Auto Update 2020/09/14 18:08:59

This commit is contained in:
motikan2010-bot 2020-09-14 18:08:59 +09:00
parent 2a9fb435ee
commit bce94ffbac
30 changed files with 126 additions and 126 deletions

View file

@ -312,13 +312,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-08-14T01:20:11Z",
"updated_at": "2020-09-14T03:36:26Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 65,
"forks": 65,
"watchers": 151,
"watchers": 152,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Apache synapse RMI 反序列化",
"fork": false,
"created_at": "2017-12-18T03:54:56Z",
"updated_at": "2019-10-11T19:04:23Z",
"updated_at": "2020-09-14T08:20:29Z",
"pushed_at": "2018-06-21T02:35:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 9,
"forks": 9,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-03-19T05:59:15Z",
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 17,
"forks": 17,
"forks_count": 18,
"forks": 18,
"watchers": 31,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "Remote root exploit for the SAMBA CVE-2017-7494 vulnerability",
"fork": false,
"created_at": "2017-06-05T16:25:57Z",
"updated_at": "2020-09-10T00:11:01Z",
"updated_at": "2020-09-14T06:29:26Z",
"pushed_at": "2017-11-27T16:28:14Z",
"stargazers_count": 203,
"watchers_count": 203,
"stargazers_count": 204,
"watchers_count": 204,
"forks_count": 68,
"forks": 68,
"watchers": 203,
"watchers": 204,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-08-22T01:20:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"forks_count": 3,
"forks": 3,
"watchers": 4,
"score": 0
},

View file

@ -59,13 +59,13 @@
"description": "PoC for CVE-2018-0802 And CVE-2017-11882",
"fork": false,
"created_at": "2018-01-12T11:38:33Z",
"updated_at": "2020-08-14T01:20:11Z",
"updated_at": "2020-09-14T03:36:26Z",
"pushed_at": "2018-01-12T11:42:29Z",
"stargazers_count": 151,
"watchers_count": 151,
"stargazers_count": 152,
"watchers_count": 152,
"forks_count": 65,
"forks": 65,
"watchers": 151,
"watchers": 152,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "POC for CVE-2018-0824",
"fork": false,
"created_at": "2018-06-15T08:59:37Z",
"updated_at": "2020-06-11T02:48:45Z",
"updated_at": "2020-09-14T05:27:49Z",
"pushed_at": "2018-06-25T07:13:36Z",
"stargazers_count": 71,
"watchers_count": 71,
"forks_count": 34,
"forks": 34,
"watchers": 71,
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 35,
"forks": 35,
"watchers": 72,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-03-08T18:42:56Z",
"stargazers_count": 199,
"watchers_count": 199,
"forks_count": 55,
"forks": 55,
"forks_count": 56,
"forks": 56,
"watchers": 199,
"score": 0
}

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-09-11T09:24:38Z",
"updated_at": "2020-09-14T08:47:50Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 303,
"watchers_count": 303,
"stargazers_count": 302,
"watchers_count": 302,
"forks_count": 69,
"forks": 69,
"watchers": 303,
"watchers": 302,
"score": 0
}
]

View file

@ -105,8 +105,8 @@
"description": "Rust implementation of the Fusée Gelée exploit (CVE-2018-6242) for Tegra processors.",
"fork": false,
"created_at": "2020-09-07T03:28:15Z",
"updated_at": "2020-09-12T21:51:56Z",
"pushed_at": "2020-09-12T21:51:54Z",
"updated_at": "2020-09-14T03:40:53Z",
"pushed_at": "2020-09-14T03:40:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,13 +13,13 @@
"description": "Joomla内核SQL注入漏洞原理、docker及poc[基于pocsuite框架]",
"fork": false,
"created_at": "2019-11-14T09:18:40Z",
"updated_at": "2019-11-14T09:35:22Z",
"updated_at": "2020-09-14T06:37:44Z",
"pushed_at": "2019-11-14T09:31:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exploit code for CVE-2018-9411 for MediaCasService",
"fork": false,
"created_at": "2018-10-30T18:48:20Z",
"updated_at": "2020-02-20T04:01:34Z",
"updated_at": "2020-09-14T08:15:12Z",
"pushed_at": "2018-10-30T21:51:16Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"forks_count": 14,
"forks": 14,
"watchers": 47,
"watchers": 48,
"score": 0
}
]

View file

@ -1094,13 +1094,13 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-09-09T14:43:43Z",
"updated_at": "2020-09-14T06:37:48Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1117,
"watchers_count": 1117,
"stargazers_count": 1118,
"watchers_count": 1118,
"forks_count": 380,
"forks": 380,
"watchers": 1117,
"watchers": 1118,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-14T02:15:39Z",
"updated_at": "2020-09-14T09:05:41Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1650,
"watchers_count": 1650,
"forks_count": 446,
"forks": 446,
"watchers": 1650,
"stargazers_count": 1684,
"watchers_count": 1684,
"forks_count": 450,
"forks": 450,
"watchers": 1684,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "增强版WeblogicScan、检测结果更精确、插件化、添加CVE-2019-2618CVE-2019-2729检测Python3支持",
"fork": false,
"created_at": "2019-06-21T09:22:43Z",
"updated_at": "2020-09-11T15:31:38Z",
"updated_at": "2020-09-14T07:38:21Z",
"pushed_at": "2020-04-26T10:49:25Z",
"stargazers_count": 631,
"watchers_count": 631,
"stargazers_count": 630,
"watchers_count": 630,
"forks_count": 135,
"forks": 135,
"watchers": 631,
"watchers": 630,
"score": 0
},
{

View file

@ -174,13 +174,13 @@
"description": "CVE-2019-2725 命令回显",
"fork": false,
"created_at": "2019-05-29T01:57:05Z",
"updated_at": "2020-09-11T06:30:16Z",
"updated_at": "2020-09-14T04:10:53Z",
"pushed_at": "2019-08-08T09:48:20Z",
"stargazers_count": 356,
"watchers_count": 356,
"stargazers_count": 357,
"watchers_count": 357,
"forks_count": 153,
"forks": 153,
"watchers": 356,
"watchers": 357,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
"fork": false,
"created_at": "2019-08-23T01:42:57Z",
"updated_at": "2020-09-12T02:25:12Z",
"updated_at": "2020-09-14T04:10:20Z",
"pushed_at": "2019-09-26T05:46:14Z",
"stargazers_count": 34,
"watchers_count": 34,
"stargazers_count": 35,
"watchers_count": 35,
"forks_count": 9,
"forks": 9,
"watchers": 34,
"watchers": 35,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
"fork": false,
"created_at": "2019-02-12T22:07:47Z",
"updated_at": "2020-08-29T20:33:17Z",
"updated_at": "2020-09-14T06:52:45Z",
"pushed_at": "2019-02-20T15:35:34Z",
"stargazers_count": 178,
"watchers_count": 178,
"stargazers_count": 179,
"watchers_count": 179,
"forks_count": 63,
"forks": 63,
"watchers": 178,
"watchers": 179,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "poc for cve-2020-0022",
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2020-09-10T21:37:10Z",
"updated_at": "2020-09-14T08:47:32Z",
"pushed_at": "2020-07-16T06:51:16Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 23,
"forks": 23,
"watchers": 44,
"watchers": 45,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": null,
"fork": false,
"created_at": "2020-08-10T21:34:16Z",
"updated_at": "2020-09-11T12:28:49Z",
"updated_at": "2020-09-14T06:40:45Z",
"pushed_at": "2020-08-11T21:48:12Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 4,
"forks": 4,
"watchers": 13,
"watchers": 14,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-09-11T07:38:26Z",
"updated_at": "2020-09-14T03:11:02Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 412,
"watchers_count": 412,
"stargazers_count": 413,
"watchers_count": 413,
"forks_count": 98,
"forks": 98,
"watchers": 412,
"watchers": 413,
"score": 0
}
]

View file

@ -864,13 +864,13 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2020-09-10T03:22:35Z",
"updated_at": "2020-09-14T06:50:47Z",
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 996,
"watchers_count": 996,
"stargazers_count": 998,
"watchers_count": 998,
"forks_count": 329,
"forks": 329,
"watchers": 996,
"watchers": 998,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-0890 | Windows Hyper-V Denial of Service Vulnerability proof-of-concept code",
"fork": false,
"created_at": "2020-09-03T14:45:51Z",
"updated_at": "2020-09-10T04:07:15Z",
"updated_at": "2020-09-14T04:09:36Z",
"pushed_at": "2020-09-08T20:01:05Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "writeup of CVE-2020-1362",
"fork": false,
"created_at": "2020-07-17T07:35:05Z",
"updated_at": "2020-09-13T14:23:15Z",
"updated_at": "2020-09-14T04:26:09Z",
"pushed_at": "2020-07-17T07:54:26Z",
"stargazers_count": 206,
"watchers_count": 206,
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 38,
"forks": 38,
"watchers": 206,
"watchers": 205,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-09-14T03:05:40Z",
"updated_at": "2020-09-14T09:08:52Z",
"pushed_at": "2020-09-11T13:59:15Z",
"stargazers_count": 209,
"watchers_count": 209,
"forks_count": 20,
"forks": 20,
"watchers": 209,
"stargazers_count": 250,
"watchers_count": 250,
"forks_count": 26,
"forks": 26,
"watchers": 250,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-25T05:46:30Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 12,
"forks": 12,
"forks_count": 13,
"forks": 13,
"watchers": 22,
"score": 0
}

View file

@ -105,13 +105,13 @@
"description": "Weblogic IIOP CVE-2020-2551",
"fork": false,
"created_at": "2020-02-28T08:46:21Z",
"updated_at": "2020-09-13T18:38:11Z",
"updated_at": "2020-09-14T04:46:26Z",
"pushed_at": "2020-04-07T03:32:24Z",
"stargazers_count": 226,
"watchers_count": 226,
"stargazers_count": 227,
"watchers_count": 227,
"forks_count": 56,
"forks": 56,
"watchers": 226,
"watchers": 227,
"score": 0
},
{

View file

@ -82,13 +82,13 @@
"description": "WebLogic利用CVE-2020-2883打Shiro rememberMe反序列化漏洞一键注册蚁剑filter内存shell",
"fork": false,
"created_at": "2020-08-19T03:34:06Z",
"updated_at": "2020-09-13T07:46:20Z",
"updated_at": "2020-09-14T08:19:32Z",
"pushed_at": "2020-08-25T03:17:32Z",
"stargazers_count": 134,
"watchers_count": 134,
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 19,
"forks": 19,
"watchers": 134,
"watchers": 135,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-09-14T02:15:39Z",
"updated_at": "2020-09-14T09:05:41Z",
"pushed_at": "2020-08-03T04:37:30Z",
"stargazers_count": 1650,
"watchers_count": 1650,
"forks_count": 446,
"forks": 446,
"watchers": 1650,
"stargazers_count": 1684,
"watchers_count": 1684,
"forks_count": 450,
"forks": 450,
"watchers": 1684,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-09-13T07:38:14Z",
"updated_at": "2020-09-14T04:43:59Z",
"pushed_at": "2020-07-15T02:52:33Z",
"stargazers_count": 309,
"watchers_count": 309,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 97,
"forks": 97,
"watchers": 309,
"watchers": 310,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)",
"fork": false,
"created_at": "2020-07-15T15:20:09Z",
"updated_at": "2020-09-10T04:33:27Z",
"updated_at": "2020-09-14T07:15:41Z",
"pushed_at": "2020-07-23T19:45:25Z",
"stargazers_count": 118,
"watchers_count": 118,
"stargazers_count": 119,
"watchers_count": 119,
"forks_count": 41,
"forks": 41,
"watchers": 118,
"watchers": 119,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Regular expression matching for URL's. Maintained, safe, and browser-friendly version of url-regex. Resolves CVE-2020-7661 for Node.js servers.",
"fork": false,
"created_at": "2020-08-15T07:42:50Z",
"updated_at": "2020-08-31T12:29:17Z",
"updated_at": "2020-09-14T07:20:03Z",
"pushed_at": "2020-08-27T06:41:01Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 1,
"forks": 1,
"watchers": 10,
"watchers": 11,
"score": 0
}
]