mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-28 18:44:10 +01:00
Auto Update 2021/12/01 12:13:24
This commit is contained in:
parent
25c86cf23a
commit
dbc97380ef
45 changed files with 208 additions and 208 deletions
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2021-02-24T09:17:24Z",
|
||||
"stargazers_count": 2262,
|
||||
"watchers_count": 2262,
|
||||
"forks_count": 480,
|
||||
"forks_count": 479,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 480,
|
||||
"forks": 479,
|
||||
"watchers": 2262,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-01T02:15:53Z",
|
||||
"updated_at": "2021-12-01T06:08:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"stargazers_count": 1225,
|
||||
"watchers_count": 1225,
|
||||
"forks_count": 273,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 273,
|
||||
"watchers": 1224,
|
||||
"watchers": 1225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-01T02:15:53Z",
|
||||
"updated_at": "2021-12-01T06:08:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"stargazers_count": 1225,
|
||||
"watchers_count": 1225,
|
||||
"forks_count": 273,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -44,7 +44,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 273,
|
||||
"watchers": 1224,
|
||||
"watchers": 1225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,12 +71,12 @@
|
|||
"pushed_at": "2021-02-03T16:03:40Z",
|
||||
"stargazers_count": 883,
|
||||
"watchers_count": 883,
|
||||
"forks_count": 410,
|
||||
"forks_count": 409,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 410,
|
||||
"forks": 409,
|
||||
"watchers": 883,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -212,17 +212,17 @@
|
|||
"description": "PoC for Dirty COW (CVE-2016-5195)",
|
||||
"fork": false,
|
||||
"created_at": "2016-10-22T15:25:34Z",
|
||||
"updated_at": "2021-11-30T11:44:43Z",
|
||||
"updated_at": "2021-12-01T08:42:25Z",
|
||||
"pushed_at": "2017-02-27T18:56:12Z",
|
||||
"stargazers_count": 389,
|
||||
"watchers_count": 389,
|
||||
"forks_count": 137,
|
||||
"stargazers_count": 390,
|
||||
"watchers_count": 390,
|
||||
"forks_count": 138,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 137,
|
||||
"watchers": 389,
|
||||
"forks": 138,
|
||||
"watchers": 390,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-01T02:15:53Z",
|
||||
"updated_at": "2021-12-01T06:08:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"stargazers_count": 1225,
|
||||
"watchers_count": 1225,
|
||||
"forks_count": 273,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -71,7 +71,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 273,
|
||||
"watchers": 1224,
|
||||
"watchers": 1225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-08-14T08:40:25Z",
|
||||
"stargazers_count": 238,
|
||||
"watchers_count": 238,
|
||||
"forks_count": 84,
|
||||
"forks_count": 83,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 84,
|
||||
"forks": 83,
|
||||
"watchers": 238,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-08-13T15:06:28Z",
|
||||
"stargazers_count": 139,
|
||||
"watchers_count": 139,
|
||||
"forks_count": 55,
|
||||
"forks_count": 54,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 55,
|
||||
"forks": 54,
|
||||
"watchers": 139,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -530,10 +530,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-01T02:15:53Z",
|
||||
"updated_at": "2021-12-01T06:08:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"stargazers_count": 1225,
|
||||
"watchers_count": 1225,
|
||||
"forks_count": 273,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -561,7 +561,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 273,
|
||||
"watchers": 1224,
|
||||
"watchers": 1225,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-26T19:31:45Z",
|
||||
"updated_at": "2021-08-15T14:18:14Z",
|
||||
"updated_at": "2021-12-01T07:52:13Z",
|
||||
"pushed_at": "2021-08-15T14:18:12Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"forks_count": 7,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 7,
|
||||
"watchers": 11,
|
||||
"watchers": 12,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -117,14 +117,14 @@
|
|||
{
|
||||
"id": 353909908,
|
||||
"name": "Nephael-Nintendo-CVE-2018-6242",
|
||||
"full_name": "Apasys\/Nephael-Nintendo-CVE-2018-6242",
|
||||
"full_name": "Haruster\/Nephael-Nintendo-CVE-2018-6242",
|
||||
"owner": {
|
||||
"login": "Apasys",
|
||||
"login": "Haruster",
|
||||
"id": 67867993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
|
||||
"html_url": "https:\/\/github.com\/Apasys"
|
||||
"html_url": "https:\/\/github.com\/Haruster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Apasys\/Nephael-Nintendo-CVE-2018-6242",
|
||||
"html_url": "https:\/\/github.com\/Haruster\/Nephael-Nintendo-CVE-2018-6242",
|
||||
"description": "Nintendo CVE 2018-6242",
|
||||
"fork": false,
|
||||
"created_at": "2021-04-02T05:00:05Z",
|
||||
|
|
|
@ -40,10 +40,10 @@
|
|||
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
|
||||
"fork": false,
|
||||
"created_at": "2018-03-30T14:23:18Z",
|
||||
"updated_at": "2021-11-18T09:25:28Z",
|
||||
"updated_at": "2021-12-01T06:36:05Z",
|
||||
"pushed_at": "2019-03-29T11:25:57Z",
|
||||
"stargazers_count": 336,
|
||||
"watchers_count": 336,
|
||||
"stargazers_count": 337,
|
||||
"watchers_count": 337,
|
||||
"forks_count": 114,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -57,7 +57,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 114,
|
||||
"watchers": 336,
|
||||
"watchers": 337,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1219,17 +1219,17 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2021-11-30T10:03:29Z",
|
||||
"updated_at": "2021-12-01T08:40:31Z",
|
||||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1160,
|
||||
"watchers_count": 1160,
|
||||
"stargazers_count": 1161,
|
||||
"watchers_count": 1161,
|
||||
"forks_count": 410,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 410,
|
||||
"watchers": 1160,
|
||||
"watchers": 1161,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -3093,14 +3093,14 @@
|
|||
{
|
||||
"id": 345342341,
|
||||
"name": "Nephael-CVE-2019-0708-Exploit",
|
||||
"full_name": "Apasys\/Nephael-CVE-2019-0708-Exploit",
|
||||
"full_name": "Haruster\/Nephael-CVE-2019-0708-Exploit",
|
||||
"owner": {
|
||||
"login": "Apasys",
|
||||
"login": "Haruster",
|
||||
"id": 67867993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
|
||||
"html_url": "https:\/\/github.com\/Apasys"
|
||||
"html_url": "https:\/\/github.com\/Haruster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Apasys\/Nephael-CVE-2019-0708-Exploit",
|
||||
"html_url": "https:\/\/github.com\/Haruster\/Nephael-CVE-2019-0708-Exploit",
|
||||
"description": "MS CVE 2019-0708 Python Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T12:35:29Z",
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2020-01-11T13:55:33Z",
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 144,
|
||||
"forks_count": 143,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 144,
|
||||
"forks": 143,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,14 +17,14 @@
|
|||
"pushed_at": "2019-09-04T17:39:35Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"forks_count": 38,
|
||||
"forks_count": 37,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
"vpn-appliance"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 38,
|
||||
"forks": 37,
|
||||
"watchers": 123,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -17,12 +17,12 @@
|
|||
"pushed_at": "2019-09-10T15:57:23Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"forks_count": 28,
|
||||
"forks_count": 27,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 28,
|
||||
"forks": 27,
|
||||
"watchers": 63,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -40,11 +40,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-01T01:26:11Z",
|
||||
"updated_at": "2021-12-01T07:15:30Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3016,
|
||||
"watchers_count": 3016,
|
||||
"forks_count": 893,
|
||||
"stargazers_count": 3017,
|
||||
"watchers_count": 3017,
|
||||
"forks_count": 894,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -69,8 +69,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 893,
|
||||
"watchers": 3016,
|
||||
"forks": 894,
|
||||
"watchers": 3017,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Proof of Concept for CVE-2019-18634",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:07:03Z",
|
||||
"updated_at": "2021-11-30T20:46:41Z",
|
||||
"updated_at": "2021-12-01T06:36:01Z",
|
||||
"pushed_at": "2021-09-12T02:55:24Z",
|
||||
"stargazers_count": 123,
|
||||
"watchers_count": 123,
|
||||
"stargazers_count": 124,
|
||||
"watchers_count": 124,
|
||||
"forks_count": 40,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 40,
|
||||
"watchers": 123,
|
||||
"watchers": 124,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -71,12 +71,12 @@
|
|||
"pushed_at": "2020-01-22T20:23:51Z",
|
||||
"stargazers_count": 537,
|
||||
"watchers_count": 537,
|
||||
"forks_count": 131,
|
||||
"forks_count": 130,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 131,
|
||||
"forks": 130,
|
||||
"watchers": 537,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -821,10 +821,10 @@
|
|||
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-22T13:00:18Z",
|
||||
"updated_at": "2021-06-29T08:46:48Z",
|
||||
"updated_at": "2021-12-01T08:07:25Z",
|
||||
"pushed_at": "2020-01-23T09:10:06Z",
|
||||
"stargazers_count": 19,
|
||||
"watchers_count": 19,
|
||||
"stargazers_count": 20,
|
||||
"watchers_count": 20,
|
||||
"forks_count": 6,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -839,7 +839,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 6,
|
||||
"watchers": 19,
|
||||
"watchers": 20,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "CVE-2019-2107",
|
||||
"fork": false,
|
||||
"created_at": "2019-07-08T14:18:33Z",
|
||||
"updated_at": "2021-11-18T09:30:38Z",
|
||||
"updated_at": "2021-12-01T07:55:03Z",
|
||||
"pushed_at": "2020-11-02T06:43:15Z",
|
||||
"stargazers_count": 311,
|
||||
"watchers_count": 311,
|
||||
"stargazers_count": 312,
|
||||
"watchers_count": 312,
|
||||
"forks_count": 96,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 96,
|
||||
"watchers": 311,
|
||||
"watchers": 312,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -175,10 +175,10 @@
|
|||
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T04:26:29Z",
|
||||
"updated_at": "2021-12-01T02:15:53Z",
|
||||
"updated_at": "2021-12-01T06:08:40Z",
|
||||
"pushed_at": "2020-11-27T15:10:58Z",
|
||||
"stargazers_count": 1224,
|
||||
"watchers_count": 1224,
|
||||
"stargazers_count": 1225,
|
||||
"watchers_count": 1225,
|
||||
"forks_count": 273,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -206,7 +206,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 273,
|
||||
"watchers": 1224,
|
||||
"watchers": 1225,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "PoC for CVE-2019-5736",
|
||||
"fork": false,
|
||||
"created_at": "2019-02-13T05:26:32Z",
|
||||
"updated_at": "2021-11-30T17:13:20Z",
|
||||
"updated_at": "2021-12-01T08:51:06Z",
|
||||
"pushed_at": "2019-02-19T11:45:13Z",
|
||||
"stargazers_count": 545,
|
||||
"watchers_count": 545,
|
||||
"stargazers_count": 546,
|
||||
"watchers_count": 546,
|
||||
"forks_count": 151,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 151,
|
||||
"watchers": 545,
|
||||
"watchers": 546,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -218,14 +218,14 @@
|
|||
{
|
||||
"id": 345425457,
|
||||
"name": "Apasys-CVE-2019-6340",
|
||||
"full_name": "Apasys\/Apasys-CVE-2019-6340",
|
||||
"full_name": "Haruster\/Apasys-CVE-2019-6340",
|
||||
"owner": {
|
||||
"login": "Apasys",
|
||||
"login": "Haruster",
|
||||
"id": 67867993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
|
||||
"html_url": "https:\/\/github.com\/Apasys"
|
||||
"html_url": "https:\/\/github.com\/Haruster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Apasys\/Apasys-CVE-2019-6340",
|
||||
"html_url": "https:\/\/github.com\/Haruster\/Apasys-CVE-2019-6340",
|
||||
"description": "Drupal RCE CVE Python Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T18:44:49Z",
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-09T22:30:42Z",
|
||||
"updated_at": "2021-11-18T01:30:54Z",
|
||||
"updated_at": "2021-12-01T08:57:22Z",
|
||||
"pushed_at": "2021-09-01T08:56:40Z",
|
||||
"stargazers_count": 639,
|
||||
"watchers_count": 639,
|
||||
"stargazers_count": 640,
|
||||
"watchers_count": 640,
|
||||
"forks_count": 139,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -28,7 +28,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 139,
|
||||
"watchers": 639,
|
||||
"watchers": 640,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,17 +40,17 @@
|
|||
"description": "CVE-2020-0618 Honeypot",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-18T16:17:19Z",
|
||||
"updated_at": "2021-11-08T21:17:41Z",
|
||||
"updated_at": "2021-12-01T08:07:39Z",
|
||||
"pushed_at": "2020-03-03T17:21:54Z",
|
||||
"stargazers_count": 25,
|
||||
"watchers_count": 25,
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 25,
|
||||
"watchers": 26,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Support ALL Windows Version",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-16T08:57:51Z",
|
||||
"updated_at": "2021-11-30T07:31:12Z",
|
||||
"updated_at": "2021-12-01T08:59:30Z",
|
||||
"pushed_at": "2020-09-11T07:38:22Z",
|
||||
"stargazers_count": 586,
|
||||
"watchers_count": 586,
|
||||
"forks_count": 152,
|
||||
"stargazers_count": 587,
|
||||
"watchers_count": 587,
|
||||
"forks_count": 153,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 152,
|
||||
"watchers": 586,
|
||||
"forks": 153,
|
||||
"watchers": 587,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -94,17 +94,17 @@
|
|||
"description": "Powershell SMBv3 Compression checker",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T09:13:48Z",
|
||||
"updated_at": "2021-02-12T21:50:51Z",
|
||||
"updated_at": "2021-12-01T10:41:50Z",
|
||||
"pushed_at": "2020-04-14T11:38:39Z",
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 13,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 13,
|
||||
"watchers": 29,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-03-11T15:21:27Z",
|
||||
"updated_at": "2021-11-18T01:30:55Z",
|
||||
"updated_at": "2021-12-01T08:55:33Z",
|
||||
"pushed_at": "2020-10-01T08:36:29Z",
|
||||
"stargazers_count": 601,
|
||||
"watchers_count": 601,
|
||||
"stargazers_count": 602,
|
||||
"watchers_count": 602,
|
||||
"forks_count": 198,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 198,
|
||||
"watchers": 601,
|
||||
"watchers": 602,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1609,17 +1609,17 @@
|
|||
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
|
||||
"fork": false,
|
||||
"created_at": "2020-06-10T16:44:39Z",
|
||||
"updated_at": "2021-11-28T04:09:18Z",
|
||||
"updated_at": "2021-12-01T09:20:58Z",
|
||||
"pushed_at": "2021-01-15T19:21:25Z",
|
||||
"stargazers_count": 155,
|
||||
"watchers_count": 155,
|
||||
"stargazers_count": 156,
|
||||
"watchers_count": 156,
|
||||
"forks_count": 42,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 42,
|
||||
"watchers": 155,
|
||||
"watchers": 156,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1749,17 +1749,17 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2020-09-17T01:48:37Z",
|
||||
"updated_at": "2021-12-01T05:50:36Z",
|
||||
"updated_at": "2021-12-01T06:24:01Z",
|
||||
"pushed_at": "2020-09-17T01:55:48Z",
|
||||
"stargazers_count": 57,
|
||||
"watchers_count": 57,
|
||||
"stargazers_count": 56,
|
||||
"watchers_count": 56,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 57,
|
||||
"watchers": 56,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1905,14 +1905,14 @@
|
|||
{
|
||||
"id": 345408388,
|
||||
"name": "Apasys-CVE-2020-0796",
|
||||
"full_name": "Apasys\/Apasys-CVE-2020-0796",
|
||||
"full_name": "Haruster\/Apasys-CVE-2020-0796",
|
||||
"owner": {
|
||||
"login": "Apasys",
|
||||
"login": "Haruster",
|
||||
"id": 67867993,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
|
||||
"html_url": "https:\/\/github.com\/Apasys"
|
||||
"html_url": "https:\/\/github.com\/Haruster"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/Apasys\/Apasys-CVE-2020-0796",
|
||||
"html_url": "https:\/\/github.com\/Haruster\/Apasys-CVE-2020-0796",
|
||||
"description": "MS CVE 2020-0796 SMB",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-07T17:24:42Z",
|
||||
|
|
|
@ -13,11 +13,11 @@
|
|||
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
|
||||
"fork": false,
|
||||
"created_at": "2020-04-01T09:33:35Z",
|
||||
"updated_at": "2021-12-01T01:26:11Z",
|
||||
"updated_at": "2021-12-01T07:15:30Z",
|
||||
"pushed_at": "2021-04-04T09:13:57Z",
|
||||
"stargazers_count": 3016,
|
||||
"watchers_count": 3016,
|
||||
"forks_count": 893,
|
||||
"stargazers_count": 3017,
|
||||
"watchers_count": 3017,
|
||||
"forks_count": 894,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [
|
||||
|
@ -42,8 +42,8 @@
|
|||
"webshell"
|
||||
],
|
||||
"visibility": "public",
|
||||
"forks": 893,
|
||||
"watchers": 3016,
|
||||
"forks": 894,
|
||||
"watchers": 3017,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-12-01T01:05:50Z",
|
||||
"updated_at": "2021-12-01T08:32:32Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 902,
|
||||
"watchers_count": 902,
|
||||
"stargazers_count": 903,
|
||||
"watchers_count": 903,
|
||||
"forks_count": 280,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 280,
|
||||
"watchers": 902,
|
||||
"watchers": 903,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -73,17 +73,17 @@
|
|||
"description": "CVE-2020-5902 BIG-IP",
|
||||
"fork": false,
|
||||
"created_at": "2020-07-05T16:38:32Z",
|
||||
"updated_at": "2021-11-30T13:46:03Z",
|
||||
"updated_at": "2021-12-01T09:36:47Z",
|
||||
"pushed_at": "2021-10-13T07:53:46Z",
|
||||
"stargazers_count": 357,
|
||||
"watchers_count": 357,
|
||||
"stargazers_count": 358,
|
||||
"watchers_count": 358,
|
||||
"forks_count": 109,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 109,
|
||||
"watchers": 357,
|
||||
"watchers": 358,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -67,17 +67,17 @@
|
|||
"description": "CVE-2020-8840:FasterXML\/jackson-databind 远程代码执行漏洞",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-24T07:43:12Z",
|
||||
"updated_at": "2021-10-15T05:19:46Z",
|
||||
"updated_at": "2021-12-01T08:05:23Z",
|
||||
"pushed_at": "2020-02-24T07:45:37Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 9,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 9,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-07T18:22:51Z",
|
||||
"updated_at": "2021-07-20T20:51:24Z",
|
||||
"updated_at": "2021-12-01T07:18:38Z",
|
||||
"pushed_at": "2020-04-23T07:01:59Z",
|
||||
"stargazers_count": 27,
|
||||
"watchers_count": 27,
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 27,
|
||||
"watchers": 28,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-11-30T23:09:24Z",
|
||||
"updated_at": "2021-12-01T06:16:05Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1468,
|
||||
"watchers_count": 1468,
|
||||
"stargazers_count": 1469,
|
||||
"watchers_count": 1469,
|
||||
"forks_count": 540,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 540,
|
||||
"watchers": 1468,
|
||||
"watchers": 1469,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-07-01T09:00:31Z",
|
||||
"updated_at": "2021-11-23T15:57:37Z",
|
||||
"updated_at": "2021-12-01T09:26:53Z",
|
||||
"pushed_at": "2021-07-02T10:47:36Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"stargazers_count": 33,
|
||||
"watchers_count": 33,
|
||||
"forks_count": 17,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -140,7 +140,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 32,
|
||||
"watchers": 33,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "ARM64 PoC for CVE-2021-21224",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-28T01:10:54Z",
|
||||
"updated_at": "2021-11-30T01:56:17Z",
|
||||
"updated_at": "2021-12-01T08:25:40Z",
|
||||
"pushed_at": "2021-11-28T01:12:20Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -121,10 +121,10 @@
|
|||
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-29T04:30:45Z",
|
||||
"updated_at": "2021-12-01T06:11:36Z",
|
||||
"updated_at": "2021-12-01T06:41:12Z",
|
||||
"pushed_at": "2021-11-06T05:20:30Z",
|
||||
"stargazers_count": 105,
|
||||
"watchers_count": 105,
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"forks_count": 46,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -133,7 +133,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 46,
|
||||
"watchers": 105,
|
||||
"watchers": 106,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -121,10 +121,10 @@
|
|||
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-11T22:49:17Z",
|
||||
"updated_at": "2021-12-01T01:05:50Z",
|
||||
"updated_at": "2021-12-01T08:32:32Z",
|
||||
"pushed_at": "2021-07-30T03:28:00Z",
|
||||
"stargazers_count": 902,
|
||||
"watchers_count": 902,
|
||||
"stargazers_count": 903,
|
||||
"watchers_count": 903,
|
||||
"forks_count": 280,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 280,
|
||||
"watchers": 902,
|
||||
"watchers": 903,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -823,17 +823,17 @@
|
|||
"description": "[CVE-2021-26084] Confluence pre-auth RCE test script",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-18T07:33:24Z",
|
||||
"updated_at": "2021-10-10T05:15:34Z",
|
||||
"updated_at": "2021-12-01T09:03:37Z",
|
||||
"pushed_at": "2021-09-21T08:33:29Z",
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"stargazers_count": 3,
|
||||
"watchers_count": 3,
|
||||
"forks_count": 1,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 1,
|
||||
"watchers": 2,
|
||||
"watchers": 3,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,10 +13,10 @@
|
|||
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
|
||||
"fork": false,
|
||||
"created_at": "2020-12-31T16:30:02Z",
|
||||
"updated_at": "2021-11-08T00:19:00Z",
|
||||
"updated_at": "2021-12-01T06:34:26Z",
|
||||
"pushed_at": "2021-03-29T12:33:38Z",
|
||||
"stargazers_count": 75,
|
||||
"watchers_count": 75,
|
||||
"stargazers_count": 76,
|
||||
"watchers_count": 76,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -27,7 +27,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 18,
|
||||
"watchers": 75,
|
||||
"watchers": 76,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-30807",
|
||||
"fork": false,
|
||||
"created_at": "2021-10-09T20:11:42Z",
|
||||
"updated_at": "2021-12-01T05:23:09Z",
|
||||
"updated_at": "2021-12-01T11:32:53Z",
|
||||
"pushed_at": "2021-11-29T13:50:42Z",
|
||||
"stargazers_count": 81,
|
||||
"watchers_count": 81,
|
||||
"stargazers_count": 83,
|
||||
"watchers_count": 83,
|
||||
"forks_count": 14,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 14,
|
||||
"watchers": 81,
|
||||
"watchers": 83,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-13T12:52:20Z",
|
||||
"updated_at": "2021-11-30T01:44:15Z",
|
||||
"updated_at": "2021-12-01T08:22:47Z",
|
||||
"pushed_at": "2021-01-29T13:59:07Z",
|
||||
"stargazers_count": 184,
|
||||
"watchers_count": 184,
|
||||
"stargazers_count": 185,
|
||||
"watchers_count": 185,
|
||||
"forks_count": 48,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 48,
|
||||
"watchers": 184,
|
||||
"watchers": 185,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -121,10 +121,10 @@
|
|||
"description": "Exploit for CVE-2021-3129",
|
||||
"fork": false,
|
||||
"created_at": "2021-01-27T10:16:35Z",
|
||||
"updated_at": "2021-11-30T01:44:17Z",
|
||||
"updated_at": "2021-12-01T09:33:52Z",
|
||||
"pushed_at": "2021-03-07T04:39:58Z",
|
||||
"stargazers_count": 28,
|
||||
"watchers_count": 28,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 11,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
|
@ -135,7 +135,7 @@
|
|||
],
|
||||
"visibility": "public",
|
||||
"forks": 11,
|
||||
"watchers": 28,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -1023,17 +1023,17 @@
|
|||
"description": "Sudo Baron Samedit Exploit",
|
||||
"fork": false,
|
||||
"created_at": "2021-03-15T17:37:02Z",
|
||||
"updated_at": "2021-12-01T05:42:17Z",
|
||||
"updated_at": "2021-12-01T08:27:09Z",
|
||||
"pushed_at": "2021-11-04T23:56:50Z",
|
||||
"stargazers_count": 406,
|
||||
"watchers_count": 406,
|
||||
"stargazers_count": 408,
|
||||
"watchers_count": 408,
|
||||
"forks_count": 100,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 100,
|
||||
"watchers": 406,
|
||||
"watchers": 408,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -39,10 +39,10 @@
|
|||
"html_url": "https:\/\/github.com\/JamVayne"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/JamVayne\/CobaltStrikeDos",
|
||||
"description": "CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos",
|
||||
"description": "CVE-2021-36798: CobaltStrike < 4.4 Dos",
|
||||
"fork": false,
|
||||
"created_at": "2021-09-06T11:49:03Z",
|
||||
"updated_at": "2021-11-04T08:03:38Z",
|
||||
"updated_at": "2021-12-01T10:49:30Z",
|
||||
"pushed_at": "2021-09-26T10:02:37Z",
|
||||
"stargazers_count": 100,
|
||||
"watchers_count": 100,
|
||||
|
|
|
@ -13,17 +13,17 @@
|
|||
"description": "Microsoft Exchange Server Poc",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-23T02:26:26Z",
|
||||
"updated_at": "2021-12-01T05:34:17Z",
|
||||
"updated_at": "2021-12-01T08:25:24Z",
|
||||
"pushed_at": "2021-11-23T02:33:47Z",
|
||||
"stargazers_count": 42,
|
||||
"watchers_count": 42,
|
||||
"forks_count": 17,
|
||||
"stargazers_count": 43,
|
||||
"watchers_count": 43,
|
||||
"forks_count": 18,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 17,
|
||||
"watchers": 42,
|
||||
"forks": 18,
|
||||
"watchers": 43,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -40,17 +40,17 @@
|
|||
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-26T01:51:57Z",
|
||||
"updated_at": "2021-11-29T11:08:27Z",
|
||||
"updated_at": "2021-12-01T08:20:45Z",
|
||||
"pushed_at": "2021-11-28T01:12:40Z",
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 5,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 5,
|
||||
"watchers": 13,
|
||||
"watchers": 14,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,17 +13,17 @@
|
|||
"description": "PoC for CVE-2021-43557",
|
||||
"fork": false,
|
||||
"created_at": "2021-11-22T20:23:05Z",
|
||||
"updated_at": "2021-11-30T03:26:39Z",
|
||||
"updated_at": "2021-12-01T09:19:12Z",
|
||||
"pushed_at": "2021-11-22T20:24:32Z",
|
||||
"stargazers_count": 16,
|
||||
"watchers_count": 16,
|
||||
"stargazers_count": 17,
|
||||
"watchers_count": 17,
|
||||
"forks_count": 2,
|
||||
"allow_forking": true,
|
||||
"is_template": false,
|
||||
"topics": [],
|
||||
"visibility": "public",
|
||||
"forks": 2,
|
||||
"watchers": 16,
|
||||
"watchers": 17,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -3889,7 +3889,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
|
|||
- [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796)
|
||||
- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796)
|
||||
- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796)
|
||||
- [Apasys/Apasys-CVE-2020-0796](https://github.com/Apasys/Apasys-CVE-2020-0796)
|
||||
- [Haruster/Apasys-CVE-2020-0796](https://github.com/Haruster/Apasys-CVE-2020-0796)
|
||||
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
|
||||
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
|
||||
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
|
||||
|
@ -8335,7 +8335,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
|
|||
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
|
||||
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
|
||||
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
|
||||
- [Apasys/Nephael-CVE-2019-0708-Exploit](https://github.com/Apasys/Nephael-CVE-2019-0708-Exploit)
|
||||
- [Haruster/Nephael-CVE-2019-0708-Exploit](https://github.com/Haruster/Nephael-CVE-2019-0708-Exploit)
|
||||
- [SurrealSky/CVE20190708SCAN](https://github.com/SurrealSky/CVE20190708SCAN)
|
||||
- [ORCA666/CVE-2019--0708-SCANNER](https://github.com/ORCA666/CVE-2019--0708-SCANNER)
|
||||
- [matiebarg/CVE-2019-0708](https://github.com/matiebarg/CVE-2019-0708)
|
||||
|
@ -9273,7 +9273,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
|
|||
- [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits)
|
||||
- [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340)
|
||||
- [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE)
|
||||
- [Apasys/Apasys-CVE-2019-6340](https://github.com/Apasys/Apasys-CVE-2019-6340)
|
||||
- [Haruster/Apasys-CVE-2019-6340](https://github.com/Haruster/Apasys-CVE-2019-6340)
|
||||
- [nobodyatall648/CVE-2019-6340](https://github.com/nobodyatall648/CVE-2019-6340)
|
||||
|
||||
### CVE-2019-6440 (2019-01-15)
|
||||
|
@ -12855,7 +12855,7 @@ Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer over
|
|||
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
|
||||
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
|
||||
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
|
||||
- [Apasys/Nephael-Nintendo-CVE-2018-6242](https://github.com/Apasys/Nephael-Nintendo-CVE-2018-6242)
|
||||
- [Haruster/Nephael-Nintendo-CVE-2018-6242](https://github.com/Haruster/Nephael-Nintendo-CVE-2018-6242)
|
||||
|
||||
### CVE-2018-6376 (2018-01-30)
|
||||
|
||||
|
|
Loading…
Add table
Reference in a new issue