Auto Update 2022/11/14 06:17:41

This commit is contained in:
motikan2010-bot 2022-11-14 15:17:41 +09:00
parent 3bb0b887c6
commit c68ca9656f
40 changed files with 164 additions and 164 deletions

View file

@ -199,7 +199,7 @@
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-03T00:17:18Z",
"updated_at": "2022-08-03T16:34:29Z",
"updated_at": "2022-11-14T00:57:39Z",
"pushed_at": "2022-11-13T15:49:47Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "A PoC of KNOXout (CVE-2016-6584) - bypassing Samsung KNOX protections and root Samsung Galaxy S6 Android Device.",
"fork": false,
"created_at": "2016-09-16T07:34:50Z",
"updated_at": "2022-10-16T19:49:07Z",
"updated_at": "2022-11-14T02:48:51Z",
"pushed_at": "2016-09-18T06:55:38Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 80,
"watchers_count": 80,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 81,
"watchers": 80,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -75,7 +75,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
},
{

View file

@ -100,10 +100,10 @@
"description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.",
"fork": false,
"created_at": "2021-01-29T16:08:35Z",
"updated_at": "2022-11-10T06:53:56Z",
"updated_at": "2022-11-14T01:34:12Z",
"pushed_at": "2021-01-29T16:22:39Z",
"stargazers_count": 47,
"watchers_count": 47,
"stargazers_count": 48,
"watchers_count": 48,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 47,
"watchers": 48,
"score": 0
},
{

View file

@ -568,10 +568,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -601,7 +601,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "CVE-2019-1458 Windows LPE Exploit",
"fork": false,
"created_at": "2020-03-11T08:30:14Z",
"updated_at": "2022-11-09T18:06:39Z",
"updated_at": "2022-11-14T02:29:57Z",
"pushed_at": "2020-03-11T09:59:01Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"has_discussions": false,
"forks_count": 36,
"allow_forking": true,
@ -58,7 +58,7 @@
],
"visibility": "public",
"forks": 36,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "telegram bug that discloses user's hidden phone number (still unpatched) (exploit included) ",
"fork": false,
"created_at": "2021-12-10T19:03:53Z",
"updated_at": "2022-11-09T02:56:08Z",
"updated_at": "2022-11-14T00:37:23Z",
"pushed_at": "2022-11-13T09:06:41Z",
"stargazers_count": 64,
"watchers_count": 64,
"stargazers_count": 65,
"watchers_count": 65,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
@ -36,7 +36,7 @@
],
"visibility": "public",
"forks": 15,
"watchers": 64,
"watchers": 65,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-13T15:13:53Z",
"updated_at": "2022-11-14T01:04:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3598,
"watchers_count": 3598,
"stargazers_count": 3599,
"watchers_count": 3599,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -74,7 +74,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3598,
"watchers": 3599,
"score": 0
},
{

View file

@ -187,10 +187,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -220,7 +220,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2019-10-11T09:08:02Z",
"updated_at": "2022-11-09T18:04:53Z",
"updated_at": "2022-11-14T04:21:08Z",
"pushed_at": "2020-02-26T09:24:45Z",
"stargazers_count": 99,
"watchers_count": 99,
"stargazers_count": 100,
"watchers_count": 100,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 99,
"watchers": 100,
"score": 0
},
{

View file

@ -42,10 +42,10 @@
"description": "This is an exploit for CVE-2020-0674 that runs on the x64 version of IE 8, 9, 10, and 11 on Windows 7.",
"fork": false,
"created_at": "2020-05-07T22:02:25Z",
"updated_at": "2022-11-13T17:58:55Z",
"updated_at": "2022-11-14T05:00:09Z",
"pushed_at": "2020-05-15T09:03:36Z",
"stargazers_count": 217,
"watchers_count": 217,
"stargazers_count": 218,
"watchers_count": 218,
"has_discussions": false,
"forks_count": 71,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 71,
"watchers": 217,
"watchers": 218,
"score": 0
},
{

View file

@ -1090,10 +1090,10 @@
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
"fork": false,
"created_at": "2020-03-30T11:42:56Z",
"updated_at": "2022-11-09T18:06:57Z",
"updated_at": "2022-11-14T03:41:42Z",
"pushed_at": "2020-12-07T20:04:27Z",
"stargazers_count": 1217,
"watchers_count": 1217,
"stargazers_count": 1216,
"watchers_count": 1216,
"has_discussions": false,
"forks_count": 372,
"allow_forking": true,
@ -1108,7 +1108,7 @@
],
"visibility": "public",
"forks": 372,
"watchers": 1217,
"watchers": 1216,
"score": 0
},
{

View file

@ -165,10 +165,10 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2022-11-09T18:09:26Z",
"updated_at": "2022-11-14T02:58:29Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 478,
"watchers_count": 478,
"stargazers_count": 479,
"watchers_count": 479,
"has_discussions": false,
"forks_count": 135,
"allow_forking": true,
@ -177,7 +177,7 @@
"topics": [],
"visibility": "public",
"forks": 135,
"watchers": 478,
"watchers": 479,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-11-13T15:13:53Z",
"updated_at": "2022-11-14T01:04:48Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3598,
"watchers_count": 3598,
"stargazers_count": 3599,
"watchers_count": 3599,
"has_discussions": false,
"forks_count": 1042,
"allow_forking": true,
@ -45,7 +45,7 @@
],
"visibility": "public",
"forks": 1042,
"watchers": 3598,
"watchers": 3599,
"score": 0
},
{
@ -386,13 +386,13 @@
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"forks": 11,
"watchers": 18,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-11-13T15:13:52Z",
"updated_at": "2022-11-14T03:14:46Z",
"pushed_at": "2022-07-17T12:41:46Z",
"stargazers_count": 1535,
"watchers_count": 1535,
"stargazers_count": 1536,
"watchers_count": 1536,
"has_discussions": false,
"forks_count": 311,
"allow_forking": true,
@ -46,7 +46,7 @@
],
"visibility": "public",
"forks": 311,
"watchers": 1535,
"watchers": 1536,
"score": 0
},
{

View file

@ -105,13 +105,13 @@
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"forks": 2,
"watchers": 2,
"score": 0
}

View file

@ -163,13 +163,13 @@
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 14,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"forks": 15,
"watchers": 31,
"score": 0
},

View file

@ -13,10 +13,10 @@
"description": "Exploit code for CVE-2021-1961",
"fork": false,
"created_at": "2022-09-03T13:31:13Z",
"updated_at": "2022-11-10T07:13:05Z",
"updated_at": "2022-11-14T06:09:32Z",
"pushed_at": "2022-09-07T11:47:56Z",
"stargazers_count": 76,
"watchers_count": 76,
"stargazers_count": 77,
"watchers_count": 77,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 76,
"watchers": 77,
"score": 0
}
]

View file

@ -42,10 +42,10 @@
"description": null,
"fork": false,
"created_at": "2021-05-21T03:13:58Z",
"updated_at": "2022-11-09T18:12:22Z",
"updated_at": "2022-11-14T03:33:07Z",
"pushed_at": "2021-05-21T03:24:25Z",
"stargazers_count": 12,
"watchers_count": 12,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
@ -54,7 +54,7 @@
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 12,
"watchers": 13,
"score": 0
},
{
@ -144,10 +144,10 @@
"description": "An extended proof-of-concept for the CVE-2021-21551 Dell dbutil_2_3.sys Kernel Exploit.",
"fork": false,
"created_at": "2021-06-02T05:13:07Z",
"updated_at": "2022-10-12T18:50:27Z",
"updated_at": "2022-11-14T02:58:26Z",
"pushed_at": "2021-07-20T03:03:30Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
@ -156,7 +156,7 @@
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 13,
"score": 0
},
{

View file

@ -148,10 +148,10 @@
"description": "Proof of Concept Exploit for vCenter CVE-2021-21972",
"fork": false,
"created_at": "2021-02-24T16:31:34Z",
"updated_at": "2022-11-10T05:26:40Z",
"updated_at": "2022-11-14T03:58:32Z",
"pushed_at": "2021-02-25T16:05:02Z",
"stargazers_count": 207,
"watchers_count": 207,
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
@ -160,7 +160,7 @@
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 207,
"watchers": 208,
"score": 0
},
{

View file

@ -198,10 +198,10 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T11:03:13Z",
"updated_at": "2022-09-01T03:24:15Z",
"updated_at": "2022-11-14T04:48:02Z",
"pushed_at": "2021-06-07T04:00:06Z",
"stargazers_count": 33,
"watchers_count": 33,
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
@ -210,7 +210,7 @@
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 33,
"watchers": 34,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "WordPress - Authenticated XXE (CVE-2021-29447)",
"fork": false,
"created_at": "2021-04-16T20:41:26Z",
"updated_at": "2022-11-12T14:06:01Z",
"updated_at": "2022-11-14T02:30:21Z",
"pushed_at": "2021-10-04T01:13:54Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -3652,7 +3652,7 @@
"fork": false,
"created_at": "2022-03-05T19:49:52Z",
"updated_at": "2022-10-10T00:27:13Z",
"pushed_at": "2022-03-06T20:42:40Z",
"pushed_at": "2022-11-14T01:51:36Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,

View file

@ -100,10 +100,10 @@
"description": "Second one for web vulnerability (FYP Project, for own use only)",
"fork": false,
"created_at": "2022-11-09T13:32:10Z",
"updated_at": "2022-11-12T11:37:10Z",
"updated_at": "2022-11-14T03:22:10Z",
"pushed_at": "2022-11-09T13:41:26Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -112,7 +112,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"watchers": 3,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-08-20T03:01:30Z",
"updated_at": "2022-11-13T16:08:52Z",
"updated_at": "2022-11-14T02:25:03Z",
"pushed_at": "2022-09-11T10:21:10Z",
"stargazers_count": 127,
"watchers_count": 127,
"stargazers_count": 128,
"watchers_count": 128,
"has_discussions": false,
"forks_count": 26,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 26,
"watchers": 127,
"watchers": 128,
"score": 0
}
]

View file

@ -101,7 +101,7 @@
"fork": false,
"created_at": "2022-03-03T13:13:02Z",
"updated_at": "2022-11-12T01:31:10Z",
"pushed_at": "2022-03-03T14:31:32Z",
"pushed_at": "2022-11-14T01:34:04Z",
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
@ -1208,7 +1208,7 @@
"description": "burp被动扫描插件目前只有CVE-2022-22947",
"fork": false,
"created_at": "2022-04-11T13:22:11Z",
"updated_at": "2022-04-11T11:26:57Z",
"updated_at": "2022-11-14T00:55:24Z",
"pushed_at": "2022-04-11T11:32:17Z",
"stargazers_count": 0,
"watchers_count": 0,

View file

@ -13,10 +13,10 @@
"description": "PoC for vulnerability in Honda's Remote Keyless System(CVE-2022-27254)",
"fork": false,
"created_at": "2022-03-23T15:03:09Z",
"updated_at": "2022-11-09T18:15:35Z",
"updated_at": "2022-11-14T02:29:39Z",
"pushed_at": "2022-03-26T05:52:15Z",
"stargazers_count": 398,
"watchers_count": 398,
"stargazers_count": 399,
"watchers_count": 399,
"has_discussions": false,
"forks_count": 57,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 57,
"watchers": 398,
"watchers": 399,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Exploit POC code for CVE-2022-31898, a command injection for GL-iNet routers with firmware below 3.215",
"fork": false,
"created_at": "2022-11-11T05:11:14Z",
"updated_at": "2022-11-13T20:32:28Z",
"updated_at": "2022-11-14T00:23:47Z",
"pushed_at": "2022-11-11T05:18:12Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"forks": 1,
"watchers": 4,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "One day based on https:\/\/googleprojectzero.blogspot.com\/2022\/10\/rc4-is-still-considered-harmful.html",
"fork": false,
"created_at": "2022-11-02T18:38:01Z",
"updated_at": "2022-11-13T15:08:28Z",
"updated_at": "2022-11-14T03:56:10Z",
"pushed_at": "2022-11-07T16:21:14Z",
"stargazers_count": 274,
"watchers_count": 274,
"stargazers_count": 275,
"watchers_count": 275,
"has_discussions": false,
"forks_count": 47,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 47,
"watchers": 274,
"watchers": 275,
"score": 0
},
{

View file

@ -158,10 +158,10 @@
"description": "CVE-2022-34918 netfilter nf_tables 本地提权 POC",
"fork": false,
"created_at": "2022-08-02T09:52:02Z",
"updated_at": "2022-10-31T07:52:53Z",
"updated_at": "2022-11-14T02:43:45Z",
"pushed_at": "2022-09-15T03:19:28Z",
"stargazers_count": 179,
"watchers_count": 179,
"stargazers_count": 180,
"watchers_count": 180,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
@ -170,7 +170,7 @@
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 179,
"watchers": 180,
"score": 0
},
{

View file

@ -198,10 +198,10 @@
"description": "Detects attempts at exploitation of CVE-2022-3602, a remote code execution vulnerability in OpenSSL v 3.0.0 through v.3.0.6 ",
"fork": false,
"created_at": "2022-11-03T03:19:52Z",
"updated_at": "2022-11-08T22:42:48Z",
"updated_at": "2022-11-14T06:06:26Z",
"pushed_at": "2022-11-08T22:59:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -210,7 +210,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,19 +13,19 @@
"description": "Lenovo Diagnostics Driver EoP - Arbitrary R\/W",
"fork": false,
"created_at": "2022-11-09T14:15:30Z",
"updated_at": "2022-11-13T10:25:20Z",
"updated_at": "2022-11-14T02:37:11Z",
"pushed_at": "2022-11-09T14:42:56Z",
"stargazers_count": 109,
"watchers_count": 109,
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 28,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 28,
"watchers": 109,
"forks": 29,
"watchers": 111,
"score": 0
}
]

View file

@ -282,10 +282,10 @@
"description": "CobaltStrike <= 4.7.1 RCE",
"fork": false,
"created_at": "2022-10-14T11:46:01Z",
"updated_at": "2022-11-10T11:00:53Z",
"updated_at": "2022-11-14T01:09:16Z",
"pushed_at": "2022-10-25T05:32:54Z",
"stargazers_count": 275,
"watchers_count": 275,
"stargazers_count": 276,
"watchers_count": 276,
"has_discussions": false,
"forks_count": 73,
"allow_forking": true,
@ -294,7 +294,7 @@
"topics": [],
"visibility": "public",
"forks": 73,
"watchers": 275,
"watchers": 276,
"score": 0
},
{

View file

@ -71,10 +71,10 @@
"description": "A Shodan hunter for CVE-2022-40140 ",
"fork": false,
"created_at": "2022-11-11T16:25:29Z",
"updated_at": "2022-11-11T16:27:19Z",
"updated_at": "2022-11-14T01:05:02Z",
"pushed_at": "2022-11-13T23:27:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
@ -83,7 +83,7 @@
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
}
]

View file

@ -13,19 +13,19 @@
"description": "Nmap scripts to detect exchange 0-day (CVE-2022-41082) vulnerability",
"fork": false,
"created_at": "2022-10-01T11:53:14Z",
"updated_at": "2022-11-13T23:59:57Z",
"updated_at": "2022-11-14T06:10:40Z",
"pushed_at": "2022-10-01T12:19:53Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 7,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 29,
"forks": 9,
"watchers": 37,
"score": 0
},
{

View file

@ -42,12 +42,12 @@
"description": "Zimbra <9.0.0.p27 RCE",
"fork": false,
"created_at": "2022-11-11T20:58:08Z",
"updated_at": "2022-11-13T20:27:13Z",
"updated_at": "2022-11-14T06:12:56Z",
"pushed_at": "2022-11-12T10:17:11Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 31,
"watchers_count": 31,
"has_discussions": false,
"forks_count": 1,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -60,8 +60,8 @@
"zimbra"
],
"visibility": "public",
"forks": 1,
"watchers": 10,
"forks": 6,
"watchers": 31,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": null,
"fork": false,
"created_at": "2022-10-23T15:58:18Z",
"updated_at": "2022-11-09T18:16:19Z",
"updated_at": "2022-11-14T01:14:35Z",
"pushed_at": "2022-10-24T10:13:34Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 30,
"watchers_count": 30,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
@ -25,7 +25,7 @@
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 29,
"watchers": 30,
"score": 0
}
]

View file

@ -141,12 +141,12 @@
"description": "Dockerized POC for CVE-2022-42889 Text4Shell",
"fork": false,
"created_at": "2022-10-18T09:58:00Z",
"updated_at": "2022-11-13T14:04:17Z",
"updated_at": "2022-11-14T04:56:21Z",
"pushed_at": "2022-10-18T10:00:27Z",
"stargazers_count": 65,
"watchers_count": 65,
"stargazers_count": 66,
"watchers_count": 66,
"has_discussions": false,
"forks_count": 21,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
@ -160,8 +160,8 @@
"text4shell"
],
"visibility": "public",
"forks": 21,
"watchers": 65,
"forks": 22,
"watchers": 66,
"score": 0
},
{