Auto Update 2020/07/14 18:09:04

This commit is contained in:
motikan2010-bot 2020-07-14 18:09:04 +09:00
parent bdd9ebc711
commit c69a12f0e5
33 changed files with 168 additions and 168 deletions

View file

@ -914,8 +914,8 @@
"pushed_at": "2017-10-30T22:46:11Z",
"stargazers_count": 84,
"watchers_count": 84,
"forks_count": 36,
"forks": 36,
"forks_count": 37,
"forks": 37,
"watchers": 84,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-06-09T08:05:34Z",
"updated_at": "2020-07-14T06:16:24Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"forks_count": 89,
"forks": 89,
"watchers": 280,
"watchers": 281,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
"fork": false,
"created_at": "2016-06-30T11:56:44Z",
"updated_at": "2020-06-09T08:05:34Z",
"updated_at": "2020-07-14T06:16:24Z",
"pushed_at": "2016-06-30T15:32:42Z",
"stargazers_count": 280,
"watchers_count": 280,
"stargazers_count": 281,
"watchers_count": 281,
"forks_count": 89,
"forks": 89,
"watchers": 280,
"watchers": 281,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Demo-ing CVE-2017-1000253 in a container",
"fork": false,
"created_at": "2017-11-01T07:37:35Z",
"updated_at": "2020-06-04T16:55:27Z",
"updated_at": "2020-07-14T03:09:01Z",
"pushed_at": "2017-11-01T07:59:24Z",
"stargazers_count": 17,
"watchers_count": 17,
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 5,
"forks": 5,
"watchers": 17,
"watchers": 18,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
"fork": false,
"created_at": "2017-09-14T10:04:39Z",
"updated_at": "2020-07-09T07:53:09Z",
"updated_at": "2020-07-14T03:51:29Z",
"pushed_at": "2018-09-10T16:25:12Z",
"stargazers_count": 305,
"watchers_count": 305,
"stargazers_count": 306,
"watchers_count": 306,
"forks_count": 124,
"forks": 124,
"watchers": 305,
"watchers": 306,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
"fork": false,
"created_at": "2018-08-14T18:51:50Z",
"updated_at": "2020-07-12T05:29:29Z",
"updated_at": "2020-07-14T06:23:18Z",
"pushed_at": "2018-09-27T07:32:19Z",
"stargazers_count": 192,
"watchers_count": 192,
"forks_count": 30,
"forks": 30,
"watchers": 192,
"stargazers_count": 193,
"watchers_count": 193,
"forks_count": 31,
"forks": 31,
"watchers": 193,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "CVE-2018-2628 & CVE-2018-2893",
"fork": false,
"created_at": "2018-04-18T05:41:23Z",
"updated_at": "2020-05-24T08:46:14Z",
"updated_at": "2020-07-14T04:32:22Z",
"pushed_at": "2018-07-20T01:24:36Z",
"stargazers_count": 69,
"watchers_count": 69,
"stargazers_count": 70,
"watchers_count": 70,
"forks_count": 47,
"forks": 47,
"watchers": 69,
"watchers": 70,
"score": 0
},
{

View file

@ -293,8 +293,8 @@
"pushed_at": "2019-05-05T15:49:44Z",
"stargazers_count": 73,
"watchers_count": 73,
"forks_count": 47,
"forks": 47,
"forks_count": 48,
"forks": 48,
"watchers": 73,
"score": 0
},

View file

@ -82,13 +82,13 @@
"description": "CVE-2018-8120 Exploit for Win2003 Win2008 WinXP Win7 ",
"fork": false,
"created_at": "2018-06-07T08:30:07Z",
"updated_at": "2020-06-14T13:39:11Z",
"updated_at": "2020-07-14T08:49:07Z",
"pushed_at": "2018-08-08T05:48:24Z",
"stargazers_count": 270,
"watchers_count": 270,
"stargazers_count": 271,
"watchers_count": 271,
"forks_count": 118,
"forks": 118,
"watchers": 270,
"watchers": 271,
"score": 0
},
{

View file

@ -59,13 +59,13 @@
"description": "Apache Solr远程代码执行漏洞(CVE-2019-0193) Exploit",
"fork": false,
"created_at": "2019-08-12T07:17:21Z",
"updated_at": "2020-07-13T01:49:10Z",
"updated_at": "2020-07-14T06:03:36Z",
"pushed_at": "2020-07-08T06:51:47Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 6,
"forks": 6,
"watchers": 24,
"watchers": 25,
"score": 0
},
{

View file

@ -36,13 +36,13 @@
"description": "Apache Tomcat Remote Code Execution on Windows - CGI-BIN",
"fork": false,
"created_at": "2019-04-16T14:32:03Z",
"updated_at": "2020-06-24T00:19:54Z",
"updated_at": "2020-07-14T04:28:05Z",
"pushed_at": "2019-04-17T02:42:03Z",
"stargazers_count": 54,
"watchers_count": 54,
"stargazers_count": 55,
"watchers_count": 55,
"forks_count": 23,
"forks": 23,
"watchers": 54,
"watchers": 55,
"score": 0
},
{

View file

@ -59,12 +59,12 @@
"description": "cve-2019-0604 SharePoint RCE exploit",
"fork": false,
"created_at": "2019-06-26T15:00:29Z",
"updated_at": "2020-07-12T15:21:28Z",
"updated_at": "2020-07-14T06:27:56Z",
"pushed_at": "2019-10-18T14:49:10Z",
"stargazers_count": 80,
"watchers_count": 80,
"forks_count": 56,
"forks": 56,
"forks_count": 57,
"forks": 57,
"watchers": 80,
"score": 0
},

View file

@ -726,13 +726,13 @@
"description": "Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5\/14\/19 patches.",
"fork": false,
"created_at": "2019-05-16T15:47:29Z",
"updated_at": "2020-04-22T07:48:42Z",
"updated_at": "2020-07-14T03:50:16Z",
"pushed_at": "2019-08-28T17:14:57Z",
"stargazers_count": 18,
"watchers_count": 18,
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"forks": 8,
"watchers": 18,
"watchers": 19,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
"fork": false,
"created_at": "2019-09-29T07:08:52Z",
"updated_at": "2020-07-13T15:28:49Z",
"updated_at": "2020-07-14T04:41:49Z",
"pushed_at": "2020-06-13T17:40:14Z",
"stargazers_count": 576,
"watchers_count": 576,
"stargazers_count": 577,
"watchers_count": 577,
"forks_count": 74,
"forks": 74,
"watchers": 576,
"watchers": 577,
"score": 0
}
]

View file

@ -36,13 +36,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-14T03:09:05Z",
"updated_at": "2020-07-14T09:08:17Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1241,
"watchers_count": 1241,
"forks_count": 313,
"forks": 313,
"watchers": 1241,
"stargazers_count": 1247,
"watchers_count": 1247,
"forks_count": 316,
"forks": 316,
"watchers": 1247,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "A login bypass(CVE-2019-18371) and a command injection vulnerability(CVE-2019-18370) in Xiaomi Router R3G up to version 2.28.23.",
"fork": false,
"created_at": "2019-08-30T16:32:13Z",
"updated_at": "2020-07-13T02:49:18Z",
"updated_at": "2020-07-14T04:37:00Z",
"pushed_at": "2020-01-12T02:34:45Z",
"stargazers_count": 125,
"watchers_count": 125,
"stargazers_count": 126,
"watchers_count": 126,
"forks_count": 23,
"forks": 23,
"watchers": 125,
"watchers": 126,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-12-17T03:54:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
}

View file

@ -82,8 +82,8 @@
"description": "Test a host for susceptibility to CVE-2019-19781",
"fork": false,
"created_at": "2020-01-11T00:26:16Z",
"updated_at": "2020-07-10T08:49:49Z",
"pushed_at": "2020-07-13T20:24:17Z",
"updated_at": "2020-07-14T03:26:32Z",
"pushed_at": "2020-07-14T03:26:30Z",
"stargazers_count": 98,
"watchers_count": 98,
"forks_count": 29,

View file

@ -37,7 +37,7 @@
"fork": false,
"created_at": "2020-02-15T16:55:44Z",
"updated_at": "2020-07-06T01:00:25Z",
"pushed_at": "2020-02-16T17:18:01Z",
"pushed_at": "2020-07-14T08:17:24Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 18,

View file

@ -36,13 +36,13 @@
"description": "PoC of StrandHogg2 (CVE-2020-0096)",
"fork": false,
"created_at": "2020-06-18T09:05:49Z",
"updated_at": "2020-07-07T05:02:06Z",
"updated_at": "2020-07-14T07:07:23Z",
"pushed_at": "2020-06-18T09:05:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 7,
"forks": 7,
"watchers": 4,
"score": 0
}
]

View file

@ -151,13 +151,13 @@
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
"updated_at": "2020-07-10T02:40:00Z",
"updated_at": "2020-07-14T04:36:29Z",
"pushed_at": "2020-03-22T15:14:31Z",
"stargazers_count": 322,
"watchers_count": 322,
"stargazers_count": 323,
"watchers_count": 323,
"forks_count": 84,
"forks": 84,
"watchers": 322,
"watchers": 323,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Scanning for Remote Desktop Gateways (Potentially unpatched CVE-2020-0609 and CVE-2020-0610)",
"fork": false,
"created_at": "2020-01-21T21:33:17Z",
"updated_at": "2020-07-12T03:30:20Z",
"updated_at": "2020-07-14T04:48:55Z",
"pushed_at": "2020-07-05T17:27:24Z",
"stargazers_count": 31,
"watchers_count": 31,
"stargazers_count": 32,
"watchers_count": 32,
"forks_count": 2,
"forks": 2,
"watchers": 31,
"watchers": 32,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2020-07-12T18:24:21Z",
"updated_at": "2020-07-14T08:41:22Z",
"pushed_at": "2020-06-18T00:42:57Z",
"stargazers_count": 365,
"watchers_count": 365,
"forks_count": 82,
"forks": 82,
"watchers": 365,
"stargazers_count": 367,
"watchers_count": 367,
"forks_count": 83,
"forks": 83,
"watchers": 367,
"score": 0
}
]

View file

@ -500,8 +500,8 @@
"pushed_at": "2020-03-13T10:46:44Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 4,
"forks": 4,
"forks_count": 5,
"forks": 5,
"watchers": 11,
"score": 0
},
@ -657,13 +657,13 @@
"description": "Advanced scanner for CVE-2020-0796 - SMBv3 RCE ",
"fork": false,
"created_at": "2020-03-14T02:07:16Z",
"updated_at": "2020-07-03T23:12:08Z",
"updated_at": "2020-07-14T08:08:08Z",
"pushed_at": "2020-07-03T23:12:06Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"forks": 2,
"watchers": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 3,
"forks": 3,
"watchers": 7,
"score": 0
},
{
@ -937,8 +937,8 @@
"pushed_at": "2020-04-08T19:27:07Z",
"stargazers_count": 972,
"watchers_count": 972,
"forks_count": 319,
"forks": 319,
"forks_count": 320,
"forks": 320,
"watchers": 972,
"score": 0
},
@ -1370,13 +1370,13 @@
"description": "批量测试CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-06-03T03:59:49Z",
"updated_at": "2020-06-10T07:42:41Z",
"updated_at": "2020-07-14T08:05:05Z",
"pushed_at": "2020-06-03T04:01:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
@ -1416,13 +1416,13 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2020-07-13T19:09:42Z",
"updated_at": "2020-07-14T08:10:17Z",
"pushed_at": "2020-07-08T08:26:24Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 22,
"forks": 22,
"watchers": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 23,
"forks": 23,
"watchers": 46,
"score": 0
},
{
@ -1485,13 +1485,13 @@
"description": "CVE-2020-0796. Smbghost Local Privilege Escalation",
"fork": false,
"created_at": "2020-07-11T20:00:34Z",
"updated_at": "2020-07-12T10:05:46Z",
"updated_at": "2020-07-14T03:49:08Z",
"pushed_at": "2020-07-12T09:59:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
}
]

View file

@ -109,8 +109,8 @@
"pushed_at": "2020-07-10T09:30:47Z",
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 21,
"forks": 21,
"forks_count": 22,
"forks": 22,
"watchers": 54,
"score": 0
},

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE",
"fork": false,
"created_at": "2020-04-22T06:42:50Z",
"updated_at": "2020-06-23T09:09:03Z",
"updated_at": "2020-07-14T04:35:23Z",
"pushed_at": "2020-04-22T10:29:16Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 8,
"forks": 8,
"watchers": 53,
"watchers": 54,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-1206 Uninitialized Kernel Memory Read POC",
"fork": false,
"created_at": "2020-04-05T15:52:43Z",
"updated_at": "2020-07-07T19:55:28Z",
"updated_at": "2020-07-14T06:24:56Z",
"pushed_at": "2020-06-09T20:41:32Z",
"stargazers_count": 112,
"watchers_count": 112,
"stargazers_count": 113,
"watchers_count": 113,
"forks_count": 34,
"forks": 34,
"watchers": 112,
"watchers": 113,
"score": 0
},
{

View file

@ -63,8 +63,8 @@
"pushed_at": "2020-07-02T10:03:47Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},

View file

@ -174,13 +174,13 @@
"description": "CVE-2020-2551 POC to use in Internet",
"fork": false,
"created_at": "2020-05-24T02:56:12Z",
"updated_at": "2020-07-07T06:26:51Z",
"updated_at": "2020-07-14T06:28:15Z",
"pushed_at": "2020-05-26T06:58:10Z",
"stargazers_count": 8,
"watchers_count": 8,
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 8,
"watchers": 9,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-5902、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2020-07-14T03:09:05Z",
"updated_at": "2020-07-14T09:08:17Z",
"pushed_at": "2020-07-08T10:09:00Z",
"stargazers_count": 1241,
"watchers_count": 1241,
"forks_count": 313,
"forks": 313,
"watchers": 1241,
"stargazers_count": 1247,
"watchers_count": 1247,
"forks_count": 316,
"forks": 316,
"watchers": 1247,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2020-07-13T21:06:30Z",
"updated_at": "2020-07-14T03:53:28Z",
"pushed_at": "2020-07-07T09:36:24Z",
"stargazers_count": 276,
"watchers_count": 276,
"forks_count": 80,
"forks": 80,
"watchers": 276,
"stargazers_count": 277,
"watchers_count": 277,
"forks_count": 81,
"forks": 81,
"watchers": 277,
"score": 0
},
{
@ -404,13 +404,13 @@
"description": "CVE-2020-5902",
"fork": false,
"created_at": "2020-07-06T08:36:54Z",
"updated_at": "2020-07-08T06:33:22Z",
"updated_at": "2020-07-14T05:57:10Z",
"pushed_at": "2020-07-08T06:33:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -983,8 +983,8 @@
"pushed_at": "2020-07-12T10:36:20Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 5,
"forks": 5,
"forks_count": 6,
"forks": 6,
"watchers": 15,
"score": 0
},
@ -1025,13 +1025,13 @@
"description": "CVE-2020-5902",
"fork": false,
"created_at": "2020-07-11T14:01:08Z",
"updated_at": "2020-07-11T14:12:20Z",
"updated_at": "2020-07-14T08:13:33Z",
"pushed_at": "2020-07-11T14:12:18Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free",
"fork": false,
"created_at": "2020-04-03T07:57:53Z",
"updated_at": "2020-07-09T09:42:05Z",
"updated_at": "2020-07-14T09:08:13Z",
"pushed_at": "2020-06-08T20:23:53Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 2,
"forks": 2,
"watchers": 9,
"watchers": 10,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "Citrix ADC Vulns",
"fork": false,
"created_at": "2020-07-10T20:00:17Z",
"updated_at": "2020-07-13T16:01:16Z",
"updated_at": "2020-07-14T07:58:34Z",
"pushed_at": "2020-07-10T21:03:20Z",
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 5,
"forks": 5,
"watchers": 50,
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 6,
"forks": 6,
"watchers": 51,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8597",
"fork": false,
"created_at": "2020-02-24T08:37:50Z",
"updated_at": "2020-07-14T01:55:19Z",
"updated_at": "2020-07-14T07:28:45Z",
"pushed_at": "2020-03-10T19:01:21Z",
"stargazers_count": 59,
"watchers_count": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 23,
"forks": 23,
"watchers": 59,
"watchers": 60,
"score": 0
},
{