mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2019/12/14 00:54:13
This commit is contained in:
parent
5965dfd56e
commit
d053d64b2b
40 changed files with 259 additions and 211 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-01T06:07:48Z",
|
||||
"updated_at": "2019-12-12T16:51:18Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -197,13 +197,13 @@
|
|||
"description": "A CVE-2016-5195 exploit example.",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-23T00:16:33Z",
|
||||
"updated_at": "2019-12-11T11:46:19Z",
|
||||
"updated_at": "2019-12-13T02:56:59Z",
|
||||
"pushed_at": "2017-03-21T16:46:38Z",
|
||||
"stargazers_count": 157,
|
||||
"watchers_count": 157,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 157,
|
||||
"stargazers_count": 158,
|
||||
"watchers_count": 158,
|
||||
"forks_count": 85,
|
||||
"forks": 85,
|
||||
"watchers": 158,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -611,13 +611,13 @@
|
|||
"description": "编译好的脏牛漏洞(CVE-2016-5195)EXP",
|
||||
"fork": false,
|
||||
"created_at": "2018-05-27T08:06:50Z",
|
||||
"updated_at": "2019-12-04T11:35:37Z",
|
||||
"updated_at": "2019-12-13T15:04:45Z",
|
||||
"pushed_at": "2018-05-27T08:24:17Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"stargazers_count": 73,
|
||||
"watchers_count": 73,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 72,
|
||||
"watchers": 73,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2019-11-23T20:17:21Z",
|
||||
"updated_at": "2019-12-13T12:14:06Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"stargazers_count": 246,
|
||||
"watchers_count": 246,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"watchers": 245,
|
||||
"watchers": 246,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2019-12-12T15:46:02Z",
|
||||
"updated_at": "2019-12-13T08:08:53Z",
|
||||
"pushed_at": "2019-12-09T21:13:30Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -266,13 +266,13 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2019-12-10T04:59:14Z",
|
||||
"updated_at": "2019-12-12T17:07:38Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Jboss Java Deserialization RCE (CVE-2017-12149)",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-22T21:06:09Z",
|
||||
"updated_at": "2019-12-12T10:38:01Z",
|
||||
"updated_at": "2019-12-13T05:07:45Z",
|
||||
"pushed_at": "2019-08-22T21:08:14Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"stargazers_count": 5,
|
||||
"watchers_count": 5,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 4,
|
||||
"watchers": 5,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
|
||||
"fork": false,
|
||||
"created_at": "2017-10-05T23:41:52Z",
|
||||
"updated_at": "2019-12-04T15:30:11Z",
|
||||
"updated_at": "2019-12-12T16:48:53Z",
|
||||
"pushed_at": "2017-10-11T07:43:50Z",
|
||||
"stargazers_count": 330,
|
||||
"watchers_count": 330,
|
||||
"stargazers_count": 331,
|
||||
"watchers_count": 331,
|
||||
"forks_count": 129,
|
||||
"forks": 129,
|
||||
"watchers": 330,
|
||||
"watchers": 331,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-01T06:07:48Z",
|
||||
"updated_at": "2019-12-12T16:51:18Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-03-25T02:38:06Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"forks_count": 30,
|
||||
"forks": 30,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"watchers": 112,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC Exploit for CVE-2018-0802 (and optionally CVE-2017-11882)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-11T09:43:46Z",
|
||||
"updated_at": "2019-12-10T04:59:14Z",
|
||||
"updated_at": "2019-12-12T17:07:38Z",
|
||||
"pushed_at": "2018-02-28T12:32:54Z",
|
||||
"stargazers_count": 248,
|
||||
"watchers_count": 248,
|
||||
"stargazers_count": 249,
|
||||
"watchers_count": 249,
|
||||
"forks_count": 125,
|
||||
"forks": 125,
|
||||
"watchers": 248,
|
||||
"watchers": 249,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
25
2018/CVE-2018-13341.json
Normal file
25
2018/CVE-2018-13341.json
Normal file
|
@ -0,0 +1,25 @@
|
|||
[
|
||||
{
|
||||
"id": 227729620,
|
||||
"name": "crestron_getsudopwd",
|
||||
"full_name": "axcheron\/crestron_getsudopwd",
|
||||
"owner": {
|
||||
"login": "axcheron",
|
||||
"id": 5811920,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5811920?v=4",
|
||||
"html_url": "https:\/\/github.com\/axcheron"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/axcheron\/crestron_getsudopwd",
|
||||
"description": "Tool to exploit CVE-2018-13341 and recover hidden account password on Crestron devices",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-13T01:27:36Z",
|
||||
"updated_at": "2019-12-13T02:34:41Z",
|
||||
"pushed_at": "2019-12-13T01:36:08Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoC for CVE-2018-15133 (Laravel unserialize vulnerability)",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-14T18:51:50Z",
|
||||
"updated_at": "2019-12-05T15:54:44Z",
|
||||
"updated_at": "2019-12-12T17:08:40Z",
|
||||
"pushed_at": "2018-09-27T07:32:19Z",
|
||||
"stargazers_count": 174,
|
||||
"watchers_count": 174,
|
||||
"stargazers_count": 175,
|
||||
"watchers_count": 175,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 174,
|
||||
"watchers": 175,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-18T20:32:46Z",
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"forks_count": 15,
|
||||
"forks": 15,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": "Exploiting The CVE-2018-19788 PolicyKit Bug",
|
||||
"fork": false,
|
||||
"created_at": "2018-12-31T16:54:58Z",
|
||||
"updated_at": "2019-07-14T13:14:27Z",
|
||||
"updated_at": "2019-12-13T06:34:20Z",
|
||||
"pushed_at": "2018-12-31T17:12:03Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-01T06:07:48Z",
|
||||
"updated_at": "2019-12-12T16:51:18Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2018-2893",
|
||||
"fork": false,
|
||||
"created_at": "2018-07-19T05:46:55Z",
|
||||
"updated_at": "2019-12-03T03:52:24Z",
|
||||
"updated_at": "2019-12-12T17:04:35Z",
|
||||
"pushed_at": "2018-07-19T05:59:00Z",
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"stargazers_count": 62,
|
||||
"watchers_count": 62,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 61,
|
||||
"watchers": 62,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-08-17T23:31:46Z",
|
||||
"stargazers_count": 146,
|
||||
"watchers_count": 146,
|
||||
"forks_count": 29,
|
||||
"forks": 29,
|
||||
"forks_count": 28,
|
||||
"forks": 28,
|
||||
"watchers": 146,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2018-4878 样本",
|
||||
"fork": false,
|
||||
"created_at": "2018-02-22T02:38:30Z",
|
||||
"updated_at": "2019-12-10T07:33:11Z",
|
||||
"updated_at": "2019-12-13T01:54:00Z",
|
||||
"pushed_at": "2018-02-22T07:10:21Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2019-05-05T15:49:44Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-11T08:44:04Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2018-10-12T16:52:34Z",
|
||||
"stargazers_count": 8,
|
||||
"watchers_count": 8,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-04-08T08:26:26Z",
|
||||
"stargazers_count": 116,
|
||||
"watchers_count": 116,
|
||||
"forks_count": 45,
|
||||
"forks": 45,
|
||||
"forks_count": 44,
|
||||
"forks": 44,
|
||||
"watchers": 116,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-0604",
|
||||
"fork": false,
|
||||
"created_at": "2019-03-23T05:01:54Z",
|
||||
"updated_at": "2019-12-10T09:23:02Z",
|
||||
"updated_at": "2019-12-13T00:41:05Z",
|
||||
"pushed_at": "2019-03-22T05:45:44Z",
|
||||
"stargazers_count": 117,
|
||||
"watchers_count": 117,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"watchers": 117,
|
||||
"stargazers_count": 118,
|
||||
"watchers_count": 118,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 118,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "cve-2019-0604 SharePoint RCE exploit",
|
||||
"fork": false,
|
||||
"created_at": "2019-06-26T15:00:29Z",
|
||||
"updated_at": "2019-12-10T13:58:29Z",
|
||||
"updated_at": "2019-12-13T12:59:30Z",
|
||||
"pushed_at": "2019-10-18T14:49:10Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 33,
|
||||
"forks": 33,
|
||||
"watchers": 46,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "详解 k8gege的SharePoint RCE exploit cve-2019-0604-exp.py的代码,动手制作自己的payload",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-10T02:39:57Z",
|
||||
"updated_at": "2019-12-11T09:36:59Z",
|
||||
"updated_at": "2019-12-13T09:04:47Z",
|
||||
"pushed_at": "2019-12-11T09:33:31Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1121,8 +1121,8 @@
|
|||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1066,
|
||||
"watchers_count": 1066,
|
||||
"forks_count": 355,
|
||||
"forks": 355,
|
||||
"forks_count": 354,
|
||||
"forks": 354,
|
||||
"watchers": 1066,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1301,13 +1301,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2019-12-08T12:05:28Z",
|
||||
"updated_at": "2019-12-13T09:05:31Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 665,
|
||||
"watchers_count": 665,
|
||||
"forks_count": 153,
|
||||
"forks": 153,
|
||||
"watchers": 665,
|
||||
"stargazers_count": 666,
|
||||
"watchers_count": 666,
|
||||
"forks_count": 154,
|
||||
"forks": 154,
|
||||
"watchers": 666,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1899,13 +1899,13 @@
|
|||
"description": "Public work for CVE-2019-0708",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-23T03:15:53Z",
|
||||
"updated_at": "2019-12-10T08:03:29Z",
|
||||
"updated_at": "2019-12-13T15:10:21Z",
|
||||
"pushed_at": "2019-11-19T02:43:38Z",
|
||||
"stargazers_count": 243,
|
||||
"watchers_count": 243,
|
||||
"forks_count": 76,
|
||||
"forks": 76,
|
||||
"watchers": 243,
|
||||
"stargazers_count": 245,
|
||||
"watchers_count": 245,
|
||||
"forks_count": 77,
|
||||
"forks": 77,
|
||||
"watchers": 245,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2405,13 +2405,13 @@
|
|||
"description": "CVE-2019-0708 (BlueKeep)",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T10:13:11Z",
|
||||
"updated_at": "2019-12-11T04:55:43Z",
|
||||
"updated_at": "2019-12-12T21:13:18Z",
|
||||
"pushed_at": "2019-12-08T10:09:56Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002",
|
||||
"fork": false,
|
||||
"created_at": "2017-04-26T02:03:43Z",
|
||||
"updated_at": "2019-12-01T06:07:48Z",
|
||||
"updated_at": "2019-12-12T16:51:18Z",
|
||||
"pushed_at": "2019-05-16T05:58:52Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Exploit for CVE-2019-11043",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-23T21:37:27Z",
|
||||
"updated_at": "2019-12-12T12:33:05Z",
|
||||
"updated_at": "2019-12-13T11:21:38Z",
|
||||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1470,
|
||||
"watchers_count": 1470,
|
||||
"stargazers_count": 1471,
|
||||
"watchers_count": 1471,
|
||||
"forks_count": 204,
|
||||
"forks": 204,
|
||||
"watchers": 1470,
|
||||
"watchers": 1471,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "SSL VPN Rce",
|
||||
"fork": false,
|
||||
"created_at": "2019-08-27T09:21:10Z",
|
||||
"updated_at": "2019-12-09T22:56:37Z",
|
||||
"updated_at": "2019-12-13T11:12:15Z",
|
||||
"pushed_at": "2019-08-27T09:29:05Z",
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"stargazers_count": 47,
|
||||
"watchers_count": 47,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 46,
|
||||
"watchers": 47,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -178,8 +178,8 @@
|
|||
"pushed_at": "2019-10-20T19:17:44Z",
|
||||
"stargazers_count": 53,
|
||||
"watchers_count": 53,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"forks_count": 20,
|
||||
"forks": 20,
|
||||
"watchers": 53,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -197,13 +197,13 @@
|
|||
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-07T17:09:24Z",
|
||||
"updated_at": "2019-12-07T17:11:11Z",
|
||||
"updated_at": "2019-12-13T01:57:18Z",
|
||||
"pushed_at": "2019-12-07T17:09:58Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,8 +36,8 @@
|
|||
"description": "CVE-2019–11581 PoC",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-25T05:29:23Z",
|
||||
"updated_at": "2019-10-04T06:20:01Z",
|
||||
"pushed_at": "2019-07-26T19:22:52Z",
|
||||
"updated_at": "2019-12-13T13:03:41Z",
|
||||
"pushed_at": "2019-12-13T13:03:39Z",
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 4,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2019-12-12T16:24:39Z",
|
||||
"updated_at": "2019-12-13T13:13:08Z",
|
||||
"pushed_at": "2019-12-10T11:26:28Z",
|
||||
"stargazers_count": 484,
|
||||
"watchers_count": 484,
|
||||
"forks_count": 50,
|
||||
"forks": 50,
|
||||
"watchers": 484,
|
||||
"stargazers_count": 496,
|
||||
"watchers_count": 496,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 496,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T13:45:44Z",
|
||||
"updated_at": "2019-11-30T09:40:40Z",
|
||||
"updated_at": "2019-12-13T14:33:24Z",
|
||||
"pushed_at": "2019-10-09T07:38:53Z",
|
||||
"stargazers_count": 51,
|
||||
"watchers_count": 51,
|
||||
"stargazers_count": 52,
|
||||
"watchers_count": 52,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 51,
|
||||
"watchers": 52,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -59,13 +59,13 @@
|
|||
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
||||
"fork": false,
|
||||
"created_at": "2019-10-04T14:43:57Z",
|
||||
"updated_at": "2019-12-10T10:14:20Z",
|
||||
"updated_at": "2019-12-13T13:00:32Z",
|
||||
"pushed_at": "2019-11-30T10:28:01Z",
|
||||
"stargazers_count": 86,
|
||||
"watchers_count": 86,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 86,
|
||||
"stargazers_count": 87,
|
||||
"watchers_count": 87,
|
||||
"forks_count": 38,
|
||||
"forks": 38,
|
||||
"watchers": 87,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-1388 UAC提权 (nt authority\\system)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-21T06:26:27Z",
|
||||
"updated_at": "2019-12-09T02:27:24Z",
|
||||
"updated_at": "2019-12-13T11:25:52Z",
|
||||
"pushed_at": "2019-11-21T09:27:59Z",
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"stargazers_count": 40,
|
||||
"watchers_count": 40,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 37,
|
||||
"watchers": 40,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-11-27T03:13:56Z",
|
||||
"stargazers_count": 4,
|
||||
"watchers_count": 4,
|
||||
"forks_count": 2,
|
||||
"forks": 2,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 4,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-09-02T16:06:19Z",
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 11,
|
||||
"forks": 11,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-09T13:53:57Z",
|
||||
"updated_at": "2019-12-12T15:46:02Z",
|
||||
"updated_at": "2019-12-13T08:08:53Z",
|
||||
"pushed_at": "2019-12-09T21:13:30Z",
|
||||
"stargazers_count": 60,
|
||||
"watchers_count": 60,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"watchers": 60,
|
||||
"stargazers_count": 61,
|
||||
"watchers_count": 61,
|
||||
"forks_count": 21,
|
||||
"forks": 21,
|
||||
"watchers": 61,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2019-12-12T09:47:34Z",
|
||||
"pushed_at": "2019-12-12T09:39:09Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"updated_at": "2019-12-12T21:14:52Z",
|
||||
"pushed_at": "2019-12-12T21:14:50Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2019-06-24T06:06:48Z",
|
||||
"stargazers_count": 462,
|
||||
"watchers_count": 462,
|
||||
"forks_count": 94,
|
||||
"forks": 94,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 462,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-06T08:46:31Z",
|
||||
"updated_at": "2019-12-12T09:13:54Z",
|
||||
"updated_at": "2019-12-13T06:41:30Z",
|
||||
"pushed_at": "2019-12-06T09:18:56Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 64,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -105,13 +105,13 @@
|
|||
"description": "CVE-2019-2890 WebLogic 反序列化RCE漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-08T05:03:32Z",
|
||||
"updated_at": "2019-12-10T09:23:23Z",
|
||||
"updated_at": "2019-12-13T02:09:50Z",
|
||||
"pushed_at": "2019-12-08T05:50:42Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "Confluence Widget Connector path traversal (CVE-2019-3396)",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-09T06:20:51Z",
|
||||
"updated_at": "2019-08-30T08:10:01Z",
|
||||
"updated_at": "2019-12-13T12:20:19Z",
|
||||
"pushed_at": "2019-10-04T22:25:03Z",
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 20,
|
||||
"watchers": 21,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,8 +312,8 @@
|
|||
"description": "For test",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:40:22Z",
|
||||
"updated_at": "2019-12-12T09:13:56Z",
|
||||
"pushed_at": "2019-12-12T09:13:54Z",
|
||||
"updated_at": "2019-12-13T08:59:05Z",
|
||||
"pushed_at": "2019-12-13T08:59:03Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Unweaponized Proof of Concept for CVE-2019-5736 (Docker escape)",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-12T22:07:47Z",
|
||||
"updated_at": "2019-11-28T06:17:00Z",
|
||||
"updated_at": "2019-12-13T03:21:35Z",
|
||||
"pushed_at": "2019-02-20T15:35:34Z",
|
||||
"stargazers_count": 171,
|
||||
"watchers_count": 171,
|
||||
"stargazers_count": 172,
|
||||
"watchers_count": 172,
|
||||
"forks_count": 58,
|
||||
"forks": 58,
|
||||
"watchers": 171,
|
||||
"watchers": 172,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2019-12-07T01:56:54Z",
|
||||
"updated_at": "2019-12-13T06:40:09Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 364,
|
||||
"watchers_count": 364,
|
||||
"stargazers_count": 365,
|
||||
"watchers_count": 365,
|
||||
"forks_count": 84,
|
||||
"forks": 84,
|
||||
"watchers": 364,
|
||||
"watchers": 365,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -297,5 +297,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 227655174,
|
||||
"name": "Docker-Escape-Miner",
|
||||
"full_name": "epsteina16\/Docker-Escape-Miner",
|
||||
"owner": {
|
||||
"login": "epsteina16",
|
||||
"id": 14108788,
|
||||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14108788?v=4",
|
||||
"html_url": "https:\/\/github.com\/epsteina16"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/epsteina16\/Docker-Escape-Miner",
|
||||
"description": "Code sample for using exploit CVE-2019-5736 to mine bitcoin with no association to original container or user.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T16:57:13Z",
|
||||
"updated_at": "2019-12-12T16:58:20Z",
|
||||
"pushed_at": "2019-12-12T16:58:18Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -82,13 +82,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2019-12-01T14:29:22Z",
|
||||
"updated_at": "2019-12-12T13:16:26Z",
|
||||
"updated_at": "2019-12-13T11:17:59Z",
|
||||
"pushed_at": "2019-12-01T14:34:37Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 3,
|
||||
"forks": 3,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Synaptics Audio Driver LPE",
|
||||
"fork": false,
|
||||
"created_at": "2019-04-14T06:16:34Z",
|
||||
"updated_at": "2019-06-28T01:58:05Z",
|
||||
"updated_at": "2019-12-12T16:54:47Z",
|
||||
"pushed_at": "2019-04-15T11:17:39Z",
|
||||
"stargazers_count": 21,
|
||||
"watchers_count": 21,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 21,
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"forks_count": 9,
|
||||
"forks": 9,
|
||||
"watchers": 22,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-12-10T14:59:15Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"forks_count": 46,
|
||||
"forks": 46,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
}
|
||||
|
|
Loading…
Add table
Reference in a new issue