Auto Update 2021/12/31 12:13:31

This commit is contained in:
motikan2010-bot 2021-12-31 21:13:31 +09:00
parent bcf2950005
commit c877e4103a
37 changed files with 221 additions and 221 deletions

View file

@ -17,14 +17,14 @@
"pushed_at": "2017-04-24T14:16:56Z",
"stargazers_count": 328,
"watchers_count": 328,
"forks_count": 101,
"forks_count": 102,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2008-0166"
],
"visibility": "public",
"forks": 101,
"forks": 102,
"watchers": 328,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container",
"fork": false,
"created_at": "2016-12-26T13:39:03Z",
"updated_at": "2021-12-02T05:30:19Z",
"updated_at": "2021-12-31T07:34:47Z",
"pushed_at": "2019-10-13T12:23:02Z",
"stargazers_count": 374,
"watchers_count": 374,
"stargazers_count": 375,
"watchers_count": 375,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
@ -32,7 +32,7 @@
],
"visibility": "public",
"forks": 146,
"watchers": 374,
"watchers": 375,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "一个针对shiro反序列化漏洞(CVE-2016-4437)的快速利用工具\/A simple tool targeted at shiro framework attacks with ysoserial.",
"fork": false,
"created_at": "2021-12-23T16:29:59Z",
"updated_at": "2021-12-30T10:57:38Z",
"pushed_at": "2021-12-30T10:57:35Z",
"stargazers_count": 5,
"watchers_count": 5,
"updated_at": "2021-12-31T11:07:33Z",
"pushed_at": "2021-12-31T09:41:26Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"watchers": 7,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": "CVE-2017-0005 POC",
"fork": false,
"created_at": "2019-11-05T04:18:08Z",
"updated_at": "2020-06-30T07:30:09Z",
"updated_at": "2021-12-31T06:23:54Z",
"pushed_at": "2019-11-05T04:21:48Z",
"stargazers_count": 1,
"watchers_count": 1,

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
},
{

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
},
{

View file

@ -2892,12 +2892,12 @@
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 246,
"watchers_count": 246,
"forks_count": 64,
"forks_count": 65,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 64,
"forks": 65,
"watchers": 246,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-30T23:37:43Z",
"updated_at": "2021-12-31T06:27:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3079,
"watchers_count": 3079,
"stargazers_count": 3080,
"watchers_count": 3080,
"forks_count": 914,
"allow_forking": true,
"is_template": false,
@ -70,7 +70,7 @@
],
"visibility": "public",
"forks": 914,
"watchers": 3079,
"watchers": 3080,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "WebLogic EJBTaglibDescriptor XXE漏洞(CVE-2019-2888)",
"fork": false,
"created_at": "2019-11-01T16:44:51Z",
"updated_at": "2021-12-15T14:37:35Z",
"updated_at": "2021-12-31T07:25:33Z",
"pushed_at": "2019-11-02T10:47:46Z",
"stargazers_count": 45,
"watchers_count": 45,
"stargazers_count": 46,
"watchers_count": 46,
"forks_count": 19,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 19,
"watchers": 45,
"watchers": 46,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-30T23:37:43Z",
"updated_at": "2021-12-31T06:27:22Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3079,
"watchers_count": 3079,
"stargazers_count": 3080,
"watchers_count": 3080,
"forks_count": 914,
"allow_forking": true,
"is_template": false,
@ -43,7 +43,7 @@
],
"visibility": "public",
"forks": 914,
"watchers": 3079,
"watchers": 3080,
"score": 0
},
{
@ -195,17 +195,17 @@
"description": "CVE-2020-14882 EXP 回显",
"fork": false,
"created_at": "2020-10-29T15:44:23Z",
"updated_at": "2021-08-16T11:31:38Z",
"updated_at": "2021-12-31T09:46:03Z",
"pushed_at": "2020-11-09T09:55:10Z",
"stargazers_count": 6,
"watchers_count": 6,
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"watchers": 7,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-15368, aka \"How to exploit a vulnerable driver\"",
"fork": false,
"created_at": "2021-06-29T04:38:24Z",
"updated_at": "2021-12-26T06:01:38Z",
"updated_at": "2021-12-31T06:26:41Z",
"pushed_at": "2021-10-29T07:46:53Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 308,
"watchers_count": 308,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 32,
"watchers": 307,
"watchers": 308,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-30T23:45:21Z",
"updated_at": "2021-12-31T08:33:26Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1254,
"watchers_count": 1254,
"stargazers_count": 1255,
"watchers_count": 1255,
"forks_count": 277,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 277,
"watchers": 1254,
"watchers": 1255,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-11-04T13:10:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"forks": 1,
"watchers": 0,
"score": 0
},

View file

@ -14,7 +14,7 @@
"fork": false,
"created_at": "2020-12-01T16:58:39Z",
"updated_at": "2021-12-16T10:30:25Z",
"pushed_at": "2021-12-17T16:32:36Z",
"pushed_at": "2021-12-31T12:02:38Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-03-30T05:31:22Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 13,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"forks": 14,
"watchers": 19,
"score": 0
}

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-12-30T19:47:15Z",
"updated_at": "2021-12-31T10:47:21Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1484,
"watchers_count": 1484,
"stargazers_count": 1486,
"watchers_count": 1486,
"forks_count": 544,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 544,
"watchers": 1484,
"watchers": 1486,
"score": 0
},
{

View file

@ -128,17 +128,17 @@
"description": "CVE-2021-21985 VMware vCenter Server远程代码执行漏洞 EXP (更新可回显EXP)",
"fork": false,
"created_at": "2021-06-03T09:59:21Z",
"updated_at": "2021-12-30T08:20:45Z",
"updated_at": "2021-12-31T09:46:12Z",
"pushed_at": "2021-06-09T10:13:56Z",
"stargazers_count": 307,
"watchers_count": 307,
"stargazers_count": 309,
"watchers_count": 309,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 67,
"watchers": 307,
"watchers": 309,
"score": 0
},
{

View file

@ -121,17 +121,17 @@
"description": "CVE-2021-22005 - VMWare vCenter Server File Upload to RCE",
"fork": false,
"created_at": "2021-09-25T16:21:56Z",
"updated_at": "2021-12-29T06:40:56Z",
"updated_at": "2021-12-31T08:01:25Z",
"pushed_at": "2021-10-02T03:17:45Z",
"stargazers_count": 194,
"watchers_count": 194,
"stargazers_count": 195,
"watchers_count": 195,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 194,
"watchers": 195,
"score": 0
},
{
@ -283,17 +283,17 @@
"description": null,
"fork": false,
"created_at": "2021-12-18T08:18:50Z",
"updated_at": "2021-12-31T02:20:11Z",
"updated_at": "2021-12-31T07:00:16Z",
"pushed_at": "2021-12-22T10:32:37Z",
"stargazers_count": 88,
"watchers_count": 88,
"stargazers_count": 89,
"watchers_count": 89,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 88,
"watchers": 89,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2021-06-05T15:42:16Z",
"updated_at": "2021-12-30T12:05:15Z",
"updated_at": "2021-12-31T06:17:55Z",
"pushed_at": "2021-11-02T14:45:24Z",
"stargazers_count": 172,
"watchers_count": 172,
"stargazers_count": 173,
"watchers_count": 173,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 172,
"watchers": 173,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-09-01T01:17:58Z",
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 29,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"forks": 30,
"watchers": 53,
"score": 0
},

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-29337 - Privilege Escalation in MODAPI.sys (MSI Dragon Center)",
"fork": false,
"created_at": "2021-06-21T01:59:58Z",
"updated_at": "2021-12-14T09:17:02Z",
"updated_at": "2021-12-31T07:01:06Z",
"pushed_at": "2021-10-12T12:03:20Z",
"stargazers_count": 24,
"watchers_count": 24,
"stargazers_count": 25,
"watchers_count": 25,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 24,
"watchers": 25,
"score": 0
}
]

View file

@ -452,17 +452,17 @@
"description": null,
"fork": false,
"created_at": "2021-01-30T20:39:58Z",
"updated_at": "2021-12-31T04:26:25Z",
"updated_at": "2021-12-31T11:26:16Z",
"pushed_at": "2021-02-02T17:07:09Z",
"stargazers_count": 788,
"watchers_count": 788,
"stargazers_count": 789,
"watchers_count": 789,
"forks_count": 230,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 230,
"watchers": 788,
"watchers": 789,
"score": 0
},
{

View file

@ -292,17 +292,17 @@
"description": "Polkit D-Bus Authentication Bypass Exploit",
"fork": false,
"created_at": "2021-07-30T11:41:34Z",
"updated_at": "2021-12-14T07:15:18Z",
"updated_at": "2021-12-31T09:55:14Z",
"pushed_at": "2021-07-30T11:43:32Z",
"stargazers_count": 10,
"watchers_count": 10,
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 10,
"watchers": 11,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-36260",
"fork": false,
"created_at": "2021-10-18T06:40:48Z",
"updated_at": "2021-11-29T05:01:58Z",
"updated_at": "2021-12-31T06:41:19Z",
"pushed_at": "2021-11-23T07:26:03Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -44,12 +44,12 @@
"pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 33,
"forks_count": 34,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 33,
"forks": 34,
"watchers": 76,
"score": 0
},

View file

@ -67,17 +67,17 @@
"description": "Proof on Concept Exploit for CVE-2021-38647 (OMIGOD)",
"fork": false,
"created_at": "2021-09-16T02:11:36Z",
"updated_at": "2021-12-24T15:15:51Z",
"updated_at": "2021-12-31T12:00:08Z",
"pushed_at": "2021-09-16T10:39:04Z",
"stargazers_count": 182,
"watchers_count": 182,
"stargazers_count": 184,
"watchers_count": 184,
"forks_count": 52,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 52,
"watchers": 182,
"watchers": 184,
"score": 0
},
{

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC",
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-12-31T03:19:18Z",
"updated_at": "2021-12-31T09:36:22Z",
"pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1333,
"watchers_count": 1333,
"forks_count": 437,
"stargazers_count": 1334,
"watchers_count": 1334,
"forks_count": 436,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 437,
"watchers": 1333,
"forks": 436,
"watchers": 1334,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-40449 - Win32k Elevation of Privilege Vulnerability (LPE)",
"fork": false,
"created_at": "2021-10-16T16:17:44Z",
"updated_at": "2021-12-31T00:28:43Z",
"updated_at": "2021-12-31T07:22:36Z",
"pushed_at": "2021-11-11T17:09:56Z",
"stargazers_count": 360,
"watchers_count": 360,
"stargazers_count": 361,
"watchers_count": 361,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 360,
"watchers": 361,
"score": 0
},
{

View file

@ -293,10 +293,10 @@
"description": "Apache 远程代码执行 CVE-2021-42013批量检测工具Apache HTTP Server是美国阿帕奇Apache基金会的一款开源网页服务器。该服务器具有快速、可靠且可通过简单的API进行扩充的特点发现 Apache HTTP Server 2.4.50 中针对 CVE-2021-41773 的修复不够充分。攻击者可以使用路径遍历攻击将 URL 映射到由类似别名的指令配置的目录之外的文件。如果这些目录之外的文件不受通常的默认配置“要求全部拒绝”的保护,则这些请求可能会成功。如果还为这些别名路径启用了 CGI 脚本,则这可能允许远程代码执行。此问题仅影响 Apache 2.4.49 和 Apache 2.4.50,而不影响更早版本。",
"fork": false,
"created_at": "2021-12-23T14:46:41Z",
"updated_at": "2021-12-26T12:41:42Z",
"updated_at": "2021-12-31T09:53:16Z",
"pushed_at": "2021-12-24T07:38:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
@ -309,7 +309,7 @@
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"watchers": 4,
"score": 0
}
]

View file

@ -13,11 +13,11 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2021-12-31T02:05:24Z",
"updated_at": "2021-12-31T09:08:40Z",
"pushed_at": "2021-12-21T10:11:05Z",
"stargazers_count": 670,
"watchers_count": 670,
"forks_count": 140,
"stargazers_count": 671,
"watchers_count": 671,
"forks_count": 141,
"allow_forking": true,
"is_template": false,
"topics": [
@ -27,8 +27,8 @@
"s4u2self"
],
"visibility": "public",
"forks": 140,
"watchers": 670,
"forks": 141,
"watchers": 671,
"score": 0
},
{
@ -45,17 +45,17 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2021-12-31T02:30:27Z",
"updated_at": "2021-12-31T09:04:43Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 174,
"watchers_count": 174,
"forks_count": 32,
"stargazers_count": 175,
"watchers_count": 175,
"forks_count": 33,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 174,
"forks": 33,
"watchers": 175,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false,
"created_at": "2021-12-11T19:27:30Z",
"updated_at": "2021-12-30T19:49:47Z",
"updated_at": "2021-12-31T09:03:00Z",
"pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 965,
"watchers_count": 965,
"forks_count": 253,
"stargazers_count": 966,
"watchers_count": 966,
"forks_count": 254,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 253,
"watchers": 965,
"forks": 254,
"watchers": 966,
"score": 0
}
]

View file

@ -13,10 +13,10 @@
"description": "Windows MSI Installer LPE (CVE-2021-43883)",
"fork": false,
"created_at": "2021-12-02T19:15:59Z",
"updated_at": "2021-12-24T22:39:05Z",
"updated_at": "2021-12-31T11:41:25Z",
"pushed_at": "2021-12-17T12:53:51Z",
"stargazers_count": 53,
"watchers_count": 53,
"stargazers_count": 54,
"watchers_count": 54,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
@ -29,7 +29,7 @@
],
"visibility": "public",
"forks": 10,
"watchers": 53,
"watchers": 54,
"score": 0
}
]

View file

@ -394,12 +394,12 @@
"pushed_at": "2021-12-27T10:27:42Z",
"stargazers_count": 854,
"watchers_count": 854,
"forks_count": 338,
"forks_count": 339,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 338,
"forks": 339,
"watchers": 854,
"score": 0
},
@ -858,11 +858,11 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false,
"created_at": "2021-12-10T22:35:00Z",
"updated_at": "2021-12-31T05:04:53Z",
"pushed_at": "2021-12-20T18:11:42Z",
"stargazers_count": 561,
"watchers_count": 561,
"forks_count": 84,
"updated_at": "2021-12-31T12:03:38Z",
"pushed_at": "2021-12-31T11:47:19Z",
"stargazers_count": 562,
"watchers_count": 562,
"forks_count": 85,
"allow_forking": true,
"is_template": false,
"topics": [
@ -887,8 +887,8 @@
"writeups"
],
"visibility": "public",
"forks": 84,
"watchers": 561,
"forks": 85,
"watchers": 562,
"score": 0
},
{
@ -1886,7 +1886,7 @@
"fork": false,
"created_at": "2021-12-12T00:29:03Z",
"updated_at": "2021-12-31T05:36:12Z",
"pushed_at": "2021-12-30T22:52:24Z",
"pushed_at": "2021-12-31T08:55:02Z",
"stargazers_count": 544,
"watchers_count": 544,
"forks_count": 88,
@ -2868,7 +2868,7 @@
"description": "Hot-patch CVE-2021-44228 by exploiting the vulnerability itself.",
"fork": false,
"created_at": "2021-12-12T15:30:55Z",
"updated_at": "2021-12-30T06:02:19Z",
"updated_at": "2021-12-31T12:04:46Z",
"pushed_at": "2021-12-18T10:46:45Z",
"stargazers_count": 25,
"watchers_count": 25,
@ -3538,17 +3538,17 @@
"description": "A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228 ",
"fork": false,
"created_at": "2021-12-13T03:57:50Z",
"updated_at": "2021-12-31T05:15:01Z",
"updated_at": "2021-12-31T09:32:43Z",
"pushed_at": "2021-12-30T13:20:50Z",
"stargazers_count": 2472,
"watchers_count": 2472,
"forks_count": 575,
"stargazers_count": 2474,
"watchers_count": 2474,
"forks_count": 576,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 575,
"watchers": 2472,
"forks": 576,
"watchers": 2474,
"score": 0
},
{
@ -3981,17 +3981,17 @@
"description": "Burp extension to scan Log4Shell (CVE-2021-44228) vulnerability pre and post auth.",
"fork": false,
"created_at": "2021-12-13T11:06:46Z",
"updated_at": "2021-12-31T03:17:01Z",
"updated_at": "2021-12-31T10:17:52Z",
"pushed_at": "2021-12-26T09:58:06Z",
"stargazers_count": 66,
"watchers_count": 66,
"stargazers_count": 67,
"watchers_count": 67,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 66,
"watchers": 67,
"score": 0
},
{
@ -4393,8 +4393,8 @@
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-13T16:39:16Z",
"updated_at": "2021-12-31T06:00:31Z",
"pushed_at": "2021-12-31T06:00:28Z",
"updated_at": "2021-12-31T12:00:33Z",
"pushed_at": "2021-12-31T12:00:30Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 10,
@ -4895,17 +4895,17 @@
"description": "PCRE RegEx matching Log4Shell CVE-2021-44228 IOC in your logs",
"fork": false,
"created_at": "2021-12-13T21:39:51Z",
"updated_at": "2021-12-30T12:05:42Z",
"updated_at": "2021-12-31T06:19:13Z",
"pushed_at": "2021-12-21T01:24:46Z",
"stargazers_count": 261,
"watchers_count": 261,
"stargazers_count": 262,
"watchers_count": 262,
"forks_count": 29,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 29,
"watchers": 261,
"watchers": 262,
"score": 0
},
{
@ -5832,10 +5832,10 @@
"description": "Tools for remediating the recent log4j2 RCE vulnerability (CVE-2021-44228)",
"fork": false,
"created_at": "2021-12-14T21:47:04Z",
"updated_at": "2021-12-31T03:18:17Z",
"updated_at": "2021-12-31T11:21:11Z",
"pushed_at": "2021-12-15T20:37:05Z",
"stargazers_count": 36,
"watchers_count": 36,
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
@ -5846,7 +5846,7 @@
],
"visibility": "public",
"forks": 3,
"watchers": 36,
"watchers": 37,
"score": 0
},
{
@ -5995,17 +5995,17 @@
"description": "Scanners for Jar files that may be vulnerable to CVE-2021-44228",
"fork": false,
"created_at": "2021-12-14T23:33:51Z",
"updated_at": "2021-12-30T19:38:07Z",
"updated_at": "2021-12-31T09:40:19Z",
"pushed_at": "2021-12-27T15:00:46Z",
"stargazers_count": 283,
"watchers_count": 283,
"forks_count": 70,
"stargazers_count": 284,
"watchers_count": 284,
"forks_count": 71,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 70,
"watchers": 283,
"forks": 71,
"watchers": 284,
"score": 0
},
{
@ -6715,17 +6715,17 @@
"description": "Small example repo for looking into log4j CVE-2021-44228",
"fork": false,
"created_at": "2021-12-15T19:59:38Z",
"updated_at": "2021-12-30T20:31:59Z",
"updated_at": "2021-12-31T07:14:31Z",
"pushed_at": "2021-12-24T15:44:53Z",
"stargazers_count": 44,
"watchers_count": 44,
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 44,
"watchers": 45,
"score": 0
},
{
@ -8430,17 +8430,17 @@
"description": "Exploiting CVE-2021-44228 in vCenter for remote code execution and more. ",
"fork": false,
"created_at": "2021-12-19T14:48:30Z",
"updated_at": "2021-12-30T18:56:05Z",
"updated_at": "2021-12-31T10:29:09Z",
"pushed_at": "2021-12-22T15:56:21Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 48,
"watchers": 50,
"score": 0
},
{
@ -9081,17 +9081,17 @@
"description": "A Smart Log4Shell\/Log4j\/CVE-2021-44228 Scanner",
"fork": false,
"created_at": "2021-12-22T08:35:04Z",
"updated_at": "2021-12-30T12:15:40Z",
"updated_at": "2021-12-31T09:22:33Z",
"pushed_at": "2021-12-22T08:40:58Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 11,
"watchers": 12,
"score": 0
},
{
@ -9108,17 +9108,17 @@
"description": "Generic Scanner for Apache log4j RCE CVE-2021-44228",
"fork": false,
"created_at": "2021-12-22T09:15:47Z",
"updated_at": "2021-12-28T16:59:16Z",
"updated_at": "2021-12-31T09:52:16Z",
"pushed_at": "2021-12-22T09:19:15Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"watchers": 2,
"score": 0
},
{
@ -9216,17 +9216,17 @@
"description": "Proof of Concept of apache log4j LDAP lookup vulnerability. CVE-2021-44228",
"fork": false,
"created_at": "2021-12-22T22:44:07Z",
"updated_at": "2021-12-22T22:51:15Z",
"updated_at": "2021-12-31T09:52:50Z",
"pushed_at": "2021-12-22T22:51:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"watchers": 1,
"score": 0
},
{
@ -9243,17 +9243,17 @@
"description": "open detection and scanning tool for discovering and fuzzing for Log4J RCE CVE-2021-44228 vulnerability",
"fork": false,
"created_at": "2021-12-23T01:59:03Z",
"updated_at": "2021-12-24T03:24:06Z",
"updated_at": "2021-12-31T09:53:03Z",
"pushed_at": "2021-12-23T07:40:13Z",
"stargazers_count": 3,
"watchers_count": 3,
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 3,
"watchers": 4,
"score": 0
},
{
@ -9411,17 +9411,17 @@
"description": "Exploiting CVE-2021-44228 in Unifi Network Application for remote code execution and more.",
"fork": false,
"created_at": "2021-12-24T13:18:49Z",
"updated_at": "2021-12-31T05:21:51Z",
"updated_at": "2021-12-31T07:52:51Z",
"pushed_at": "2021-12-29T12:56:57Z",
"stargazers_count": 15,
"watchers_count": 15,
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 15,
"watchers": 16,
"score": 0
},
{
@ -9627,8 +9627,8 @@
"description": "Log4Shell (Cve-2021-44228) Proof Of Concept",
"fork": false,
"created_at": "2021-12-27T16:45:58Z",
"updated_at": "2021-12-30T14:26:26Z",
"pushed_at": "2021-12-30T14:26:23Z",
"updated_at": "2021-12-31T12:05:13Z",
"pushed_at": "2021-12-31T12:05:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -13,17 +13,17 @@
"description": "Environment with vulnerable kernel for exploitation of CVE-2021-44733",
"fork": false,
"created_at": "2021-12-23T17:45:35Z",
"updated_at": "2021-12-30T21:19:47Z",
"updated_at": "2021-12-31T08:02:41Z",
"pushed_at": "2021-12-28T07:57:13Z",
"stargazers_count": 48,
"watchers_count": 48,
"stargazers_count": 50,
"watchers_count": 50,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 48,
"watchers": 50,
"score": 0
}
]

View file

@ -175,11 +175,11 @@
"description": null,
"fork": false,
"created_at": "2021-12-29T07:32:30Z",
"updated_at": "2021-12-31T06:04:17Z",
"pushed_at": "2021-12-29T07:36:39Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 9,
"updated_at": "2021-12-31T10:32:43Z",
"pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"topics": [
@ -187,8 +187,8 @@
"cve-2021-45232"
],
"visibility": "public",
"forks": 9,
"watchers": 26,
"forks": 11,
"watchers": 30,
"score": 0
}
]