Auto Update 2021/12/01 12:13:24

This commit is contained in:
motikan2010-bot 2021-12-01 21:13:24 +09:00
parent 25c86cf23a
commit dbc97380ef
45 changed files with 208 additions and 208 deletions

View file

@ -17,12 +17,12 @@
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2262,
"watchers_count": 2262,
"forks_count": 480,
"forks_count": 479,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 480,
"forks": 479,
"watchers": 2262,
"score": 0
},

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-01T02:15:53Z",
"updated_at": "2021-12-01T06:08:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1224,
"watchers_count": 1224,
"stargazers_count": 1225,
"watchers_count": 1225,
"forks_count": 273,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 273,
"watchers": 1224,
"watchers": 1225,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-01T02:15:53Z",
"updated_at": "2021-12-01T06:08:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1224,
"watchers_count": 1224,
"stargazers_count": 1225,
"watchers_count": 1225,
"forks_count": 273,
"allow_forking": true,
"is_template": false,
@ -44,7 +44,7 @@
],
"visibility": "public",
"forks": 273,
"watchers": 1224,
"watchers": 1225,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2021-02-03T16:03:40Z",
"stargazers_count": 883,
"watchers_count": 883,
"forks_count": 410,
"forks_count": 409,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 410,
"forks": 409,
"watchers": 883,
"score": 0
},
@ -212,17 +212,17 @@
"description": "PoC for Dirty COW (CVE-2016-5195)",
"fork": false,
"created_at": "2016-10-22T15:25:34Z",
"updated_at": "2021-11-30T11:44:43Z",
"updated_at": "2021-12-01T08:42:25Z",
"pushed_at": "2017-02-27T18:56:12Z",
"stargazers_count": 389,
"watchers_count": 389,
"forks_count": 137,
"stargazers_count": 390,
"watchers_count": 390,
"forks_count": 138,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 137,
"watchers": 389,
"forks": 138,
"watchers": 390,
"score": 0
},
{

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-01T02:15:53Z",
"updated_at": "2021-12-01T06:08:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1224,
"watchers_count": 1224,
"stargazers_count": 1225,
"watchers_count": 1225,
"forks_count": 273,
"allow_forking": true,
"is_template": false,
@ -71,7 +71,7 @@
],
"visibility": "public",
"forks": 273,
"watchers": 1224,
"watchers": 1225,
"score": 0
},
{

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-08-14T08:40:25Z",
"stargazers_count": 238,
"watchers_count": 238,
"forks_count": 84,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 84,
"forks": 83,
"watchers": 238,
"score": 0
},

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-08-13T15:06:28Z",
"stargazers_count": 139,
"watchers_count": 139,
"forks_count": 55,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 55,
"forks": 54,
"watchers": 139,
"score": 0
},

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-01T02:15:53Z",
"updated_at": "2021-12-01T06:08:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1224,
"watchers_count": 1224,
"stargazers_count": 1225,
"watchers_count": 1225,
"forks_count": 273,
"allow_forking": true,
"is_template": false,
@ -561,7 +561,7 @@
],
"visibility": "public",
"forks": 273,
"watchers": 1224,
"watchers": 1225,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": null,
"fork": false,
"created_at": "2018-07-26T19:31:45Z",
"updated_at": "2021-08-15T14:18:14Z",
"updated_at": "2021-12-01T07:52:13Z",
"pushed_at": "2021-08-15T14:18:12Z",
"stargazers_count": 11,
"watchers_count": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 11,
"watchers": 12,
"score": 0
},
{

View file

@ -117,14 +117,14 @@
{
"id": 353909908,
"name": "Nephael-Nintendo-CVE-2018-6242",
"full_name": "Apasys\/Nephael-Nintendo-CVE-2018-6242",
"full_name": "Haruster\/Nephael-Nintendo-CVE-2018-6242",
"owner": {
"login": "Apasys",
"login": "Haruster",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Apasys"
"html_url": "https:\/\/github.com\/Haruster"
},
"html_url": "https:\/\/github.com\/Apasys\/Nephael-Nintendo-CVE-2018-6242",
"html_url": "https:\/\/github.com\/Haruster\/Nephael-Nintendo-CVE-2018-6242",
"description": "Nintendo CVE 2018-6242",
"fork": false,
"created_at": "2021-04-02T05:00:05Z",

View file

@ -40,10 +40,10 @@
"description": "💀Proof-of-Concept for CVE-2018-7600 Drupal SA-CORE-2018-002",
"fork": false,
"created_at": "2018-03-30T14:23:18Z",
"updated_at": "2021-11-18T09:25:28Z",
"updated_at": "2021-12-01T06:36:05Z",
"pushed_at": "2019-03-29T11:25:57Z",
"stargazers_count": 336,
"watchers_count": 336,
"stargazers_count": 337,
"watchers_count": 337,
"forks_count": 114,
"allow_forking": true,
"is_template": false,
@ -57,7 +57,7 @@
],
"visibility": "public",
"forks": 114,
"watchers": 336,
"watchers": 337,
"score": 0
},
{

View file

@ -1219,17 +1219,17 @@
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2021-11-30T10:03:29Z",
"updated_at": "2021-12-01T08:40:31Z",
"pushed_at": "2020-12-06T04:48:38Z",
"stargazers_count": 1160,
"watchers_count": 1160,
"stargazers_count": 1161,
"watchers_count": 1161,
"forks_count": 410,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 410,
"watchers": 1160,
"watchers": 1161,
"score": 0
},
{
@ -3093,14 +3093,14 @@
{
"id": 345342341,
"name": "Nephael-CVE-2019-0708-Exploit",
"full_name": "Apasys\/Nephael-CVE-2019-0708-Exploit",
"full_name": "Haruster\/Nephael-CVE-2019-0708-Exploit",
"owner": {
"login": "Apasys",
"login": "Haruster",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Apasys"
"html_url": "https:\/\/github.com\/Haruster"
},
"html_url": "https:\/\/github.com\/Apasys\/Nephael-CVE-2019-0708-Exploit",
"html_url": "https:\/\/github.com\/Haruster\/Nephael-CVE-2019-0708-Exploit",
"description": "MS CVE 2019-0708 Python Exploit",
"fork": false,
"created_at": "2021-03-07T12:35:29Z",

View file

@ -17,12 +17,12 @@
"pushed_at": "2020-01-11T13:55:33Z",
"stargazers_count": 352,
"watchers_count": 352,
"forks_count": 144,
"forks_count": 143,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 144,
"forks": 143,
"watchers": 352,
"score": 0
},

View file

@ -17,14 +17,14 @@
"pushed_at": "2019-09-04T17:39:35Z",
"stargazers_count": 123,
"watchers_count": 123,
"forks_count": 38,
"forks_count": 37,
"allow_forking": true,
"is_template": false,
"topics": [
"vpn-appliance"
],
"visibility": "public",
"forks": 38,
"forks": 37,
"watchers": 123,
"score": 0
}

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-09-10T15:57:23Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 28,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 28,
"forks": 27,
"watchers": 63,
"score": 0
},

View file

@ -40,11 +40,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-01T01:26:11Z",
"updated_at": "2021-12-01T07:15:30Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3016,
"watchers_count": 3016,
"forks_count": 893,
"stargazers_count": 3017,
"watchers_count": 3017,
"forks_count": 894,
"allow_forking": true,
"is_template": false,
"topics": [
@ -69,8 +69,8 @@
"webshell"
],
"visibility": "public",
"forks": 893,
"watchers": 3016,
"forks": 894,
"watchers": 3017,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "Proof of Concept for CVE-2019-18634",
"fork": false,
"created_at": "2020-02-07T18:07:03Z",
"updated_at": "2021-11-30T20:46:41Z",
"updated_at": "2021-12-01T06:36:01Z",
"pushed_at": "2021-09-12T02:55:24Z",
"stargazers_count": 123,
"watchers_count": 123,
"stargazers_count": 124,
"watchers_count": 124,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 40,
"watchers": 123,
"watchers": 124,
"score": 0
},
{

View file

@ -71,12 +71,12 @@
"pushed_at": "2020-01-22T20:23:51Z",
"stargazers_count": 537,
"watchers_count": 537,
"forks_count": 131,
"forks_count": 130,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 131,
"forks": 130,
"watchers": 537,
"score": 0
},
@ -821,10 +821,10 @@
"description": "Citrix ADC (NetScaler) Honeypot. Supports detection for CVE-2019-19781 and login attempts",
"fork": false,
"created_at": "2020-01-22T13:00:18Z",
"updated_at": "2021-06-29T08:46:48Z",
"updated_at": "2021-12-01T08:07:25Z",
"pushed_at": "2020-01-23T09:10:06Z",
"stargazers_count": 19,
"watchers_count": 19,
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
@ -839,7 +839,7 @@
],
"visibility": "public",
"forks": 6,
"watchers": 19,
"watchers": 20,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "CVE-2019-2107",
"fork": false,
"created_at": "2019-07-08T14:18:33Z",
"updated_at": "2021-11-18T09:30:38Z",
"updated_at": "2021-12-01T07:55:03Z",
"pushed_at": "2020-11-02T06:43:15Z",
"stargazers_count": 311,
"watchers_count": 311,
"stargazers_count": 312,
"watchers_count": 312,
"forks_count": 96,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 96,
"watchers": 311,
"watchers": 312,
"score": 0
},
{

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false,
"created_at": "2020-01-15T04:26:29Z",
"updated_at": "2021-12-01T02:15:53Z",
"updated_at": "2021-12-01T06:08:40Z",
"pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1224,
"watchers_count": 1224,
"stargazers_count": 1225,
"watchers_count": 1225,
"forks_count": 273,
"allow_forking": true,
"is_template": false,
@ -206,7 +206,7 @@
],
"visibility": "public",
"forks": 273,
"watchers": 1224,
"watchers": 1225,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "PoC for CVE-2019-5736",
"fork": false,
"created_at": "2019-02-13T05:26:32Z",
"updated_at": "2021-11-30T17:13:20Z",
"updated_at": "2021-12-01T08:51:06Z",
"pushed_at": "2019-02-19T11:45:13Z",
"stargazers_count": 545,
"watchers_count": 545,
"stargazers_count": 546,
"watchers_count": 546,
"forks_count": 151,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 151,
"watchers": 545,
"watchers": 546,
"score": 0
},
{

View file

@ -218,14 +218,14 @@
{
"id": 345425457,
"name": "Apasys-CVE-2019-6340",
"full_name": "Apasys\/Apasys-CVE-2019-6340",
"full_name": "Haruster\/Apasys-CVE-2019-6340",
"owner": {
"login": "Apasys",
"login": "Haruster",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Apasys"
"html_url": "https:\/\/github.com\/Haruster"
},
"html_url": "https:\/\/github.com\/Apasys\/Apasys-CVE-2019-6340",
"html_url": "https:\/\/github.com\/Haruster\/Apasys-CVE-2019-6340",
"description": "Drupal RCE CVE Python Exploit",
"fork": false,
"created_at": "2021-03-07T18:44:49Z",

View file

@ -13,10 +13,10 @@
"description": "ES File Explorer Open Port Vulnerability - CVE-2019-6447",
"fork": false,
"created_at": "2019-01-09T22:30:42Z",
"updated_at": "2021-11-18T01:30:54Z",
"updated_at": "2021-12-01T08:57:22Z",
"pushed_at": "2021-09-01T08:56:40Z",
"stargazers_count": 639,
"watchers_count": 639,
"stargazers_count": 640,
"watchers_count": 640,
"forks_count": 139,
"allow_forking": true,
"is_template": false,
@ -28,7 +28,7 @@
],
"visibility": "public",
"forks": 139,
"watchers": 639,
"watchers": 640,
"score": 0
},
{

View file

@ -40,17 +40,17 @@
"description": "CVE-2020-0618 Honeypot",
"fork": false,
"created_at": "2020-02-18T16:17:19Z",
"updated_at": "2021-11-08T21:17:41Z",
"updated_at": "2021-12-01T08:07:39Z",
"pushed_at": "2020-03-03T17:21:54Z",
"stargazers_count": 25,
"watchers_count": 25,
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 25,
"watchers": 26,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Support ALL Windows Version",
"fork": false,
"created_at": "2020-06-16T08:57:51Z",
"updated_at": "2021-11-30T07:31:12Z",
"updated_at": "2021-12-01T08:59:30Z",
"pushed_at": "2020-09-11T07:38:22Z",
"stargazers_count": 586,
"watchers_count": 586,
"forks_count": 152,
"stargazers_count": 587,
"watchers_count": 587,
"forks_count": 153,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 152,
"watchers": 586,
"forks": 153,
"watchers": 587,
"score": 0
},
{

View file

@ -94,17 +94,17 @@
"description": "Powershell SMBv3 Compression checker",
"fork": false,
"created_at": "2020-03-11T09:13:48Z",
"updated_at": "2021-02-12T21:50:51Z",
"updated_at": "2021-12-01T10:41:50Z",
"pushed_at": "2020-04-14T11:38:39Z",
"stargazers_count": 29,
"watchers_count": 29,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 29,
"watchers": 28,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "Scanner for CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-03-11T15:21:27Z",
"updated_at": "2021-11-18T01:30:55Z",
"updated_at": "2021-12-01T08:55:33Z",
"pushed_at": "2020-10-01T08:36:29Z",
"stargazers_count": 601,
"watchers_count": 601,
"stargazers_count": 602,
"watchers_count": 602,
"forks_count": 198,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 198,
"watchers": 601,
"watchers": 602,
"score": 0
},
{
@ -1609,17 +1609,17 @@
"description": "SMBGhost (CVE-2020-0796) Automate Exploitation and Detection",
"fork": false,
"created_at": "2020-06-10T16:44:39Z",
"updated_at": "2021-11-28T04:09:18Z",
"updated_at": "2021-12-01T09:20:58Z",
"pushed_at": "2021-01-15T19:21:25Z",
"stargazers_count": 155,
"watchers_count": 155,
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 155,
"watchers": 156,
"score": 0
},
{
@ -1749,17 +1749,17 @@
"description": null,
"fork": false,
"created_at": "2020-09-17T01:48:37Z",
"updated_at": "2021-12-01T05:50:36Z",
"updated_at": "2021-12-01T06:24:01Z",
"pushed_at": "2020-09-17T01:55:48Z",
"stargazers_count": 57,
"watchers_count": 57,
"stargazers_count": 56,
"watchers_count": 56,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 18,
"watchers": 57,
"watchers": 56,
"score": 0
},
{
@ -1905,14 +1905,14 @@
{
"id": 345408388,
"name": "Apasys-CVE-2020-0796",
"full_name": "Apasys\/Apasys-CVE-2020-0796",
"full_name": "Haruster\/Apasys-CVE-2020-0796",
"owner": {
"login": "Apasys",
"login": "Haruster",
"id": 67867993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67867993?v=4",
"html_url": "https:\/\/github.com\/Apasys"
"html_url": "https:\/\/github.com\/Haruster"
},
"html_url": "https:\/\/github.com\/Apasys\/Apasys-CVE-2020-0796",
"html_url": "https:\/\/github.com\/Haruster\/Apasys-CVE-2020-0796",
"description": "MS CVE 2020-0796 SMB",
"fork": false,
"created_at": "2021-03-07T17:24:42Z",

View file

@ -13,11 +13,11 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false,
"created_at": "2020-04-01T09:33:35Z",
"updated_at": "2021-12-01T01:26:11Z",
"updated_at": "2021-12-01T07:15:30Z",
"pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3016,
"watchers_count": 3016,
"forks_count": 893,
"stargazers_count": 3017,
"watchers_count": 3017,
"forks_count": 894,
"allow_forking": true,
"is_template": false,
"topics": [
@ -42,8 +42,8 @@
"webshell"
],
"visibility": "public",
"forks": 893,
"watchers": 3016,
"forks": 894,
"watchers": 3017,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-12-01T01:05:50Z",
"updated_at": "2021-12-01T08:32:32Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 902,
"watchers_count": 902,
"stargazers_count": 903,
"watchers_count": 903,
"forks_count": 280,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 280,
"watchers": 902,
"watchers": 903,
"score": 0
}
]

View file

@ -73,17 +73,17 @@
"description": "CVE-2020-5902 BIG-IP",
"fork": false,
"created_at": "2020-07-05T16:38:32Z",
"updated_at": "2021-11-30T13:46:03Z",
"updated_at": "2021-12-01T09:36:47Z",
"pushed_at": "2021-10-13T07:53:46Z",
"stargazers_count": 357,
"watchers_count": 357,
"stargazers_count": 358,
"watchers_count": 358,
"forks_count": 109,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 109,
"watchers": 357,
"watchers": 358,
"score": 0
},
{

View file

@ -67,17 +67,17 @@
"description": "CVE-2020-8840FasterXML\/jackson-databind 远程代码执行漏洞",
"fork": false,
"created_at": "2020-02-24T07:43:12Z",
"updated_at": "2021-10-15T05:19:46Z",
"updated_at": "2021-12-01T08:05:23Z",
"pushed_at": "2020-02-24T07:45:37Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "CVE-2020-8950 AMD User Experience Program Launcher from Radeon Software Privilege Escalation ( FileWrite eop) ",
"fork": false,
"created_at": "2020-02-07T18:22:51Z",
"updated_at": "2021-07-20T20:51:24Z",
"updated_at": "2021-12-01T07:18:38Z",
"pushed_at": "2020-04-23T07:01:59Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 5,
"watchers": 27,
"watchers": 28,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
"updated_at": "2021-11-30T23:09:24Z",
"updated_at": "2021-12-01T06:16:05Z",
"pushed_at": "2021-07-20T15:28:13Z",
"stargazers_count": 1468,
"watchers_count": 1468,
"stargazers_count": 1469,
"watchers_count": 1469,
"forks_count": 540,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 540,
"watchers": 1468,
"watchers": 1469,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "PrintNightmare , Local Privilege Escalation of CVE-2021-1675 or CVE-2021-34527",
"fork": false,
"created_at": "2021-07-01T09:00:31Z",
"updated_at": "2021-11-23T15:57:37Z",
"updated_at": "2021-12-01T09:26:53Z",
"pushed_at": "2021-07-02T10:47:36Z",
"stargazers_count": 32,
"watchers_count": 32,
"stargazers_count": 33,
"watchers_count": 33,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
@ -140,7 +140,7 @@
],
"visibility": "public",
"forks": 17,
"watchers": 32,
"watchers": 33,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "ARM64 PoC for CVE-2021-21224",
"fork": false,
"created_at": "2021-11-28T01:10:54Z",
"updated_at": "2021-11-30T01:56:17Z",
"updated_at": "2021-12-01T08:25:40Z",
"pushed_at": "2021-11-28T01:12:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"watchers": 2,
"score": 0
}
]

View file

@ -121,10 +121,10 @@
"description": "CVE-2021-22205& GitLab CE\/EE RCE",
"fork": false,
"created_at": "2021-10-29T04:30:45Z",
"updated_at": "2021-12-01T06:11:36Z",
"updated_at": "2021-12-01T06:41:12Z",
"pushed_at": "2021-11-06T05:20:30Z",
"stargazers_count": 105,
"watchers_count": 105,
"stargazers_count": 106,
"watchers_count": 106,
"forks_count": 46,
"allow_forking": true,
"is_template": false,
@ -133,7 +133,7 @@
],
"visibility": "public",
"forks": 46,
"watchers": 105,
"watchers": 106,
"score": 0
},
{

View file

@ -121,10 +121,10 @@
"description": "Alibaba-Nacos-Unauthorized\/ApacheDruid-RCE_CVE-2021-25646\/MS-Exchange-SSRF-CVE-2021-26885\/Oracle-WebLogic-CVE-2021-2109_RCE\/RG-CNVD-2021-14536\/RJ-SSL-VPN-UltraVires\/Redis-Unauthorized-RCE\/TDOA-V11.7-GetOnlineCookie\/VMware-vCenter-GetAnyFile\/yongyou-GRP-U8-XXE\/Oracle-WebLogic-CVE-2020-14883\/Oracle-WebLogic-CVE-2020-14882\/Apache-Solr-GetAnyFile\/F5-BIG-IP-CVE-2021-22986\/Sonicwall-SSL-VPN-RCE\/GitLab-Graphql-CNVD-2021-14193\/D-Link-DCS-CVE-2020-25078\/WLAN-AP-WEA453e-RCE\/360TianQing-Unauthorized\/360TianQing-SQLinjection\/FanWeiOA-V8-SQLinjection\/QiZhiBaoLeiJi-AnyUserLogin\/QiAnXin-WangKangFirewall-RCE\/金山-V8-终端安全系统\/NCCloud-SQLinjection\/ShowDoc-RCE",
"fork": false,
"created_at": "2021-03-11T22:49:17Z",
"updated_at": "2021-12-01T01:05:50Z",
"updated_at": "2021-12-01T08:32:32Z",
"pushed_at": "2021-07-30T03:28:00Z",
"stargazers_count": 902,
"watchers_count": 902,
"stargazers_count": 903,
"watchers_count": 903,
"forks_count": 280,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 280,
"watchers": 902,
"watchers": 903,
"score": 0
},
{

View file

@ -823,17 +823,17 @@
"description": "[CVE-2021-26084] Confluence pre-auth RCE test script",
"fork": false,
"created_at": "2021-09-18T07:33:24Z",
"updated_at": "2021-10-10T05:15:34Z",
"updated_at": "2021-12-01T09:03:37Z",
"pushed_at": "2021-09-21T08:33:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"watchers": 3,
"score": 0
},
{

View file

@ -13,10 +13,10 @@
"description": "The report and the exploit of CVE-2021-26943, the kernel-to-SMM local privilege escalation vulnerability in ASUS UX360CA BIOS version 303.",
"fork": false,
"created_at": "2020-12-31T16:30:02Z",
"updated_at": "2021-11-08T00:19:00Z",
"updated_at": "2021-12-01T06:34:26Z",
"pushed_at": "2021-03-29T12:33:38Z",
"stargazers_count": 75,
"watchers_count": 75,
"stargazers_count": 76,
"watchers_count": 76,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
@ -27,7 +27,7 @@
],
"visibility": "public",
"forks": 18,
"watchers": 75,
"watchers": 76,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-30807",
"fork": false,
"created_at": "2021-10-09T20:11:42Z",
"updated_at": "2021-12-01T05:23:09Z",
"updated_at": "2021-12-01T11:32:53Z",
"pushed_at": "2021-11-29T13:50:42Z",
"stargazers_count": 81,
"watchers_count": 81,
"stargazers_count": 83,
"watchers_count": 83,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 81,
"watchers": 83,
"score": 0
},
{

View file

@ -13,17 +13,17 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-13T12:52:20Z",
"updated_at": "2021-11-30T01:44:15Z",
"updated_at": "2021-12-01T08:22:47Z",
"pushed_at": "2021-01-29T13:59:07Z",
"stargazers_count": 184,
"watchers_count": 184,
"stargazers_count": 185,
"watchers_count": 185,
"forks_count": 48,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 48,
"watchers": 184,
"watchers": 185,
"score": 0
},
{
@ -121,10 +121,10 @@
"description": "Exploit for CVE-2021-3129",
"fork": false,
"created_at": "2021-01-27T10:16:35Z",
"updated_at": "2021-11-30T01:44:17Z",
"updated_at": "2021-12-01T09:33:52Z",
"pushed_at": "2021-03-07T04:39:58Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
@ -135,7 +135,7 @@
],
"visibility": "public",
"forks": 11,
"watchers": 28,
"watchers": 29,
"score": 0
},
{

View file

@ -1023,17 +1023,17 @@
"description": "Sudo Baron Samedit Exploit",
"fork": false,
"created_at": "2021-03-15T17:37:02Z",
"updated_at": "2021-12-01T05:42:17Z",
"updated_at": "2021-12-01T08:27:09Z",
"pushed_at": "2021-11-04T23:56:50Z",
"stargazers_count": 406,
"watchers_count": 406,
"stargazers_count": 408,
"watchers_count": 408,
"forks_count": 100,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 100,
"watchers": 406,
"watchers": 408,
"score": 0
},
{

View file

@ -39,10 +39,10 @@
"html_url": "https:\/\/github.com\/JamVayne"
},
"html_url": "https:\/\/github.com\/JamVayne\/CobaltStrikeDos",
"description": "CVE-2021-36798 Exp: Cobalt Strike < 4.4 Dos",
"description": "CVE-2021-36798: CobaltStrike < 4.4 Dos",
"fork": false,
"created_at": "2021-09-06T11:49:03Z",
"updated_at": "2021-11-04T08:03:38Z",
"updated_at": "2021-12-01T10:49:30Z",
"pushed_at": "2021-09-26T10:02:37Z",
"stargazers_count": 100,
"watchers_count": 100,

View file

@ -13,17 +13,17 @@
"description": "Microsoft Exchange Server Poc",
"fork": false,
"created_at": "2021-11-23T02:26:26Z",
"updated_at": "2021-12-01T05:34:17Z",
"updated_at": "2021-12-01T08:25:24Z",
"pushed_at": "2021-11-23T02:33:47Z",
"stargazers_count": 42,
"watchers_count": 42,
"forks_count": 17,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 18,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 42,
"forks": 18,
"watchers": 43,
"score": 0
}
]

View file

@ -40,17 +40,17 @@
"description": "Local PoC exploit for CVE-2021-43267 (Linux TIPC)",
"fork": false,
"created_at": "2021-11-26T01:51:57Z",
"updated_at": "2021-11-29T11:08:27Z",
"updated_at": "2021-12-01T08:20:45Z",
"pushed_at": "2021-11-28T01:12:40Z",
"stargazers_count": 13,
"watchers_count": 13,
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"watchers": 14,
"score": 0
}
]

View file

@ -13,17 +13,17 @@
"description": "PoC for CVE-2021-43557",
"fork": false,
"created_at": "2021-11-22T20:23:05Z",
"updated_at": "2021-11-30T03:26:39Z",
"updated_at": "2021-12-01T09:19:12Z",
"pushed_at": "2021-11-22T20:24:32Z",
"stargazers_count": 16,
"watchers_count": 16,
"stargazers_count": 17,
"watchers_count": 17,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 16,
"watchers": 17,
"score": 0
}
]

View file

@ -3889,7 +3889,7 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [datntsec/CVE-2020-0796](https://github.com/datntsec/CVE-2020-0796)
- [MasterSploit/LPE---CVE-2020-0796](https://github.com/MasterSploit/LPE---CVE-2020-0796)
- [ORCA666/CVE-2020-0796](https://github.com/ORCA666/CVE-2020-0796)
- [Apasys/Apasys-CVE-2020-0796](https://github.com/Apasys/Apasys-CVE-2020-0796)
- [Haruster/Apasys-CVE-2020-0796](https://github.com/Haruster/Apasys-CVE-2020-0796)
- [1stPeak/CVE-2020-0796-Scanner](https://github.com/1stPeak/CVE-2020-0796-Scanner)
- [Anonimo501/SMBGhost_CVE-2020-0796_checker](https://github.com/Anonimo501/SMBGhost_CVE-2020-0796_checker)
- [Opensitoo/cve-2020-0796](https://github.com/Opensitoo/cve-2020-0796)
@ -8335,7 +8335,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit](https://github.com/DeathStroke-source/Mass-scanner-for-CVE-2019-0708-RDP-RCE-Exploit)
- [sinlee1/CVE-2019-0708](https://github.com/sinlee1/CVE-2019-0708)
- [go-bi/CVE-2019-0708-EXP-Windows](https://github.com/go-bi/CVE-2019-0708-EXP-Windows)
- [Apasys/Nephael-CVE-2019-0708-Exploit](https://github.com/Apasys/Nephael-CVE-2019-0708-Exploit)
- [Haruster/Nephael-CVE-2019-0708-Exploit](https://github.com/Haruster/Nephael-CVE-2019-0708-Exploit)
- [SurrealSky/CVE20190708SCAN](https://github.com/SurrealSky/CVE20190708SCAN)
- [ORCA666/CVE-2019--0708-SCANNER](https://github.com/ORCA666/CVE-2019--0708-SCANNER)
- [matiebarg/CVE-2019-0708](https://github.com/matiebarg/CVE-2019-0708)
@ -9273,7 +9273,7 @@ Some field types do not properly sanitize data from non-form sources in Drupal 8
- [d1vious/cve-2019-6340-bits](https://github.com/d1vious/cve-2019-6340-bits)
- [jas502n/CVE-2019-6340](https://github.com/jas502n/CVE-2019-6340)
- [ludy-dev/drupal8-REST-RCE](https://github.com/ludy-dev/drupal8-REST-RCE)
- [Apasys/Apasys-CVE-2019-6340](https://github.com/Apasys/Apasys-CVE-2019-6340)
- [Haruster/Apasys-CVE-2019-6340](https://github.com/Haruster/Apasys-CVE-2019-6340)
- [nobodyatall648/CVE-2019-6340](https://github.com/nobodyatall648/CVE-2019-6340)
### CVE-2019-6440 (2019-01-15)
@ -12855,7 +12855,7 @@ Some NVIDIA Tegra mobile processors released prior to 2016 contain a buffer over
- [reswitched/rcm-modchips](https://github.com/reswitched/rcm-modchips)
- [ChrisFigura/react-tegra-payload-launcher](https://github.com/ChrisFigura/react-tegra-payload-launcher)
- [austinhartzheim/fusee-gelee](https://github.com/austinhartzheim/fusee-gelee)
- [Apasys/Nephael-Nintendo-CVE-2018-6242](https://github.com/Apasys/Nephael-Nintendo-CVE-2018-6242)
- [Haruster/Nephael-Nintendo-CVE-2018-6242](https://github.com/Haruster/Nephael-Nintendo-CVE-2018-6242)
### CVE-2018-6376 (2018-01-30)