Auto Update 2020/06/23 18:08:04

This commit is contained in:
motikan2010-bot 2020-06-23 18:08:04 +09:00
parent c5b7a5642a
commit 9278840e64
29 changed files with 140 additions and 140 deletions

View file

@ -13,13 +13,13 @@
"description": "jenkins CVE-2017-1000353 POC",
"fork": false,
"created_at": "2019-04-12T13:24:26Z",
"updated_at": "2020-06-17T13:46:05Z",
"updated_at": "2020-06-23T03:33:21Z",
"pushed_at": "2020-06-11T00:16:40Z",
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 18,
"forks": 18,
"watchers": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 19,
"forks": 19,
"watchers": 25,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2017-17215 HuaWei Router RCE (NOT TESTED)",
"fork": false,
"created_at": "2017-12-25T06:11:24Z",
"updated_at": "2019-10-21T03:51:20Z",
"updated_at": "2020-06-23T07:42:36Z",
"pushed_at": "2018-01-04T02:31:57Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 24,
"watchers_count": 24,
"forks_count": 17,
"forks": 17,
"watchers": 25,
"watchers": 24,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-01-10T01:14:44Z",
"stargazers_count": 667,
"watchers_count": 667,
"forks_count": 178,
"forks": 178,
"forks_count": 179,
"forks": 179,
"watchers": 667,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "iis6 exploit 2017 CVE-2017-7269",
"fork": false,
"created_at": "2017-04-05T23:21:12Z",
"updated_at": "2020-06-12T11:31:53Z",
"updated_at": "2020-06-23T06:57:30Z",
"pushed_at": "2017-04-05T23:29:03Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 22,
"forks": 22,
"watchers": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 23,
"forks": 23,
"watchers": 16,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Hikvision camera CVE-2017-7921-EXP",
"fork": false,
"created_at": "2020-04-27T11:49:40Z",
"updated_at": "2020-06-18T13:28:11Z",
"updated_at": "2020-06-23T08:10:55Z",
"pushed_at": "2020-05-16T10:43:28Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-01-30T12:52:42Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 61,
"forks": 61,
"forks_count": 62,
"forks": 62,
"watchers": 174,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "IOS\/MAC Denial-Of-Service [POC\/EXPLOIT FOR MASSIVE ATTACK TO IOS\/MAC IN NETWORK]",
"fork": false,
"created_at": "2018-11-04T01:47:05Z",
"updated_at": "2020-06-23T03:03:16Z",
"updated_at": "2020-06-23T05:31:00Z",
"pushed_at": "2018-11-04T02:25:08Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 10,
"forks": 10,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-06-22T17:23:00Z",
"updated_at": "2020-06-23T07:59:11Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 269,
"watchers_count": 269,
"stargazers_count": 270,
"watchers_count": 270,
"forks_count": 59,
"forks": 59,
"watchers": 269,
"watchers": 270,
"score": 0
}
]

View file

@ -1140,13 +1140,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-06-22T04:30:32Z",
"updated_at": "2020-06-23T08:52:58Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1103,
"watchers_count": 1103,
"stargazers_count": 1102,
"watchers_count": 1102,
"forks_count": 375,
"forks": 375,
"watchers": 1103,
"watchers": 1102,
"score": 0
},
{
@ -2386,8 +2386,8 @@
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 157,
"watchers_count": 157,
"forks_count": 52,
"forks": 52,
"forks_count": 54,
"forks": 54,
"watchers": 157,
"score": 0
},
@ -2520,13 +2520,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-06-22T06:30:56Z",
"updated_at": "2020-06-23T04:36:30Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 43,
"watchers_count": 43,
"stargazers_count": 44,
"watchers_count": 44,
"forks_count": 16,
"forks": 16,
"watchers": 43,
"watchers": 44,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-03-23T11:22:54Z",
"stargazers_count": 217,
"watchers_count": 217,
"forks_count": 45,
"forks": 45,
"forks_count": 46,
"forks": 46,
"watchers": 217,
"score": 0
},

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-05-30T16:21:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "An experimental script PoC for Kr00k vulnerability (CVE-2019-15126)",
"fork": false,
"created_at": "2020-03-18T16:25:28Z",
"updated_at": "2020-06-19T14:50:31Z",
"updated_at": "2020-06-23T03:45:44Z",
"pushed_at": "2020-04-03T20:21:46Z",
"stargazers_count": 41,
"watchers_count": 41,
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 6,
"forks": 6,
"watchers": 41,
"watchers": 42,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-23T02:04:28Z",
"updated_at": "2020-06-23T06:17:15Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 964,
"watchers_count": 964,
"forks_count": 244,
"forks": 244,
"watchers": 964,
"stargazers_count": 966,
"watchers_count": 966,
"forks_count": 245,
"forks": 245,
"watchers": 966,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Remote Code Execution Exploit for Citrix Application Delivery Controller and Citrix Gateway [ CVE-2019-19781 ]",
"fork": false,
"created_at": "2020-01-10T22:56:35Z",
"updated_at": "2020-06-23T02:01:09Z",
"updated_at": "2020-06-23T03:48:21Z",
"pushed_at": "2020-01-18T07:01:29Z",
"stargazers_count": 333,
"watchers_count": 333,
"stargazers_count": 334,
"watchers_count": 334,
"forks_count": 106,
"forks": 106,
"watchers": 333,
"watchers": 334,
"score": 0
},
{
@ -82,8 +82,8 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-06-19T13:07:45Z",
"pushed_at": "2020-06-23T00:31:08Z",
"updated_at": "2020-06-23T04:48:04Z",
"pushed_at": "2020-06-23T04:48:01Z",
"stargazers_count": 96,
"watchers_count": 96,
"forks_count": 27,

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-5736 POCs",
"fork": false,
"created_at": "2019-02-20T12:23:13Z",
"updated_at": "2020-06-23T00:31:34Z",
"updated_at": "2020-06-23T04:04:54Z",
"pushed_at": "2020-06-22T13:04:55Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 17,
"forks": 17,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "QNAP pre-auth root RCE Exploit (CVE-2019-7192 ~ CVE-2019-7195)",
"fork": false,
"created_at": "2020-05-24T15:44:29Z",
"updated_at": "2020-06-20T22:29:34Z",
"updated_at": "2020-06-23T07:37:12Z",
"pushed_at": "2020-05-24T16:28:46Z",
"stargazers_count": 20,
"watchers_count": 20,
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 17,
"forks": 17,
"watchers": 20,
"watchers": 21,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2020-06-19T09:21:43Z",
"updated_at": "2020-06-23T04:48:25Z",
"pushed_at": "2020-02-16T17:18:01Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 16,
"forks": 16,
"watchers": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 17,
"forks": 17,
"watchers": 37,
"score": 0
}
]

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-06-18T09:05:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2020-06-15T07:39:15Z",
"updated_at": "2020-06-23T04:03:03Z",
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 39,
"watchers_count": 39,
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 17,
"forks": 17,
"watchers": 39,
"watchers": 40,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-06-23T02:41:29Z",
"updated_at": "2020-06-23T07:23:20Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 290,
"watchers_count": 290,
"stargazers_count": 292,
"watchers_count": 292,
"forks_count": 60,
"forks": 60,
"watchers": 290,
"watchers": 292,
"score": 0
}
]

View file

@ -933,13 +933,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-06-21T10:12:10Z",
"updated_at": "2020-06-23T04:50:11Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 958,
"watchers_count": 958,
"stargazers_count": 959,
"watchers_count": 959,
"forks_count": 312,
"forks": 312,
"watchers": 958,
"watchers": 959,
"score": 0
},
{
@ -956,13 +956,13 @@
"description": "CVE-2020-0796 Local Privilege Escalation POC",
"fork": false,
"created_at": "2020-03-30T16:06:50Z",
"updated_at": "2020-06-17T05:35:02Z",
"updated_at": "2020-06-23T09:04:38Z",
"pushed_at": "2020-04-02T08:01:38Z",
"stargazers_count": 189,
"watchers_count": 189,
"stargazers_count": 190,
"watchers_count": 190,
"forks_count": 71,
"forks": 71,
"watchers": 189,
"watchers": 190,
"score": 0
},
{
@ -1186,13 +1186,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-06-23T02:01:04Z",
"updated_at": "2020-06-23T08:58:29Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"forks_count": 76,
"forks": 76,
"watchers": 274,
"watchers": 275,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"description": "CVE-2020-10199 回显版本",
"fork": false,
"created_at": "2020-05-15T06:12:51Z",
"updated_at": "2020-06-22T05:37:45Z",
"updated_at": "2020-06-23T06:39:16Z",
"pushed_at": "2020-05-15T06:18:18Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 27,
"watchers_count": 27,
"forks_count": 5,
"forks": 5,
"watchers": 25,
"watchers": 27,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本优先更新高危且易利用的漏洞利用脚本最新添加CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-06-23T02:04:28Z",
"updated_at": "2020-06-23T06:17:15Z",
"pushed_at": "2020-06-01T02:34:27Z",
"stargazers_count": 964,
"watchers_count": 964,
"forks_count": 244,
"forks": 244,
"watchers": 964,
"stargazers_count": 966,
"watchers_count": 966,
"forks_count": 245,
"forks": 245,
"watchers": 966,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
"fork": false,
"created_at": "2020-04-22T06:42:50Z",
"updated_at": "2020-05-19T06:12:45Z",
"updated_at": "2020-06-23T09:09:03Z",
"pushed_at": "2020-04-22T10:29:16Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 8,
"forks": 8,
"watchers": 52,
"watchers": 53,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-06-17T13:41:23Z",
"stargazers_count": 301,
"watchers_count": 301,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 301,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-2546CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,",
"fork": false,
"created_at": "2020-03-02T15:54:46Z",
"updated_at": "2020-06-21T09:40:48Z",
"updated_at": "2020-06-23T07:09:36Z",
"pushed_at": "2020-06-10T10:49:38Z",
"stargazers_count": 104,
"watchers_count": 104,
"forks_count": 26,
"forks": 26,
"watchers": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 27,
"forks": 27,
"watchers": 105,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-18T07:08:06Z",
"updated_at": "2020-06-15T16:01:46Z",
"updated_at": "2020-06-23T04:17:55Z",
"pushed_at": "2020-01-18T07:14:34Z",
"stargazers_count": 72,
"watchers_count": 72,
"stargazers_count": 74,
"watchers_count": 74,
"forks_count": 13,
"forks": 13,
"watchers": 72,
"watchers": 74,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "how detect CVE-2020-2551 poc exploit python Weblogic RCE with IIOP",
"fork": false,
"created_at": "2020-01-19T13:01:32Z",
"updated_at": "2020-06-18T02:56:53Z",
"updated_at": "2020-06-23T08:55:10Z",
"pushed_at": "2020-05-22T08:46:20Z",
"stargazers_count": 120,
"watchers_count": 120,
"stargazers_count": 121,
"watchers_count": 121,
"forks_count": 31,
"forks": 31,
"watchers": 120,
"watchers": 121,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Weblogic coherence.jar RCE",
"fork": false,
"created_at": "2020-05-10T09:04:43Z",
"updated_at": "2020-06-18T09:48:33Z",
"updated_at": "2020-06-23T03:30:25Z",
"pushed_at": "2020-05-10T09:29:36Z",
"stargazers_count": 122,
"watchers_count": 122,
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 21,
"forks": 21,
"watchers": 122,
"watchers": 123,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-21T15:58:25Z",
"updated_at": "2020-05-18T10:43:38Z",
"updated_at": "2020-06-23T06:51:59Z",
"pushed_at": "2020-02-21T16:03:28Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"forks_count": 13,
"forks": 13,
"watchers": 65,
"watchers": 66,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2020-05-18T09:39:09Z",
"updated_at": "2020-06-23T07:09:00Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 4,
"forks": 4,
"watchers": 18,
"watchers": 19,
"score": 0
},
{