchers": 173,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "The New Exploit there no available on metasploit framework !",
"fork": false,
"created_at": "2022-07-22T21:33:26Z",
"updated_at": "2023-09-28T11:41:00Z",
"updated_at": "2024-08-12T20:25:21Z",
"pushed_at": "2022-07-22T21:33:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Nortel Wireless LAN Access Point 2200 Series - Denial of Service",
"fork": false,
"created_at": "2018-04-03T01:30:30Z",
"updated_at": "2023-09-28T10:49:31Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-04-03T01:34:43Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2007-2447 - Samba usermap script",
"fork": false,
"created_at": "2018-08-03T18:39:56Z",
"updated_at": "2024-08-06T13:58:19Z",
"updated_at": "2024-08-12T19:40:33Z",
"pushed_at": "2020-08-16T18:54:38Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 56,
"watchers_count": 56,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 57,
"watchers": 56,
"score": 0,
"subscribers_count": 2
},
@ -283,10 +283,10 @@
"description": "Exploit Samba",
"fork": false,
"created_at": "2021-03-14T17:48:23Z",
"updated_at": "2023-09-28T11:25:47Z",
"updated_at": "2024-08-12T20:11:12Z",
"pushed_at": "2021-03-14T17:50:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -295,7 +295,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
@ -733,10 +733,10 @@
"description": "Exploit i used in HTB",
"fork": false,
"created_at": "2022-12-27T05:18:44Z",
"updated_at": "2023-09-28T11:44:32Z",
"updated_at": "2024-08-12T20:29:03Z",
"pushed_at": "2023-03-08T23:14:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -745,7 +745,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Creosote is our solution to searching for the tarfile vulnerability described by CVE-2007-4559.",
"fork": false,
"created_at": "2022-09-20T17:03:57Z",
"updated_at": "2024-01-04T17:12:01Z",
"updated_at": "2024-08-12T20:27:11Z",
"pushed_at": "2022-09-23T08:24:16Z",
"stargazers_count": 84,
"watchers_count": 84,
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 84,
"watchers": 83,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Airsensor M520 - HTTPd Unauthenticated Remote Denial of Service \/ Buffer Overflow (PoC)",
"fork": false,
"created_at": "2018-04-03T01:09:40Z",
"updated_at": "2023-09-28T10:49:31Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-04-03T01:14:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "March Networks DVR 3204 - Logfile Information Disclosure",
"fork": false,
"created_at": "2018-04-03T00:36:34Z",
"updated_at": "2023-09-28T10:49:31Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-04-03T01:04:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Debian OpenSSL Predictable PRNG (CVE-2008-0166)",
"fork": false,
"created_at": "2013-09-22T21:20:31Z",
"updated_at": "2024-06-08T14:14:11Z",
"updated_at": "2024-08-12T19:12:20Z",
"pushed_at": "2023-01-22T09:39:45Z",
"stargazers_count": 386,
"watchers_count": 386,
"stargazers_count": 385,
"watchers_count": 385,
"has_discussions": false,
"forks_count": 113,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 113,
"watchers": 386,
"watchers": 385,
"score": 0,
"subscribers_count": 18
},
@ -105,10 +105,10 @@
"description": "Search for BTC coins on earlier versions of Bitcoin Core with critical vulnerability OpenSSL 0.9.8 CVE-2008-0166",
"fork": false,
"created_at": "2022-08-26T12:18:39Z",
"updated_at": "2023-09-28T11:42:14Z",
"updated_at": "2024-08-12T20:26:31Z",
"pushed_at": "2022-12-07T00:53:21Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -134,7 +134,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Workaround for the vulnerability identified by TWSL2011-007 or CVE-2008-0228 - iOS x509 Certificate Chain Validation Vulnerability",
"fork": false,
"created_at": "2011-07-28T22:20:41Z",
"updated_at": "2024-02-21T13:53:33Z",
"updated_at": "2024-08-12T19:20:07Z",
"pushed_at": "2011-07-28T22:46:34Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "RedDot CMS versions 7.5 Build 7.5.0.48 and below full database enumeration exploit that takes advantage of a remote SQL injection vulnerability in ioRD.asp.",
"fork": false,
"created_at": "2017-05-03T19:39:27Z",
"updated_at": "2023-09-28T10:41:09Z",
"updated_at": "2024-08-12T19:29:35Z",
"pushed_at": "2017-05-03T19:40:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 4,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "vmware cloudburst exploit CVE-2009-1244",
"fork": false,
"created_at": "2019-06-11T09:08:52Z",
"updated_at": "2023-09-28T11:02:50Z",
"updated_at": "2024-08-12T19:49:56Z",
"pushed_at": "2019-06-11T13:49:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Cisco VPN Client - Integer Overflow Denial of Service",
"fork": false,
"created_at": "2018-04-02T23:19:47Z",
"updated_at": "2023-09-28T10:49:31Z",
"updated_at": "2024-08-12T19:37:26Z",
"pushed_at": "2018-06-02T09:05:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Sudo 1.6.x <= 1.6.9p21 and 1.7.x <= 1.7.2p4 Local Privilege Escalation and vulnerable container",
"fork": false,
"created_at": "2017-12-16T01:16:44Z",
"updated_at": "2024-04-26T12:18:01Z",
"updated_at": "2024-08-12T19:34:50Z",
"pushed_at": "2017-12-16T01:19:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 13,
"watchers": 10,
"watchers": 9,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2022-22965 - CVE-2010-1622 redux",
"fork": false,
"created_at": "2022-03-31T08:06:46Z",
"updated_at": "2024-04-23T11:07:12Z",
"updated_at": "2024-08-12T20:22:01Z",
"pushed_at": "2023-04-18T14:15:42Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 12,
"watchers": 20,
"watchers": 19,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "This exploit was written to study some concepts, enjoy!",
"fork": false,
"created_at": "2017-10-28T20:37:26Z",
"updated_at": "2024-01-31T11:33:34Z",
"updated_at": "2024-08-12T19:33:41Z",
"pushed_at": "2017-10-22T19:46:37Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -170,10 +170,10 @@
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:25:25Z",
"updated_at": "2023-09-28T11:39:35Z",
"updated_at": "2024-08-12T20:23:59Z",
"pushed_at": "2022-06-09T16:31:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -182,7 +182,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Exploit PoC for Spring RCE issue (CVE-2011-2894)",
"fork": false,
"created_at": "2013-07-31T08:48:19Z",
"updated_at": "2023-09-28T10:22:32Z",
"updated_at": "2024-08-12T19:22:43Z",
"pushed_at": "2023-12-17T23:28:49Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 42,
"watchers": 41,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "Python Apache Killer (Range Header DoS CVE-2011-3192)",
"fork": false,
"created_at": "2011-10-26T21:07:59Z",
"updated_at": "2023-09-28T10:19:33Z",
"updated_at": "2024-08-12T19:20:22Z",
"pushed_at": "2011-10-04T14:55:01Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2011-3368 exploit code",
"fork": false,
"created_at": "2017-04-18T20:34:53Z",
"updated_at": "2023-09-28T10:40:47Z",
"updated_at": "2024-08-12T19:29:12Z",
"pushed_at": "2017-04-18T20:36:37Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": ":muscle: Proof Of Concept of the BEAST attack against SSL\/TLS CVE-2011-3389 :muscle:",
"fork": false,
"created_at": "2015-03-28T10:28:16Z",
"updated_at": "2024-06-13T08:17:53Z",
"updated_at": "2024-08-12T19:16:51Z",
"pushed_at": "2019-01-30T21:36:22Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 30,
"watchers": 68,
"watchers": 67,
"score": 0,
"subscribers_count": 7
}

View file

@ -133,10 +133,10 @@
"description": "A Python replicated exploit for Webmin 1.580 \/file\/show.cgi Remote Code Execution",
"fork": false,
"created_at": "2021-09-04T04:01:56Z",
"updated_at": "2024-06-18T05:13:16Z",
"updated_at": "2024-08-12T20:16:08Z",
"pushed_at": "2021-09-28T16:14:13Z",
"stargazers_count": 40,
"watchers_count": 40,
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 40,
"watchers": 39,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Attempts to exploit CVE-2012-3137 on vulnerable Oracle servers",
"fork": false,
"created_at": "2014-03-29T14:10:36Z",
"updated_at": "2023-09-28T10:24:27Z",
"updated_at": "2024-08-12T19:13:31Z",
"pushed_at": "2014-03-29T15:49:44Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "use the Apple CoreText exploit (CVE-2012-3716) and launch an AP to affect all devices within wifi range",
"fork": false,
"created_at": "2013-09-09T21:50:30Z",
"updated_at": "2024-07-03T15:01:39Z",
"updated_at": "2024-08-12T19:12:16Z",
"pushed_at": "2015-01-12T19:56:04Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Obtain root access through CVE-2012-4220",
"fork": false,
"created_at": "2013-01-07T11:45:35Z",
"updated_at": "2023-09-28T10:21:15Z",
"updated_at": "2024-08-12T19:21:52Z",
"pushed_at": "2013-04-03T11:58:57Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 12,
"watchers": 11,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": ":hocho: CRIME attack PoC : a compression oracle attacks CVE-2012-4929 :hocho:",
"fork": false,
"created_at": "2018-04-21T09:28:31Z",
"updated_at": "2023-12-29T17:19:41Z",
"updated_at": "2024-08-12T19:37:56Z",
"pushed_at": "2019-03-23T10:53:09Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 28,
"watchers": 27,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "MySQL 4.x\/5.0 (Linux) - User-Defined Function (UDF) Dynamic Library (2) automation script.",
"fork": false,
"created_at": "2018-06-14T16:58:02Z",
"updated_at": "2023-09-28T10:51:30Z",
"updated_at": "2024-08-12T19:39:19Z",
"pushed_at": "2018-06-17T02:23:51Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "ownCloud PoC for CVE-2013-0303",
"fork": false,
"created_at": "2021-04-10T19:18:07Z",
"updated_at": "2023-09-28T11:26:41Z",
"updated_at": "2024-08-12T20:12:02Z",
"pushed_at": "2021-04-10T19:19:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Annotated FBI exploit for the Tor Browser Bundle from mid-2013 (CVE-2013-1690)",
"fork": false,
"created_at": "2014-08-19T03:16:49Z",
"updated_at": "2023-10-24T17:07:11Z",
"updated_at": "2024-08-12T19:14:37Z",
"pushed_at": "2014-08-19T03:22:29Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 5
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2013-1775 Exploit written in Perl",
"fork": false,
"created_at": "2017-02-11T08:26:24Z",
"updated_at": "2023-09-28T10:39:11Z",
"updated_at": "2024-08-12T19:27:43Z",
"pushed_at": "2017-02-11T08:31:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "For the analysis of CVE-2013-2028",
"fork": false,
"created_at": "2013-05-21T15:20:05Z",
"updated_at": "2023-09-28T10:22:04Z",
"updated_at": "2024-08-12T19:11:50Z",
"pushed_at": "2018-06-07T23:22:38Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 31,
"watchers": 30,
"score": 0,
"subscribers_count": 4
},
@ -43,10 +43,10 @@
"description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow",
"fork": false,
"created_at": "2016-03-23T10:41:00Z",
"updated_at": "2023-11-24T13:43:29Z",
"updated_at": "2024-08-12T19:22:02Z",
"pushed_at": "2016-03-23T12:05:38Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 54,
"watchers_count": 54,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 55,
"watchers": 54,
"score": 0,
"subscribers_count": 6
},

View file

@ -13,10 +13,10 @@
"description": "original cve-2013-2094 exploit and a rewritten version for educational purposes",
"fork": false,
"created_at": "2013-05-20T04:23:13Z",
"updated_at": "2024-04-24T03:27:56Z",
"updated_at": "2024-08-12T19:22:25Z",
"pushed_at": "2013-05-21T05:40:37Z",
"stargazers_count": 91,
"watchers_count": 91,
"stargazers_count": 90,
"watchers_count": 90,
"has_discussions": false,
"forks_count": 51,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 51,
"watchers": 91,
"watchers": 90,
"score": 0,
"subscribers_count": 11
},
@ -43,10 +43,10 @@
"description": "CVE-2013-2094 exploit for android",
"fork": false,
"created_at": "2013-06-05T10:59:16Z",
"updated_at": "2023-09-28T10:22:11Z",
"updated_at": "2024-08-12T19:22:30Z",
"pushed_at": "2013-06-20T09:34:21Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},
@ -133,10 +133,10 @@
"description": "CVE-2013-2094 kernel exploit for i386",
"fork": false,
"created_at": "2015-03-29T12:55:03Z",
"updated_at": "2023-09-28T10:28:08Z",
"updated_at": "2024-08-12T19:16:52Z",
"pushed_at": "2015-03-29T12:58:32Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2013-2596 exploit for android",
"fork": false,
"created_at": "2013-07-16T11:24:09Z",
"updated_at": "2023-09-28T10:22:27Z",
"updated_at": "2024-08-12T19:22:40Z",
"pushed_at": "2013-07-17T03:18:50Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 24,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Scans NTP servers for CVE-2013-5211 NTP DDOS amplification vulnerability.",
"fork": false,
"created_at": "2014-09-07T16:02:25Z",
"updated_at": "2024-01-17T10:05:14Z",
"updated_at": "2024-08-12T19:14:48Z",
"pushed_at": "2014-09-07T18:41:42Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 3
},
@ -43,10 +43,10 @@
"description": "NTP monlist scanner CVE-2013-5211",
"fork": false,
"created_at": "2014-12-14T18:58:26Z",
"updated_at": "2023-09-28T10:26:52Z",
"updated_at": "2024-08-12T19:15:35Z",
"pushed_at": "2014-12-14T19:04:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
@ -73,10 +73,10 @@
"description": "PoC for distributed NTP reflection DoS (CVE-2013-5211)",
"fork": false,
"created_at": "2019-09-24T20:02:43Z",
"updated_at": "2024-07-17T09:56:31Z",
"updated_at": "2024-08-12T19:53:19Z",
"pushed_at": "2019-10-04T19:03:50Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -95,7 +95,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},

View file

@ -103,10 +103,10 @@
"description": "CVE-2013-6282 proof of concept for Android",
"fork": false,
"created_at": "2016-12-19T16:14:18Z",
"updated_at": "2024-04-18T09:36:23Z",
"updated_at": "2024-08-12T19:26:40Z",
"pushed_at": "2016-12-19T16:19:07Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -115,7 +115,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 20,
"watchers": 19,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "Linux local root exploit for CVE-2014-0038",
"fork": false,
"created_at": "2014-02-02T12:34:57Z",
"updated_at": "2024-06-07T14:57:50Z",
"updated_at": "2024-08-12T19:13:08Z",
"pushed_at": "2014-04-18T10:26:02Z",
"stargazers_count": 192,
"watchers_count": 192,
"stargazers_count": 191,
"watchers_count": 191,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 47,
"watchers": 192,
"watchers": 191,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "cve-2014-0130 rails directory traversal vuln",
"fork": false,
"created_at": "2014-05-08T14:40:36Z",
"updated_at": "2023-09-28T10:24:50Z",
"updated_at": "2024-08-12T19:13:50Z",
"pushed_at": "2017-05-15T08:31:52Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 19,
"watchers": 18,
"score": 0,
"subscribers_count": 0
}

View file

@ -13,10 +13,10 @@
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2024-07-12T07:05:48Z",
"updated_at": "2024-08-12T19:13:37Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2307,
"watchers_count": 2307,
"stargazers_count": 2305,
"watchers_count": 2305,
"has_discussions": false,
"forks_count": 465,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 465,
"watchers": 2307,
"watchers": 2305,
"score": 0,
"subscribers_count": 117
},
@ -163,10 +163,10 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2024-08-09T06:47:46Z",
"updated_at": "2024-08-12T19:23:38Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 573,
"watchers_count": 573,
"stargazers_count": 572,
"watchers_count": 572,
"has_discussions": false,
"forks_count": 216,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 216,
"watchers": 573,
"watchers": 572,
"score": 0,
"subscribers_count": 57
},
@ -797,10 +797,10 @@
"description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-13T12:14:29Z",
"updated_at": "2023-09-28T10:24:37Z",
"updated_at": "2024-08-12T19:13:40Z",
"pushed_at": "2014-04-13T11:10:34Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -809,7 +809,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
@ -982,10 +982,10 @@
"description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-05-01T08:28:45Z",
"updated_at": "2024-01-09T10:53:33Z",
"updated_at": "2024-08-12T19:13:47Z",
"pushed_at": "2014-05-01T08:47:16Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -994,7 +994,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 6
},
@ -1012,10 +1012,10 @@
"description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)",
"fork": false,
"created_at": "2014-05-03T18:08:27Z",
"updated_at": "2023-09-28T10:24:49Z",
"updated_at": "2024-08-12T19:13:48Z",
"pushed_at": "2014-05-03T18:14:49Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -1024,7 +1024,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 17,
"watchers": 16,
"score": 0,
"subscribers_count": 4
},
@ -1072,10 +1072,10 @@
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2024-01-26T09:40:23Z",
"updated_at": "2024-08-12T19:16:31Z",
"pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 77,
"watchers_count": 77,
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -1084,7 +1084,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 77,
"watchers": 76,
"score": 0,
"subscribers_count": 6
},
@ -1222,10 +1222,10 @@
"description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
"fork": false,
"created_at": "2015-09-24T08:39:28Z",
"updated_at": "2023-09-28T10:30:39Z",
"updated_at": "2024-08-12T19:19:25Z",
"pushed_at": "2015-09-24T16:15:11Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -1234,7 +1234,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 12,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
"fork": false,
"created_at": "2014-06-12T04:44:13Z",
"updated_at": "2024-04-15T08:15:36Z",
"updated_at": "2024-08-12T19:14:05Z",
"pushed_at": "2014-07-24T20:47:27Z",
"stargazers_count": 38,
"watchers_count": 38,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 38,
"watchers": 37,
"score": 0,
"subscribers_count": 10
},

View file

@ -13,10 +13,10 @@
"description": "PoC - Exploit Delivery via Steganography and Polyglots, CVE-2014-0282",
"fork": false,
"created_at": "2021-05-17T04:39:32Z",
"updated_at": "2024-08-05T12:27:47Z",
"updated_at": "2024-08-12T20:13:04Z",
"pushed_at": "2024-05-27T02:44:38Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
@ -41,7 +41,7 @@
],
"visibility": "public",
"forks": 14,
"watchers": 44,
"watchers": 43,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-1303 (WebKit Heap based BOF) proof of concept for Linux",
"fork": false,
"created_at": "2017-07-07T06:15:56Z",
"updated_at": "2023-12-13T19:58:03Z",
"updated_at": "2024-08-12T19:31:08Z",
"pushed_at": "2017-08-19T06:49:15Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 24,
"watchers": 23,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-160 exploit",
"fork": false,
"created_at": "2014-04-09T19:28:06Z",
"updated_at": "2023-09-28T10:24:35Z",
"updated_at": "2024-08-12T19:13:38Z",
"pushed_at": "2014-04-09T21:06:26Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Microsoft Office Onenote 2007 (CVE-2014-2815) \".ONEPKG\" File Directory Traversal Vulnerability Leads to Arbitrary Code Execution",
"fork": false,
"created_at": "2021-10-05T21:15:27Z",
"updated_at": "2023-09-28T11:32:04Z",
"updated_at": "2024-08-12T20:17:00Z",
"pushed_at": "2021-10-05T21:20:40Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "POC Code to exploite CVE-2014-3120",
"fork": false,
"created_at": "2014-07-07T20:28:34Z",
"updated_at": "2023-09-28T10:25:23Z",
"updated_at": "2024-08-12T19:14:17Z",
"pushed_at": "2014-07-07T20:35:30Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-3153 aka towelroot",
"fork": false,
"created_at": "2014-07-24T13:28:00Z",
"updated_at": "2023-09-28T10:25:31Z",
"updated_at": "2024-08-12T19:23:59Z",
"pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 121,
"watchers_count": 121,
"stargazers_count": 120,
"watchers_count": 120,
"has_discussions": false,
"forks_count": 70,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 121,
"watchers": 120,
"score": 0,
"subscribers_count": 19
},
@ -73,10 +73,10 @@
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
"updated_at": "2024-04-27T18:52:32Z",
"updated_at": "2024-08-12T19:14:54Z",
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 46,
"watchers": 45,
"score": 0,
"subscribers_count": 5
},
@ -133,10 +133,10 @@
"description": "My exploit for kernel exploitation",
"fork": false,
"created_at": "2015-11-08T09:40:59Z",
"updated_at": "2023-09-28T10:31:13Z",
"updated_at": "2024-08-12T19:20:03Z",
"pushed_at": "2016-03-08T09:07:54Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "CVE-2014-3341 exploit",
"fork": false,
"created_at": "2014-06-28T09:34:35Z",
"updated_at": "2023-09-28T10:25:18Z",
"updated_at": "2024-08-12T19:14:12Z",
"pushed_at": "2015-02-17T03:39:25Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 1
}

View file

@ -107,10 +107,10 @@
"description": ":poodle: Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566 :poodle:",
"fork": false,
"created_at": "2015-02-03T20:28:27Z",
"updated_at": "2024-06-25T19:22:44Z",
"updated_at": "2024-08-12T19:16:10Z",
"pushed_at": "2023-10-06T16:11:26Z",
"stargazers_count": 245,
"watchers_count": 245,
"stargazers_count": 244,
"watchers_count": 244,
"has_discussions": false,
"forks_count": 74,
"allow_forking": true,
@ -127,7 +127,7 @@
],
"visibility": "public",
"forks": 74,
"watchers": 245,
"watchers": 244,
"score": 0,
"subscribers_count": 17
},

View file

@ -43,10 +43,10 @@
"description": "Exploit CVE-2014-4113",
"fork": false,
"created_at": "2016-01-22T07:05:52Z",
"updated_at": "2024-02-02T08:24:55Z",
"updated_at": "2024-08-12T19:21:03Z",
"pushed_at": "2016-01-22T07:30:18Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 6,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
@ -73,10 +73,10 @@
"description": "Trigger and exploit code for CVE-2014-4113",
"fork": false,
"created_at": "2016-02-07T14:18:45Z",
"updated_at": "2023-09-28T10:32:31Z",
"updated_at": "2024-08-12T19:21:18Z",
"pushed_at": "2016-02-14T20:21:46Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 42,
"watchers_count": 42,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 43,
"watchers": 42,
"score": 0,
"subscribers_count": 4
},

View file

@ -43,10 +43,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2024-08-12T05:53:23Z",
"updated_at": "2024-08-12T19:56:38Z",
"pushed_at": "2023-11-24T09:21:56Z",
"stargazers_count": 1971,
"watchers_count": 1971,
"stargazers_count": 1969,
"watchers_count": 1969,
"has_discussions": true,
"forks_count": 338,
"allow_forking": true,
@ -76,7 +76,7 @@
],
"visibility": "public",
"forks": 338,
"watchers": 1971,
"watchers": 1969,
"score": 0,
"subscribers_count": 35
},
@ -124,10 +124,10 @@
"description": "Weblogic SearchPublicRegistries SSRF(CVE-2014-4210) Exploit Script based on Python3",
"fork": false,
"created_at": "2020-11-19T16:06:57Z",
"updated_at": "2023-11-17T17:12:11Z",
"updated_at": "2024-08-12T20:07:47Z",
"pushed_at": "2020-11-20T05:55:15Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -136,7 +136,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -823,10 +823,10 @@
"description": "shellshock CVE-2014-6271 CGI Exploit, Use like Openssh via CGI",
"fork": false,
"created_at": "2014-09-29T16:02:15Z",
"updated_at": "2023-09-28T10:26:09Z",
"updated_at": "2024-08-12T19:14:58Z",
"pushed_at": "2014-10-02T10:36:15Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -835,7 +835,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 3
},
@ -853,10 +853,10 @@
"description": "This module determine the vulnerability of a bash binary to the shellshock exploits (CVE-2014-6271 or CVE-2014-7169) and then patch that where possible",
"fork": false,
"created_at": "2014-09-29T18:57:38Z",
"updated_at": "2023-09-28T10:26:09Z",
"updated_at": "2024-08-12T19:14:58Z",
"pushed_at": "2014-09-29T20:07:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -865,7 +865,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
@ -1098,10 +1098,10 @@
"description": "A script, in C, to check if CGI scripts are vulnerable to CVE-2014-6271 (The Bash Bug).",
"fork": false,
"created_at": "2015-06-26T23:34:01Z",
"updated_at": "2023-09-28T10:29:20Z",
"updated_at": "2024-08-12T19:18:03Z",
"pushed_at": "2015-06-26T23:34:33Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
@ -1110,7 +1110,7 @@
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 10
},
@ -1158,10 +1158,10 @@
"description": "Shellshock exploit + vulnerable environment",
"fork": false,
"created_at": "2016-12-07T23:38:50Z",
"updated_at": "2024-08-12T14:04:57Z",
"updated_at": "2024-08-12T19:26:29Z",
"pushed_at": "2023-05-11T02:12:25Z",
"stargazers_count": 198,
"watchers_count": 198,
"stargazers_count": 197,
"watchers_count": 197,
"has_discussions": false,
"forks_count": 56,
"allow_forking": true,
@ -1177,7 +1177,7 @@
],
"visibility": "public",
"forks": 56,
"watchers": 198,
"watchers": 197,
"score": 0,
"subscribers_count": 5
},
@ -1345,10 +1345,10 @@
"description": "Shellshock vulnerability attacker",
"fork": false,
"created_at": "2018-06-18T16:09:15Z",
"updated_at": "2023-09-28T10:51:36Z",
"updated_at": "2024-08-12T19:39:24Z",
"pushed_at": "2018-06-20T14:25:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1357,7 +1357,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
@ -1525,10 +1525,10 @@
"description": null,
"fork": false,
"created_at": "2019-11-13T14:17:19Z",
"updated_at": "2023-09-28T11:08:04Z",
"updated_at": "2024-08-12T19:54:49Z",
"pushed_at": "2020-01-08T13:20:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -1537,7 +1537,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
@ -1705,10 +1705,10 @@
"description": null,
"fork": false,
"created_at": "2020-11-12T04:12:55Z",
"updated_at": "2023-09-28T11:22:03Z",
"updated_at": "2024-08-12T20:07:35Z",
"pushed_at": "2020-11-25T00:47:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1717,7 +1717,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
@ -1836,10 +1836,10 @@
"description": "ShellShock interactive-shell exploit",
"fork": false,
"created_at": "2022-04-02T07:30:31Z",
"updated_at": "2023-10-10T13:29:59Z",
"updated_at": "2024-08-12T20:22:05Z",
"pushed_at": "2022-04-02T07:31:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -1852,7 +1852,7 @@
],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2014-7920 and CVE-2014-7921 - code-exec in mediaserver up to Android 5.1",
"fork": false,
"created_at": "2016-01-24T13:49:03Z",
"updated_at": "2023-09-28T10:32:16Z",
"updated_at": "2024-08-12T19:21:04Z",
"pushed_at": "2016-01-24T22:20:44Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 76,
"watchers": 74,
"score": 0,
"subscribers_count": 9
},

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2015-0006. Fixed in MS15-005 https:\/\/docs.microsoft.com\/en-us\/security-updates\/SecurityBulletins\/2015\/ms15-005 .",
"fork": false,
"created_at": "2014-04-29T01:05:57Z",
"updated_at": "2023-09-28T10:24:45Z",
"updated_at": "2024-08-12T19:23:42Z",
"pushed_at": "2014-06-07T23:45:44Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": " 翻译文章CVE-2015-0057漏洞在32位和64位系统上的利用。Exploiting the win32k!xxxEnableWndSBArrows use-after-free (CVE 2015-0057) bug on both 32-bit and 64-bit(Aaron Adams of NCC )",
"fork": false,
"created_at": "2016-08-30T06:11:59Z",
"updated_at": "2023-09-28T10:36:00Z",
"updated_at": "2024-08-12T19:24:38Z",
"pushed_at": "2016-09-13T00:12:51Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 25,
"watchers": 23,
"score": 0,
"subscribers_count": 5
}

View file

@ -313,10 +313,10 @@
"description": "glibc gethostbyname bug",
"fork": false,
"created_at": "2015-01-30T09:58:09Z",
"updated_at": "2023-09-28T10:27:22Z",
"updated_at": "2024-08-12T19:16:06Z",
"pushed_at": "2015-01-30T10:02:28Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -325,7 +325,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
@ -373,10 +373,10 @@
"description": "CVE-2015-0235 EXIM ESTMP GHOST Glibc Gethostbyname() DoS Exploit\/PoC",
"fork": false,
"created_at": "2015-03-28T01:26:05Z",
"updated_at": "2024-07-27T16:52:13Z",
"updated_at": "2024-08-12T19:16:51Z",
"pushed_at": "2015-03-17T19:48:31Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -385,7 +385,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
@ -463,10 +463,10 @@
"description": null,
"fork": false,
"created_at": "2017-06-30T10:29:40Z",
"updated_at": "2023-09-28T10:42:36Z",
"updated_at": "2024-08-12T19:30:59Z",
"pushed_at": "2017-06-30T10:31:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -475,7 +475,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},

View file

@ -13,10 +13,10 @@
"description": "Proof of Concept code for CVE-2015-0345 (APSB15-07)",
"fork": false,
"created_at": "2015-06-11T10:27:49Z",
"updated_at": "2023-12-04T18:09:01Z",
"updated_at": "2024-08-12T19:17:49Z",
"pushed_at": "2015-06-12T04:54:51Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -30,7 +30,7 @@
],
"visibility": "public",
"forks": 7,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 38
}

View file

@ -13,10 +13,10 @@
"description": "Exploit I used to claim 10% final-grade extra credit in Matthew Might's Compilers class.",
"fork": false,
"created_at": "2015-04-17T20:53:29Z",
"updated_at": "2023-09-28T10:28:24Z",
"updated_at": "2024-08-12T19:17:07Z",
"pushed_at": "2015-04-17T21:00:44Z",
"stargazers_count": 5,
"watchers_count": 5,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 5,
"watchers": 4,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Elasticsearch 1.4.0 < 1.4.2 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-09T20:08:56Z",
"updated_at": "2024-02-10T07:28:49Z",
"updated_at": "2024-08-12T19:27:02Z",
"pushed_at": "2018-04-07T00:30:52Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 32,
"watchers_count": 32,
"has_discussions": false,
"forks_count": 16,
"allow_forking": true,
@ -31,7 +31,7 @@
],
"visibility": "public",
"forks": 16,
"watchers": 33,
"watchers": 32,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": "I'll submit the poc after blackhat",
"fork": false,
"created_at": "2015-07-17T06:09:41Z",
"updated_at": "2024-08-03T14:19:58Z",
"updated_at": "2024-08-12T19:18:23Z",
"pushed_at": "2015-08-30T19:24:32Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 116,
"watchers_count": 116,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 118,
"watchers": 116,
"score": 0,
"subscribers_count": 19
},

View file

@ -73,10 +73,10 @@
"description": "An exploit for CVE-2015-1538-1 - Google Stagefright stsc MP4 Atom Integer Overflow Remote Code Execution",
"fork": false,
"created_at": "2015-09-10T23:00:59Z",
"updated_at": "2024-07-29T10:48:39Z",
"updated_at": "2024-08-12T19:19:13Z",
"pushed_at": "2015-09-10T23:01:09Z",
"stargazers_count": 205,
"watchers_count": 205,
"stargazers_count": 203,
"watchers_count": 203,
"has_discussions": false,
"forks_count": 119,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 119,
"watchers": 205,
"watchers": 203,
"score": 0,
"subscribers_count": 18
},

View file

@ -13,10 +13,10 @@
"description": "[discontinued] Mass exploiter of CVE-2015-1579 for WordPress CMS",
"fork": false,
"created_at": "2016-02-03T21:44:11Z",
"updated_at": "2023-09-28T10:32:28Z",
"updated_at": "2024-08-12T19:21:15Z",
"pushed_at": "2018-05-21T21:20:54Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 26,
"watchers_count": 26,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 27,
"watchers": 26,
"score": 0,
"subscribers_count": 2
},

View file

@ -135,10 +135,10 @@
"description": "CVE-2015-1635",
"fork": false,
"created_at": "2017-01-28T16:26:54Z",
"updated_at": "2023-09-28T10:38:53Z",
"updated_at": "2024-08-12T19:27:27Z",
"pushed_at": "2017-01-28T19:41:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -147,7 +147,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
@ -195,10 +195,10 @@
"description": "MS15-034 HTTP.sys 远程执行代码检测脚本MS15-034 HTTP.sys remote execution code poc script",
"fork": false,
"created_at": "2018-06-20T14:28:11Z",
"updated_at": "2023-09-28T10:51:40Z",
"updated_at": "2024-08-12T19:39:28Z",
"pushed_at": "2018-06-20T14:33:03Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -207,7 +207,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
@ -225,10 +225,10 @@
"description": "MS15-034: HTTP.sys (IIS) DoS",
"fork": false,
"created_at": "2018-08-02T11:28:14Z",
"updated_at": "2023-09-28T10:52:47Z",
"updated_at": "2024-08-12T19:40:31Z",
"pushed_at": "2017-07-04T06:20:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -237,7 +237,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents",
"fork": false,
"created_at": "2015-10-27T00:23:36Z",
"updated_at": "2023-09-28T10:31:03Z",
"updated_at": "2024-08-12T19:19:50Z",
"pushed_at": "2017-01-10T02:25:55Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 24,
"watchers": 23,
"score": 0,
"subscribers_count": 8
}

View file

@ -13,10 +13,10 @@
"description": "Win32k LPE vulnerability used in APT attack",
"fork": false,
"created_at": "2015-05-12T18:04:48Z",
"updated_at": "2024-07-04T07:28:01Z",
"updated_at": "2024-08-12T19:17:25Z",
"pushed_at": "2017-12-18T14:11:29Z",
"stargazers_count": 286,
"watchers_count": 286,
"stargazers_count": 285,
"watchers_count": 285,
"has_discussions": false,
"forks_count": 178,
"allow_forking": true,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 178,
"watchers": 286,
"watchers": 285,
"score": 0,
"subscribers_count": 34
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2015-1805 root tool",
"fork": false,
"created_at": "2016-04-01T12:10:14Z",
"updated_at": "2024-07-30T16:14:05Z",
"updated_at": "2024-08-12T19:22:10Z",
"pushed_at": "2017-11-23T20:55:03Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 269,
"watchers_count": 269,
"has_discussions": false,
"forks_count": 150,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 150,
"watchers": 270,
"watchers": 269,
"score": 0,
"subscribers_count": 19
},

View file

@ -13,10 +13,10 @@
"description": "An implementation of the CVE-2015-2153 exploit.",
"fork": false,
"created_at": "2015-08-27T17:21:36Z",
"updated_at": "2023-09-28T10:30:14Z",
"updated_at": "2024-08-12T19:19:01Z",
"pushed_at": "2015-08-27T17:22:53Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 3
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2016-01-06T18:34:44Z",
"updated_at": "2023-09-28T10:32:00Z",
"updated_at": "2024-08-12T19:20:48Z",
"pushed_at": "2016-01-06T19:25:47Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Tool for exploit CVE-2015-3306",
"fork": false,
"created_at": "2015-04-21T12:51:51Z",
"updated_at": "2023-11-30T14:56:17Z",
"updated_at": "2024-08-12T19:17:09Z",
"pushed_at": "2015-04-22T12:54:22Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
@ -43,10 +43,10 @@
"description": "Exploits the arbitrary file write bug in proftpd (CVE-2015-3306) attempts code execution",
"fork": false,
"created_at": "2015-04-26T14:14:34Z",
"updated_at": "2023-09-28T10:28:29Z",
"updated_at": "2024-08-12T19:17:12Z",
"pushed_at": "2015-06-01T22:02:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
@ -73,10 +73,10 @@
"description": "ProFTPd 1.3.5 - (mod_copy) Remote Command Execution exploit and vulnerable container",
"fork": false,
"created_at": "2017-01-08T14:19:51Z",
"updated_at": "2024-07-24T22:32:51Z",
"updated_at": "2024-08-12T19:27:01Z",
"pushed_at": "2018-04-07T01:10:06Z",
"stargazers_count": 130,
"watchers_count": 130,
"stargazers_count": 129,
"watchers_count": 129,
"has_discussions": false,
"forks_count": 52,
"allow_forking": true,
@ -92,7 +92,7 @@
],
"visibility": "public",
"forks": 52,
"watchers": 130,
"watchers": 129,
"score": 0,
"subscribers_count": 3
},

View file

@ -43,10 +43,10 @@
"description": "CVE-2015-3636 exploit",
"fork": false,
"created_at": "2015-08-21T06:39:30Z",
"updated_at": "2023-09-28T10:30:08Z",
"updated_at": "2024-08-12T19:18:54Z",
"pushed_at": "2015-08-20T14:36:09Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},

View file

@ -43,10 +43,10 @@
"description": "Python script to generate a malicious MP4 file and start a CherryPy web server hosting a simple HTML page with the embedded file. Exploits another Stagefright vulnerability, the integer overflow (CVE-2015-3864).",
"fork": false,
"created_at": "2015-12-08T18:27:52Z",
"updated_at": "2023-09-28T10:31:38Z",
"updated_at": "2024-08-12T19:20:28Z",
"pushed_at": "2015-12-08T18:35:47Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 18,
"watchers": 17,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "Python script to exploit CVE-2015-4852.",
"fork": false,
"created_at": "2016-03-03T18:33:17Z",
"updated_at": "2023-09-28T10:32:55Z",
"updated_at": "2024-08-12T19:21:43Z",
"pushed_at": "2016-07-20T14:14:44Z",
"stargazers_count": 30,
"watchers_count": 30,
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 19,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 30,
"watchers": 29,
"score": 0,
"subscribers_count": 4
},

View file

@ -13,10 +13,10 @@
"description": "MySQL DoS in the Procedure Analyse Function CVE-2015-4870",
"fork": false,
"created_at": "2016-05-30T04:18:12Z",
"updated_at": "2023-09-28T10:34:20Z",
"updated_at": "2024-08-12T19:23:05Z",
"pushed_at": "2016-05-30T04:42:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough",
"fork": false,
"created_at": "2015-09-10T10:10:36Z",
"updated_at": "2023-09-28T10:30:24Z",
"updated_at": "2024-08-12T19:19:12Z",
"pushed_at": "2015-09-10T10:14:57Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 14,
"watchers": 13,
"score": 0,
"subscribers_count": 13
},

View file

@ -13,10 +13,10 @@
"description": "PoC exploit for CVE-2015-5477 BIND9 TKEY assertion failure",
"fork": false,
"created_at": "2015-07-31T23:29:43Z",
"updated_at": "2023-09-28T10:29:50Z",
"updated_at": "2024-08-12T19:18:34Z",
"pushed_at": "2015-08-01T21:32:51Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 50,
"watchers": 65,
"watchers": 64,
"score": 0,
"subscribers_count": 8
},
@ -43,10 +43,10 @@
"description": "PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability",
"fork": false,
"created_at": "2015-08-01T09:27:23Z",
"updated_at": "2023-09-28T10:29:51Z",
"updated_at": "2024-08-12T19:18:35Z",
"pushed_at": "2015-08-01T09:34:50Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 3
},
@ -133,10 +133,10 @@
"description": "PoC exploit for CVE-2015-5477 in php",
"fork": false,
"created_at": "2015-08-19T02:35:36Z",
"updated_at": "2023-09-28T10:30:06Z",
"updated_at": "2024-08-12T19:18:52Z",
"pushed_at": "2015-08-19T16:22:50Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -145,7 +145,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Sudo <= 1.8.14 Local Privilege Escalation and vulnerable container",
"fork": false,
"created_at": "2017-12-16T00:23:30Z",
"updated_at": "2024-02-24T11:42:05Z",
"updated_at": "2024-08-12T19:34:50Z",
"pushed_at": "2017-12-16T00:39:19Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 23,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},

View file

@ -13,10 +13,10 @@
"description": "An exploitation tool to extract passwords using CVE-2015-5995.",
"fork": false,
"created_at": "2018-10-04T18:20:47Z",
"updated_at": "2024-07-16T13:09:20Z",
"updated_at": "2024-08-12T19:42:11Z",
"pushed_at": "2018-10-05T17:16:04Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
@ -38,7 +38,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"watchers": 10,
"score": 0,
"subscribers_count": 6
}

View file

@ -13,10 +13,10 @@
"description": "PoC for CVE-2015-6086",
"fork": false,
"created_at": "2016-01-18T11:32:41Z",
"updated_at": "2024-03-15T08:25:01Z",
"updated_at": "2024-08-12T19:20:59Z",
"pushed_at": "2016-04-22T06:43:00Z",
"stargazers_count": 68,
"watchers_count": 68,
"stargazers_count": 67,
"watchers_count": 67,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 68,
"watchers": 67,
"score": 0,
"subscribers_count": 10
}

View file

@ -13,10 +13,10 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2024-04-22T14:41:59Z",
"updated_at": "2024-08-12T19:21:28Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 52,
"watchers": 50,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "Exploit for CVE-2015-6357 Cisco FireSIGHT Management Center Certificate Validation Vulnerability",
"fork": false,
"created_at": "2015-11-16T10:15:47Z",
"updated_at": "2024-05-03T02:17:32Z",
"updated_at": "2024-08-12T19:20:10Z",
"pushed_at": "2015-11-16T10:20:09Z",
"stargazers_count": 7,
"watchers_count": 7,
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 7,
"watchers": 6,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": "Infoleak and PC control poc for CVE-2015-6620 (24445127), I'll add after conference",
"fork": false,
"created_at": "2016-03-29T09:01:52Z",
"updated_at": "2023-09-28T10:33:18Z",
"updated_at": "2024-08-12T19:22:06Z",
"pushed_at": "2016-04-07T10:37:02Z",
"stargazers_count": 55,
"watchers_count": 55,
"stargazers_count": 53,
"watchers_count": 53,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 55,
"watchers": 53,
"score": 0,
"subscribers_count": 4
}

View file

@ -13,10 +13,10 @@
"description": "CVE-2015-7501JBoss JMXInvokerServlet 反序列化漏洞",
"fork": false,
"created_at": "2020-02-21T05:23:08Z",
"updated_at": "2023-10-31T08:45:17Z",
"updated_at": "2024-08-12T19:57:57Z",
"pushed_at": "2020-02-21T05:24:27Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 21,
"watchers": 20,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2024-07-24T03:13:13Z",
"updated_at": "2024-08-12T20:49:04Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 544,
"watchers_count": 544,
"has_discussions": false,
"forks_count": 168,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 168,
"watchers": 546,
"watchers": 544,
"score": 0,
"subscribers_count": 62
},
@ -163,10 +163,10 @@
"description": "PoC exploit server for CVE-2015-7547",
"fork": false,
"created_at": "2016-03-10T19:47:00Z",
"updated_at": "2023-10-09T03:43:25Z",
"updated_at": "2024-08-12T19:21:51Z",
"pushed_at": "2016-03-30T04:54:15Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -175,7 +175,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 9,
"watchers": 8,
"score": 0,
"subscribers_count": 3
},

View file

@ -13,10 +13,10 @@
"description": "Notes, binaries, and related information from analysis of the CVE-2015-7755 & CVE-2015-7756 issues within Juniper ScreenOS",
"fork": false,
"created_at": "2015-12-18T20:20:01Z",
"updated_at": "2024-05-24T08:34:34Z",
"updated_at": "2024-08-12T19:20:36Z",
"pushed_at": "2021-01-25T21:45:52Z",
"stargazers_count": 103,
"watchers_count": 103,
"stargazers_count": 102,
"watchers_count": 102,
"has_discussions": false,
"forks_count": 34,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 34,
"watchers": 103,
"watchers": 102,
"score": 0,
"subscribers_count": 19
},
@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2016-01-09T22:49:07Z",
"updated_at": "2023-09-28T10:32:03Z",
"updated_at": "2024-08-12T19:20:51Z",
"pushed_at": "2015-12-22T12:53:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
}

View file

@ -43,10 +43,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-12T09:10:36Z",
"updated_at": "2023-09-28T11:43:22Z",
"updated_at": "2024-08-12T20:27:43Z",
"pushed_at": "2022-10-12T09:23:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2016-05-02T13:47:15Z",
"updated_at": "2023-09-28T10:33:50Z",
"updated_at": "2024-08-12T19:22:38Z",
"pushed_at": "2016-05-02T13:48:14Z",
"stargazers_count": 4,
"watchers_count": 4,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"watchers": 3,
"score": 0,
"subscribers_count": 2
}

View file

@ -73,10 +73,10 @@
"description": "CVE-2015-8562 Exploit in bash",
"fork": false,
"created_at": "2016-02-08T04:03:26Z",
"updated_at": "2023-09-28T10:32:32Z",
"updated_at": "2024-08-12T19:21:18Z",
"pushed_at": "2016-02-08T04:05:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -85,7 +85,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2018-12-20T12:12:59Z",
"updated_at": "2024-06-06T14:07:09Z",
"updated_at": "2024-08-12T19:44:12Z",
"pushed_at": "2019-01-31T23:27:45Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 8,
"watchers": 7,
"score": 0,
"subscribers_count": 1
}

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2016-0040 uninitialized pointer",
"fork": false,
"created_at": "2016-02-26T18:00:30Z",
"updated_at": "2023-09-28T10:32:48Z",
"updated_at": "2024-08-12T19:21:36Z",
"pushed_at": "2016-07-17T07:59:10Z",
"stargazers_count": 46,
"watchers_count": 46,
"stargazers_count": 45,
"watchers_count": 45,
"has_discussions": false,
"forks_count": 28,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 46,
"watchers": 45,
"score": 0,
"subscribers_count": 5
},
@ -43,10 +43,10 @@
"description": "CVE-2016-0040 Privilege Escalation Exploit For WMI Receive Notification Vulnerability (x86-64)",
"fork": false,
"created_at": "2017-08-03T22:28:54Z",
"updated_at": "2024-02-24T11:42:04Z",
"updated_at": "2024-08-12T19:31:45Z",
"pushed_at": "2018-06-07T17:12:24Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
@ -55,7 +55,7 @@
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 15,
"watchers": 14,
"score": 0,
"subscribers_count": 2
}

View file

@ -13,10 +13,10 @@
"description": "Automated Exploit Toolkit for CVE-2015-6095 and CVE-2016-0049",
"fork": false,
"created_at": "2016-02-18T22:38:51Z",
"updated_at": "2024-04-22T14:41:59Z",
"updated_at": "2024-08-12T19:21:28Z",
"pushed_at": "2017-07-22T19:22:55Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 50,
"watchers_count": 50,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 52,
"watchers": 50,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "EoP (Win7) & BSoD (Win10) PoC for CVE-2016-0051 (MS-016)",
"fork": false,
"created_at": "2016-02-09T21:30:34Z",
"updated_at": "2024-01-09T13:14:13Z",
"updated_at": "2024-08-12T19:21:20Z",
"pushed_at": "2016-05-09T17:53:48Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 329,
"watchers_count": 329,
"has_discussions": false,
"forks_count": 138,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 138,
"watchers": 330,
"watchers": 329,
"score": 0,
"subscribers_count": 25
},

View file

@ -13,10 +13,10 @@
"description": "MS16-032(CVE-2016-0099) for SERVICE ONLY",
"fork": false,
"created_at": "2017-03-15T17:16:55Z",
"updated_at": "2024-07-27T20:22:46Z",
"updated_at": "2024-08-12T19:28:25Z",
"pushed_at": "2017-03-15T17:24:59Z",
"stargazers_count": 80,
"watchers_count": 80,
"stargazers_count": 79,
"watchers_count": 79,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 80,
"watchers": 79,
"score": 0,
"subscribers_count": 7
}

View file

@ -13,10 +13,10 @@
"description": "Proof-of-Concept exploit for CVE-2016-0189 (VBScript Memory Corruption in IE11)",
"fork": false,
"created_at": "2016-06-22T23:03:30Z",
"updated_at": "2024-07-12T10:15:48Z",
"updated_at": "2024-08-12T19:23:28Z",
"pushed_at": "2016-06-23T00:47:50Z",
"stargazers_count": 115,
"watchers_count": 115,
"stargazers_count": 114,
"watchers_count": 114,
"has_discussions": false,
"forks_count": 62,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 62,
"watchers": 115,
"watchers": 114,
"score": 0,
"subscribers_count": 13
},

Some files were not shown because too many files have changed in this diff Show more