mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2022/10/06 12:17:32
This commit is contained in:
parent
f1e756dfec
commit
9e830cbfb8
35 changed files with 246 additions and 123 deletions
|
@ -13,10 +13,10 @@
|
|||
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-31T09:51:12Z",
|
||||
"updated_at": "2022-10-05T22:25:53Z",
|
||||
"updated_at": "2022-10-06T08:17:47Z",
|
||||
"pushed_at": "2022-10-05T22:45:58Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 10,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 10,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2018-07-12T00:17:36Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,13 +17,13 @@
|
|||
"pushed_at": "2018-02-16T16:30:00Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-08-30T03:30:02Z",
|
||||
"updated_at": "2022-10-06T08:10:15Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "FFMPEG heap overflow exploit CVE-2016-10190",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-07T06:51:05Z",
|
||||
"updated_at": "2022-05-07T06:54:17Z",
|
||||
"updated_at": "2022-10-06T09:31:23Z",
|
||||
"pushed_at": "2022-05-07T06:56:24Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
||||
"fork": false,
|
||||
"created_at": "2016-06-30T11:56:44Z",
|
||||
"updated_at": "2022-08-30T03:30:02Z",
|
||||
"updated_at": "2022-10-06T08:10:15Z",
|
||||
"pushed_at": "2016-06-30T15:32:42Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"stargazers_count": 323,
|
||||
"watchers_count": 323,
|
||||
"forks_count": 118,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -52,7 +52,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 118,
|
||||
"watchers": 322,
|
||||
"watchers": 323,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -73,7 +73,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -549,10 +549,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -581,7 +581,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-04T13:06:02Z",
|
||||
"updated_at": "2022-09-19T08:11:01Z",
|
||||
"updated_at": "2022-10-06T08:01:56Z",
|
||||
"pushed_at": "2022-02-11T00:00:44Z",
|
||||
"stargazers_count": 125,
|
||||
"watchers_count": 125,
|
||||
"stargazers_count": 126,
|
||||
"watchers_count": 126,
|
||||
"forks_count": 39,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -26,7 +26,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 39,
|
||||
"watchers": 125,
|
||||
"watchers": 126,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Linux 4.10 < 5.1.17 PTRACE_TRACEME local root",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-31T04:51:43Z",
|
||||
"updated_at": "2022-09-27T02:51:27Z",
|
||||
"updated_at": "2022-10-06T11:10:45Z",
|
||||
"pushed_at": "2019-08-01T16:02:59Z",
|
||||
"stargazers_count": 294,
|
||||
"watchers_count": 294,
|
||||
"stargazers_count": 295,
|
||||
"watchers_count": 295,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 294,
|
||||
"watchers": 295,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -181,10 +181,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -213,7 +213,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -192,13 +192,13 @@
|
|||
"pushed_at": "2020-03-22T15:14:31Z",
|
||||
"stargazers_count": 340,
|
||||
"watchers_count": 340,
|
||||
"forks_count": 90,
|
||||
"forks_count": 91,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 90,
|
||||
"forks": 91,
|
||||
"watchers": 340,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -627,10 +627,10 @@
|
|||
"description": "CVE-2020-0796 - Working PoC - 20200313",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-13T08:34:31Z",
|
||||
"updated_at": "2022-04-28T11:52:56Z",
|
||||
"updated_at": "2022-10-06T10:55:55Z",
|
||||
"pushed_at": "2020-03-13T08:35:03Z",
|
||||
"stargazers_count": 7,
|
||||
"watchers_count": 7,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -638,7 +638,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 7,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T04:38:24Z",
|
||||
"updated_at": "2022-09-23T00:50:01Z",
|
||||
"updated_at": "2022-10-06T12:02:18Z",
|
||||
"pushed_at": "2022-04-14T03:17:44Z",
|
||||
"stargazers_count": 338,
|
||||
"watchers_count": 338,
|
||||
"stargazers_count": 339,
|
||||
"watchers_count": 339,
|
||||
"forks_count": 36,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -29,7 +29,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 36,
|
||||
"watchers": 338,
|
||||
"watchers": 339,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2022-10-05T04:51:13Z",
|
||||
"updated_at": "2022-10-06T08:29:25Z",
|
||||
"pushed_at": "2022-07-17T12:41:46Z",
|
||||
"stargazers_count": 1516,
|
||||
"watchers_count": 1516,
|
||||
"stargazers_count": 1517,
|
||||
"watchers_count": 1517,
|
||||
"forks_count": 311,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -45,7 +45,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 311,
|
||||
"watchers": 1516,
|
||||
"watchers": 1517,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -766,21 +766,28 @@
|
|||
"html_url": "https:\/\/github.com\/Schira4396"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Schira4396\/VcenterKiller",
|
||||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005,提供一键上传webshell,命令执行或者上传公钥使用SSH连接",
|
||||
"description": "一款针对Vcenter的综合利用工具,包含目前最主流的CVE-2021-21972、CVE-2021-21985以及CVE-2021-22005以及log4j,提供一键上传webshell,命令执行或者上传公钥使用SSH免密连接",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-04T03:39:27Z",
|
||||
"updated_at": "2022-10-06T06:06:12Z",
|
||||
"pushed_at": "2022-10-06T03:44:53Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 8,
|
||||
"updated_at": "2022-10-06T11:45:19Z",
|
||||
"pushed_at": "2022-10-06T09:44:33Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"topics": [
|
||||
"go",
|
||||
"golang",
|
||||
"log4j",
|
||||
"log4shell",
|
||||
"scan",
|
||||
"vcenter"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 8,
|
||||
"watchers": 46,
|
||||
"forks": 9,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1004,10 +1004,10 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2022-09-29T14:38:51Z",
|
||||
"updated_at": "2022-10-06T11:07:51Z",
|
||||
"pushed_at": "2022-01-13T05:48:01Z",
|
||||
"stargazers_count": 539,
|
||||
"watchers_count": 539,
|
||||
"stargazers_count": 540,
|
||||
"watchers_count": 540,
|
||||
"forks_count": 147,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1015,7 +1015,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 147,
|
||||
"watchers": 539,
|
||||
"watchers": 540,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2021-3317",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-09T07:36:46Z",
|
||||
"updated_at": "2021-10-24T06:20:59Z",
|
||||
"updated_at": "2022-10-06T10:56:01Z",
|
||||
"pushed_at": "2021-04-09T07:37:29Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 4,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1479,10 +1479,10 @@
|
|||
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-13T03:57:50Z",
|
||||
"updated_at": "2022-10-03T09:31:20Z",
|
||||
"updated_at": "2022-10-06T11:21:44Z",
|
||||
"pushed_at": "2022-09-11T03:55:38Z",
|
||||
"stargazers_count": 3055,
|
||||
"watchers_count": 3055,
|
||||
"stargazers_count": 3056,
|
||||
"watchers_count": 3056,
|
||||
"forks_count": 726,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -1490,7 +1490,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 726,
|
||||
"watchers": 3055,
|
||||
"watchers": 3056,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -4374,7 +4374,7 @@
|
|||
"fork": false,
|
||||
"created_at": "2021-12-17T18:45:19Z",
|
||||
"updated_at": "2022-03-14T08:27:22Z",
|
||||
"pushed_at": "2022-10-05T19:02:34Z",
|
||||
"pushed_at": "2022-10-06T06:50:57Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 2,
|
||||
|
@ -6125,10 +6125,10 @@
|
|||
"description": "A tool for detect&exploit vmware product log4j(cve-2021-44228) vulnerability.Support VMware HCX\/vCenter\/NSX\/Horizon\/vRealize Operations Manager",
|
||||
"fork": false,
|
||||
"created_at": "2021-12-28T01:37:20Z",
|
||||
"updated_at": "2022-10-03T19:22:14Z",
|
||||
"updated_at": "2022-10-06T06:48:49Z",
|
||||
"pushed_at": "2022-01-24T05:37:34Z",
|
||||
"stargazers_count": 111,
|
||||
"watchers_count": 111,
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 30,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -6141,7 +6141,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 30,
|
||||
"watchers": 111,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-0918",
|
||||
"fork": false,
|
||||
"created_at": "2022-05-10T03:50:18Z",
|
||||
"updated_at": "2022-08-19T17:53:34Z",
|
||||
"updated_at": "2022-10-06T06:46:52Z",
|
||||
"pushed_at": "2022-05-13T17:28:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -384,13 +384,13 @@
|
|||
"pushed_at": "2022-04-26T04:26:00Z",
|
||||
"stargazers_count": 55,
|
||||
"watchers_count": 55,
|
||||
"forks_count": 14,
|
||||
"forks_count": 15,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"forks": 15,
|
||||
"watchers": 55,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -213,13 +213,13 @@
|
|||
"pushed_at": "2022-02-23T16:37:13Z",
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 7,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"forks": 6,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2022-23222: Linux Kernel eBPF Local Privilege Escalation",
|
||||
"fork": false,
|
||||
"created_at": "2022-06-07T03:20:23Z",
|
||||
"updated_at": "2022-10-02T16:53:52Z",
|
||||
"updated_at": "2022-10-06T10:56:08Z",
|
||||
"pushed_at": "2022-06-07T03:41:13Z",
|
||||
"stargazers_count": 502,
|
||||
"watchers_count": 502,
|
||||
"stargazers_count": 501,
|
||||
"watchers_count": 501,
|
||||
"forks_count": 88,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 88,
|
||||
"watchers": 502,
|
||||
"watchers": 501,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T04:52:12Z",
|
||||
"updated_at": "2022-09-28T15:02:24Z",
|
||||
"updated_at": "2022-10-06T11:29:57Z",
|
||||
"pushed_at": "2022-09-26T05:23:05Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1999,5 +1999,33 @@
|
|||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 546628423,
|
||||
"name": "Follina-attack-CVE-2022-30190-",
|
||||
"full_name": "Imeneallouche\/Follina-attack-CVE-2022-30190-",
|
||||
"owner": {
|
||||
"login": "Imeneallouche",
|
||||
"id": 89279264,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89279264?v=4",
|
||||
"html_url": "https:\/\/github.com\/Imeneallouche"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Imeneallouche\/Follina-attack-CVE-2022-30190-",
|
||||
"description": "this is a demo attack of FOLLINA exploit , a vulnerability that has been discovered in May 2022 and stood unpatched until June 2022",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-06T11:41:43Z",
|
||||
"updated_at": "2022-10-06T11:41:43Z",
|
||||
"pushed_at": "2022-10-06T11:44:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -41,10 +41,10 @@
|
|||
"description": "A POC of CVE-2022-30206",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-26T19:38:24Z",
|
||||
"updated_at": "2022-09-27T10:55:22Z",
|
||||
"updated_at": "2022-10-06T12:01:02Z",
|
||||
"pushed_at": "2022-09-26T19:42:57Z",
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"stargazers_count": 6,
|
||||
"watchers_count": 6,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -61,7 +61,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 5,
|
||||
"watchers": 6,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,10 +13,10 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2022-09-30T16:43:28Z",
|
||||
"updated_at": "2022-10-05T21:56:04Z",
|
||||
"updated_at": "2022-10-06T08:33:14Z",
|
||||
"pushed_at": "2022-10-01T09:43:20Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,13 +73,13 @@
|
|||
"pushed_at": "2022-09-24T20:52:18Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 4,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"forks": 5,
|
||||
"watchers": 11,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,7 +13,7 @@
|
|||
"description": "A reliable exploit + write-up to elevate privileges to root. (Tested on Ubuntu 22.04)",
|
||||
"fork": false,
|
||||
"created_at": "2022-09-12T19:22:44Z",
|
||||
"updated_at": "2022-10-05T12:36:54Z",
|
||||
"updated_at": "2022-10-06T10:28:00Z",
|
||||
"pushed_at": "2022-09-19T19:41:34Z",
|
||||
"stargazers_count": 178,
|
||||
"watchers_count": 178,
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "Check for NotProxyShell CVE-2022-40140 & CVE-2022-41082",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-02T08:14:03Z",
|
||||
"updated_at": "2022-10-05T08:34:47Z",
|
||||
"updated_at": "2022-10-06T12:06:41Z",
|
||||
"pushed_at": "2022-10-02T12:16:47Z",
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"forks_count": 4,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -24,7 +24,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 4,
|
||||
"watchers": 17,
|
||||
"watchers": 19,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -69,10 +69,38 @@
|
|||
"description": "Code set relating to CVE-2022-41040",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-06T01:20:32Z",
|
||||
"updated_at": "2022-10-06T01:21:58Z",
|
||||
"updated_at": "2022-10-06T07:25:33Z",
|
||||
"pushed_at": "2022-10-06T01:27:51Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 546531008,
|
||||
"name": "CVE-2022-41040-RCE-POC",
|
||||
"full_name": "kev-beaumont\/CVE-2022-41040-RCE-POC",
|
||||
"owner": {
|
||||
"login": "kev-beaumont",
|
||||
"id": 115143938,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115143938?v=4",
|
||||
"html_url": "https:\/\/github.com\/kev-beaumont"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kev-beaumont\/CVE-2022-41040-RCE-POC",
|
||||
"description": "CVE-2022-41040 aka Proxynotshell",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-06T08:18:55Z",
|
||||
"updated_at": "2022-10-06T08:27:11Z",
|
||||
"pushed_at": "2022-10-06T08:20:53Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -80,7 +108,7 @@
|
|||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -26,5 +26,61 @@
|
|||
"forks": 4,
|
||||
"watchers": 7,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 546532923,
|
||||
"name": "CVE-2022-41082-RCE-POC",
|
||||
"full_name": "kev-beaumont\/CVE-2022-41082-RCE-POC",
|
||||
"owner": {
|
||||
"login": "kev-beaumont",
|
||||
"id": 115143938,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115143938?v=4",
|
||||
"html_url": "https:\/\/github.com\/kev-beaumont"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kev-beaumont\/CVE-2022-41082-RCE-POC",
|
||||
"description": "CVE-2022-41082 aka ProxyNotShell",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-06T08:22:38Z",
|
||||
"updated_at": "2022-10-06T08:26:55Z",
|
||||
"pushed_at": "2022-10-06T08:24:51Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 546597750,
|
||||
"name": "CVE-2022-41082-MASS-RCE",
|
||||
"full_name": "V1rpo\/CVE-2022-41082-MASS-RCE",
|
||||
"owner": {
|
||||
"login": "V1rpo",
|
||||
"id": 115152449,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115152449?v=4",
|
||||
"html_url": "https:\/\/github.com\/V1rpo"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/V1rpo\/CVE-2022-41082-MASS-RCE",
|
||||
"description": "ProxyNotShell fully automated mass rce",
|
||||
"fork": false,
|
||||
"created_at": "2022-10-06T10:34:33Z",
|
||||
"updated_at": "2022-10-06T11:38:27Z",
|
||||
"pushed_at": "2022-10-06T11:38:23Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"web_commit_signoff_required": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -2857,6 +2857,7 @@ Microsoft Windows Support Diagnostic Tool (MSDT) Remote Code Execution Vulnerabi
|
|||
- [EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-](https://github.com/EkamSinghWalia/Follina-MSDT-Vulnerability-CVE-2022-30190-)
|
||||
- [jeffreybxu/five-nights-at-follina-s](https://github.com/jeffreybxu/five-nights-at-follina-s)
|
||||
- [winstxnhdw/CVE-2022-30190](https://github.com/winstxnhdw/CVE-2022-30190)
|
||||
- [Imeneallouche/Follina-attack-CVE-2022-30190-](https://github.com/Imeneallouche/Follina-attack-CVE-2022-30190-)
|
||||
|
||||
### CVE-2022-30206 (2022-07-12)
|
||||
|
||||
|
@ -3797,6 +3798,7 @@ Microsoft Exchange Server Elevation of Privilege Vulnerability.
|
|||
- [numanturle/CVE-2022-41040](https://github.com/numanturle/CVE-2022-41040)
|
||||
- [r3dcl1ff/CVE-2022-41040](https://github.com/r3dcl1ff/CVE-2022-41040)
|
||||
- [d3duct1v/CVE-2022-41040](https://github.com/d3duct1v/CVE-2022-41040)
|
||||
- [kev-beaumont/CVE-2022-41040-RCE-POC](https://github.com/kev-beaumont/CVE-2022-41040-RCE-POC)
|
||||
|
||||
### CVE-2022-41082 (2022-10-02)
|
||||
|
||||
|
@ -3805,6 +3807,8 @@ Microsoft Exchange Server Remote Code Execution Vulnerability.
|
|||
</code>
|
||||
|
||||
- [Diverto/nse-exchange](https://github.com/Diverto/nse-exchange)
|
||||
- [kev-beaumont/CVE-2022-41082-RCE-POC](https://github.com/kev-beaumont/CVE-2022-41082-RCE-POC)
|
||||
- [V1rpo/CVE-2022-41082-MASS-RCE](https://github.com/V1rpo/CVE-2022-41082-MASS-RCE)
|
||||
|
||||
### CVE-2022-41218 (2022-09-21)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue