Auto Update 2020/04/30 12:07:52

This commit is contained in:
motikan2010-bot 2020-04-30 12:07:52 +09:00
parent 7d86b5acc0
commit 947a0e1db8
14 changed files with 70 additions and 70 deletions

View file

@ -17,8 +17,8 @@
"pushed_at": "2016-10-27T20:23:15Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 35,
"forks": 35,
"forks_count": 34,
"forks": 34,
"watchers": 73,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
"fork": false,
"created_at": "2018-06-24T05:34:05Z",
"updated_at": "2020-04-29T12:46:30Z",
"updated_at": "2020-04-29T23:46:49Z",
"pushed_at": "2020-03-08T00:08:20Z",
"stargazers_count": 330,
"watchers_count": 330,
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 309,
"forks": 309,
"watchers": 330,
"watchers": 331,
"score": 0
},
{
@ -174,8 +174,8 @@
"description": null,
"fork": false,
"created_at": "2020-04-29T01:40:33Z",
"updated_at": "2020-04-29T08:08:17Z",
"pushed_at": "2020-04-29T08:08:14Z",
"updated_at": "2020-04-30T01:58:57Z",
"pushed_at": "2020-04-30T01:58:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-04-27T14:23:12Z",
"updated_at": "2020-04-30T00:46:34Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 243,
"watchers_count": 243,
"stargazers_count": 244,
"watchers_count": 244,
"forks_count": 45,
"forks": 45,
"watchers": 243,
"watchers": 244,
"score": 0
}
]

View file

@ -1140,13 +1140,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-04-26T09:15:25Z",
"updated_at": "2020-04-30T02:49:20Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1099,
"watchers_count": 1099,
"stargazers_count": 1101,
"watchers_count": 1101,
"forks_count": 371,
"forks": 371,
"watchers": 1099,
"watchers": 1101,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Exploit for CVE-2019-11043",
"fork": false,
"created_at": "2019-09-23T21:37:27Z",
"updated_at": "2020-04-28T12:25:39Z",
"updated_at": "2020-04-30T01:04:10Z",
"pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1567,
"watchers_count": 1567,
"stargazers_count": 1568,
"watchers_count": 1568,
"forks_count": 222,
"forks": 222,
"watchers": 1567,
"watchers": 1568,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-04-29T15:31:16Z",
"updated_at": "2020-04-30T02:31:57Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 532,
"watchers_count": 532,
"stargazers_count": 533,
"watchers_count": 533,
"forks_count": 117,
"forks": 117,
"watchers": 532,
"watchers": 533,
"score": 0
},
{
@ -178,8 +178,8 @@
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 619,
"watchers_count": 619,
"forks_count": 128,
"forks": 128,
"forks_count": 129,
"forks": 129,
"watchers": 619,
"score": 0
}

View file

@ -128,13 +128,13 @@
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
"updated_at": "2020-04-29T02:34:57Z",
"updated_at": "2020-04-30T02:07:13Z",
"pushed_at": "2020-01-20T23:33:19Z",
"stargazers_count": 799,
"watchers_count": 799,
"stargazers_count": 798,
"watchers_count": 798,
"forks_count": 200,
"forks": 200,
"watchers": 799,
"watchers": 798,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2020-04-27T11:22:25Z",
"updated_at": "2020-04-30T01:11:01Z",
"pushed_at": "2020-02-27T02:54:58Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 70,
"forks": 70,
"watchers": 172,
"watchers": 173,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2020-04-22T19:09:39Z",
"updated_at": "2020-04-30T01:11:06Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 106,
"watchers_count": 106,
"stargazers_count": 107,
"watchers_count": 107,
"forks_count": 42,
"forks": 42,
"watchers": 106,
"watchers": 107,
"score": 0
},
{
@ -197,13 +197,13 @@
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2020-04-24T16:15:55Z",
"updated_at": "2020-04-30T01:11:08Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 48,
"forks": 48,
"watchers": 155,
"watchers": 156,
"score": 0
},
{

View file

@ -404,13 +404,13 @@
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
"fork": false,
"created_at": "2020-03-12T18:34:40Z",
"updated_at": "2020-04-27T18:27:15Z",
"updated_at": "2020-04-30T01:12:22Z",
"pushed_at": "2020-03-14T10:04:59Z",
"stargazers_count": 211,
"watchers_count": 211,
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 82,
"forks": 82,
"watchers": 211,
"watchers": 212,
"score": 0
},
{
@ -956,13 +956,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-04-28T13:35:52Z",
"updated_at": "2020-04-30T01:13:00Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 847,
"watchers_count": 847,
"stargazers_count": 848,
"watchers_count": 848,
"forks_count": 243,
"forks": 243,
"watchers": 847,
"watchers": 848,
"score": 0
},
{
@ -1098,8 +1098,8 @@
"pushed_at": "2020-04-07T08:58:57Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 7,
"forks": 7,
"forks_count": 8,
"forks": 8,
"watchers": 6,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-04-22T09:10:27Z",
"updated_at": "2020-04-24T08:15:38Z",
"updated_at": "2020-04-30T01:14:56Z",
"pushed_at": "2020-04-22T14:05:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-04-17T11:11:18Z",
"stargazers_count": 619,
"watchers_count": 619,
"forks_count": 128,
"forks": 128,
"forks_count": 129,
"forks": 129,
"watchers": 619,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078",
"fork": false,
"created_at": "2020-04-28T13:48:27Z",
"updated_at": "2020-04-29T17:54:56Z",
"updated_at": "2020-04-30T02:22:43Z",
"pushed_at": "2020-04-28T13:51:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"watchers": 11,
"score": 0
}
]

View file

@ -59,13 +59,13 @@
"description": "Exploit for CVE-2020-3952 in vCenter 6.7",
"fork": false,
"created_at": "2020-04-16T07:40:51Z",
"updated_at": "2020-04-29T12:37:05Z",
"updated_at": "2020-04-30T01:13:07Z",
"pushed_at": "2020-04-16T08:38:42Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"forks_count": 33,
"forks": 33,
"watchers": 179,
"watchers": 180,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC of CVE",
"fork": false,
"created_at": "2020-02-27T08:18:56Z",
"updated_at": "2020-04-26T09:02:09Z",
"updated_at": "2020-04-30T01:12:20Z",
"pushed_at": "2020-03-08T05:53:47Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 8,
"forks": 8,
"watchers": 9,
"watchers": 10,
"score": 0
}
]