Auto Update 2025/01/14 06:31:53

This commit is contained in:
motikan2010-bot 2025-01-14 15:31:53 +09:00
parent 7dc8a3fde9
commit a5c9c3a350
29 changed files with 110 additions and 110 deletions

View file

@ -76,10 +76,10 @@
"description": null,
"fork": false,
"created_at": "2023-08-02T13:28:48Z",
"updated_at": "2023-08-02T13:28:49Z",
"updated_at": "2025-01-14T02:24:50Z",
"pushed_at": "2023-09-03T15:06:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
}

View file

@ -76,10 +76,10 @@
"description": "CVE-2016-5195 (dirtycow\/dirtyc0w) proof of concept for Android",
"fork": false,
"created_at": "2016-10-21T11:19:21Z",
"updated_at": "2025-01-04T19:19:22Z",
"updated_at": "2025-01-14T05:37:30Z",
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 964,
"watchers_count": 964,
"stargazers_count": 966,
"watchers_count": 966,
"has_discussions": false,
"forks_count": 395,
"allow_forking": true,
@ -88,7 +88,7 @@
"topics": [],
"visibility": "public",
"forks": 395,
"watchers": 964,
"watchers": 966,
"score": 0,
"subscribers_count": 64
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2018-10933 very simple POC",
"fork": false,
"created_at": "2018-10-17T09:01:44Z",
"updated_at": "2024-08-12T19:42:29Z",
"updated_at": "2025-01-14T04:09:13Z",
"pushed_at": "2018-10-23T13:51:06Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 127,
"watchers": 128,
"score": 0,
"subscribers_count": 11
},
@ -45,10 +45,10 @@
"description": "Spawn to shell without any credentials by using CVE-2018-10933 (LibSSH)",
"fork": false,
"created_at": "2018-10-17T14:14:12Z",
"updated_at": "2024-10-04T07:02:46Z",
"updated_at": "2025-01-14T04:18:37Z",
"pushed_at": "2023-12-19T20:46:55Z",
"stargazers_count": 496,
"watchers_count": 496,
"stargazers_count": 497,
"watchers_count": 497,
"has_discussions": false,
"forks_count": 118,
"allow_forking": true,
@ -57,7 +57,7 @@
"topics": [],
"visibility": "public",
"forks": 118,
"watchers": 496,
"watchers": 497,
"score": 0,
"subscribers_count": 22
},

View file

@ -76,7 +76,7 @@
"description": "Unsigned driver loader using CVE-2018-19320",
"fork": false,
"created_at": "2022-11-12T05:48:13Z",
"updated_at": "2025-01-10T18:46:37Z",
"updated_at": "2025-01-14T04:54:09Z",
"pushed_at": "2023-04-09T13:50:29Z",
"stargazers_count": 223,
"watchers_count": 223,

View file

@ -143,13 +143,13 @@
"stargazers_count": 23,
"watchers_count": 23,
"has_discussions": false,
"forks_count": 8,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"forks": 9,
"watchers": 23,
"score": 0,
"subscribers_count": 5

View file

@ -236,13 +236,13 @@
"stargazers_count": 1609,
"watchers_count": 1609,
"has_discussions": false,
"forks_count": 482,
"forks_count": 481,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 482,
"forks": 481,
"watchers": 1609,
"score": 0,
"subscribers_count": 28

View file

@ -50,10 +50,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2025-01-12T07:43:36Z",
"updated_at": "2025-01-14T02:53:47Z",
"pushed_at": "2023-01-29T03:31:27Z",
"stargazers_count": 823,
"watchers_count": 823,
"stargazers_count": 824,
"watchers_count": 824,
"has_discussions": false,
"forks_count": 125,
"allow_forking": true,
@ -62,7 +62,7 @@
"topics": [],
"visibility": "public",
"forks": 125,
"watchers": 823,
"watchers": 824,
"score": 0,
"subscribers_count": 13
},

View file

@ -884,7 +884,7 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2025-01-06T03:02:40Z",
"updated_at": "2025-01-14T03:16:00Z",
"pushed_at": "2022-01-15T16:18:44Z",
"stargazers_count": 935,
"watchers_count": 935,

View file

@ -1050,10 +1050,10 @@
"description": "CVE-2022-30190 | MS-MSDT Follina One Click",
"fork": false,
"created_at": "2022-06-02T16:09:02Z",
"updated_at": "2024-08-12T20:23:47Z",
"updated_at": "2025-01-14T03:51:03Z",
"pushed_at": "2022-06-03T08:14:10Z",
"stargazers_count": 22,
"watchers_count": 22,
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -1062,7 +1062,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 22,
"watchers": 21,
"score": 0,
"subscribers_count": 2
},

View file

@ -235,10 +235,10 @@
"description": "CVE-2022-39197 漏洞补丁. CVE-2022-39197 Vulnerability Patch. ",
"fork": false,
"created_at": "2022-09-26T08:58:21Z",
"updated_at": "2024-11-24T15:25:04Z",
"updated_at": "2025-01-14T03:51:04Z",
"pushed_at": "2022-09-26T13:20:38Z",
"stargazers_count": 315,
"watchers_count": 315,
"stargazers_count": 313,
"watchers_count": 313,
"has_discussions": false,
"forks_count": 46,
"allow_forking": true,
@ -251,7 +251,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 315,
"watchers": 313,
"score": 0,
"subscribers_count": 5
},

View file

@ -14,8 +14,8 @@
"description": "CVE-2023-24706",
"fork": false,
"created_at": "2023-11-10T05:43:52Z",
"updated_at": "2023-11-10T05:50:25Z",
"pushed_at": "2023-11-10T05:50:21Z",
"updated_at": "2025-01-14T06:23:41Z",
"pushed_at": "2025-01-14T06:23:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,

View file

@ -14,10 +14,10 @@
"description": null,
"fork": false,
"created_at": "2023-10-23T19:06:36Z",
"updated_at": "2024-07-23T13:20:26Z",
"updated_at": "2025-01-14T03:51:05Z",
"pushed_at": "2023-10-29T11:12:26Z",
"stargazers_count": 163,
"watchers_count": 163,
"stargazers_count": 162,
"watchers_count": 162,
"has_discussions": false,
"forks_count": 53,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 163,
"watchers": 162,
"score": 0,
"subscribers_count": 4
}

View file

@ -532,10 +532,10 @@
"description": "CVE-2023-36845 Unauthenticated Juniper Remote Code Execution Vulnerability Scanner",
"fork": false,
"created_at": "2024-02-18T15:37:58Z",
"updated_at": "2024-02-18T18:31:24Z",
"updated_at": "2025-01-14T05:59:12Z",
"pushed_at": "2024-02-18T18:44:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -544,7 +544,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},

View file

@ -45,10 +45,10 @@
"description": "CVE-2023-38831 winrar exploit generator",
"fork": false,
"created_at": "2023-08-25T09:44:08Z",
"updated_at": "2025-01-08T12:41:28Z",
"updated_at": "2025-01-14T03:51:05Z",
"pushed_at": "2023-11-26T06:46:44Z",
"stargazers_count": 784,
"watchers_count": 784,
"stargazers_count": 783,
"watchers_count": 783,
"has_discussions": false,
"forks_count": 140,
"allow_forking": true,
@ -61,7 +61,7 @@
],
"visibility": "public",
"forks": 140,
"watchers": 784,
"watchers": 783,
"score": 0,
"subscribers_count": 9
},

View file

@ -19,13 +19,13 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -14,10 +14,10 @@
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
"fork": false,
"created_at": "2024-01-16T06:52:02Z",
"updated_at": "2025-01-13T01:37:28Z",
"updated_at": "2025-01-14T00:54:58Z",
"pushed_at": "2024-08-18T08:26:46Z",
"stargazers_count": 1381,
"watchers_count": 1381,
"stargazers_count": 1382,
"watchers_count": 1382,
"has_discussions": false,
"forks_count": 238,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 238,
"watchers": 1381,
"watchers": 1382,
"score": 0,
"subscribers_count": 21
},

View file

@ -45,19 +45,19 @@
"description": "PoC for CVE-2023-4911",
"fork": false,
"created_at": "2023-10-04T14:12:16Z",
"updated_at": "2025-01-05T09:41:34Z",
"updated_at": "2025-01-14T01:45:57Z",
"pushed_at": "2023-10-04T14:16:36Z",
"stargazers_count": 382,
"watchers_count": 382,
"stargazers_count": 383,
"watchers_count": 383,
"has_discussions": false,
"forks_count": 58,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 58,
"watchers": 382,
"forks": 59,
"watchers": 383,
"score": 0,
"subscribers_count": 5
},

View file

@ -107,10 +107,10 @@
"description": "Proof of Concept for Path Traversal in Apache Struts (\"CVE-2023-50164\")",
"fork": false,
"created_at": "2023-12-17T14:18:54Z",
"updated_at": "2024-11-16T19:50:08Z",
"updated_at": "2025-01-14T03:51:06Z",
"pushed_at": "2023-12-18T02:46:21Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 58,
"watchers_count": 58,
"has_discussions": true,
"forks_count": 16,
"allow_forking": true,
@ -119,7 +119,7 @@
"topics": [],
"visibility": "public",
"forks": 16,
"watchers": 59,
"watchers": 58,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,10 +14,10 @@
"description": "Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.",
"fork": false,
"created_at": "2024-03-20T21:16:41Z",
"updated_at": "2025-01-13T15:34:14Z",
"updated_at": "2025-01-14T03:51:06Z",
"pushed_at": "2024-04-17T16:09:54Z",
"stargazers_count": 2329,
"watchers_count": 2329,
"stargazers_count": 2325,
"watchers_count": 2325,
"has_discussions": false,
"forks_count": 302,
"allow_forking": true,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 302,
"watchers": 2329,
"watchers": 2325,
"score": 0,
"subscribers_count": 27
},

View file

@ -14,19 +14,19 @@
"description": "CVE-2024-31317",
"fork": false,
"created_at": "2024-12-05T01:36:59Z",
"updated_at": "2025-01-04T07:07:09Z",
"updated_at": "2025-01-14T05:34:46Z",
"pushed_at": "2024-12-05T01:52:45Z",
"stargazers_count": 14,
"watchers_count": 14,
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 14,
"forks": 5,
"watchers": 15,
"score": 0,
"subscribers_count": 1
}

View file

@ -143,13 +143,13 @@
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1

View file

@ -451,10 +451,10 @@
"description": "This is a C language program designed to test the Windows TCP\/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
"fork": false,
"created_at": "2024-09-01T09:20:02Z",
"updated_at": "2025-01-02T15:59:04Z",
"updated_at": "2025-01-14T05:25:38Z",
"pushed_at": "2024-09-08T07:12:26Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
@ -463,7 +463,7 @@
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "CVE-2024-38100 Windows Leaked Wallpaper Escelation to RCE vulnerability",
"fork": false,
"created_at": "2024-08-06T18:26:50Z",
"updated_at": "2024-10-25T09:41:56Z",
"updated_at": "2025-01-14T04:23:03Z",
"pushed_at": "2024-08-06T18:29:09Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 9,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}

View file

@ -14,10 +14,10 @@
"description": "PoC for CVE-2024-48990",
"fork": false,
"created_at": "2024-11-20T18:41:25Z",
"updated_at": "2025-01-12T18:32:01Z",
"updated_at": "2025-01-14T05:01:22Z",
"pushed_at": "2024-11-20T18:49:33Z",
"stargazers_count": 94,
"watchers_count": 94,
"stargazers_count": 95,
"watchers_count": 95,
"has_discussions": false,
"forks_count": 18,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 94,
"watchers": 95,
"score": 0,
"subscribers_count": 1
},

View file

@ -14,10 +14,10 @@
"description": "WPTaskScheduler RPC Persistence & CVE-2024-49039 via Task Scheduler",
"fork": false,
"created_at": "2024-11-19T08:57:18Z",
"updated_at": "2025-01-08T09:21:16Z",
"updated_at": "2025-01-14T03:24:56Z",
"pushed_at": "2024-11-19T09:15:26Z",
"stargazers_count": 117,
"watchers_count": 117,
"stargazers_count": 118,
"watchers_count": 118,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 117,
"watchers": 118,
"score": 0,
"subscribers_count": 2
},

View file

@ -14,10 +14,10 @@
"description": "LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113",
"fork": false,
"created_at": "2025-01-01T15:48:38Z",
"updated_at": "2025-01-13T13:37:39Z",
"updated_at": "2025-01-14T06:20:03Z",
"pushed_at": "2025-01-02T16:07:23Z",
"stargazers_count": 438,
"watchers_count": 438,
"stargazers_count": 441,
"watchers_count": 441,
"has_discussions": false,
"forks_count": 103,
"allow_forking": true,
@ -26,7 +26,7 @@
"topics": [],
"visibility": "public",
"forks": 103,
"watchers": 438,
"watchers": 441,
"score": 0,
"subscribers_count": 3
},

View file

@ -14,19 +14,19 @@
"description": "Escape macOS Sandbox using sharedfilelistd exploit",
"fork": false,
"created_at": "2025-01-08T09:55:44Z",
"updated_at": "2025-01-13T23:31:23Z",
"updated_at": "2025-01-14T06:17:53Z",
"pushed_at": "2025-01-09T06:34:50Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 41,
"watchers_count": 41,
"has_discussions": false,
"forks_count": 5,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 34,
"forks": 7,
"watchers": 41,
"score": 0,
"subscribers_count": 1
}

View file

@ -50,7 +50,7 @@
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -63,7 +63,7 @@
"wordpress-plugin"
],
"visibility": "public",
"forks": 1,
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1

View file

@ -107,19 +107,19 @@
"description": "CVE-2025-0282 is a critical vulnerability found in Ivanti Connect Secure, allowing Remote Command Execution (RCE) through a buffer overflow exploit.",
"fork": false,
"created_at": "2025-01-11T02:06:51Z",
"updated_at": "2025-01-13T15:38:47Z",
"updated_at": "2025-01-14T02:14:50Z",
"pushed_at": "2025-01-11T23:54:06Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 3,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 25,
"forks": 5,
"watchers": 27,
"score": 0,
"subscribers_count": 0
},