mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2020/02/05 00:07:49
This commit is contained in:
parent
d3b81f643f
commit
df4c0f6ba5
19 changed files with 104 additions and 104 deletions
|
@ -13,13 +13,13 @@
|
|||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-07T23:03:09Z",
|
||||
"updated_at": "2020-01-23T12:11:20Z",
|
||||
"updated_at": "2020-02-04T14:00:00Z",
|
||||
"pushed_at": "2016-05-07T19:35:14Z",
|
||||
"stargazers_count": 2238,
|
||||
"watchers_count": 2238,
|
||||
"stargazers_count": 2239,
|
||||
"watchers_count": 2239,
|
||||
"forks_count": 481,
|
||||
"forks": 481,
|
||||
"watchers": 2238,
|
||||
"watchers": 2239,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-08T04:25:23Z",
|
||||
"updated_at": "2020-01-22T19:07:00Z",
|
||||
"updated_at": "2020-02-04T11:12:13Z",
|
||||
"pushed_at": "2014-05-27T22:32:26Z",
|
||||
"stargazers_count": 445,
|
||||
"watchers_count": 445,
|
||||
"stargazers_count": 446,
|
||||
"watchers_count": 446,
|
||||
"forks_count": 96,
|
||||
"forks": 96,
|
||||
"watchers": 445,
|
||||
"watchers": 446,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -289,13 +289,13 @@
|
|||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||||
"fork": false,
|
||||
"created_at": "2014-04-09T15:59:14Z",
|
||||
"updated_at": "2020-01-25T08:58:26Z",
|
||||
"updated_at": "2020-02-04T11:23:30Z",
|
||||
"pushed_at": "2014-07-10T21:17:22Z",
|
||||
"stargazers_count": 112,
|
||||
"watchers_count": 112,
|
||||
"stargazers_count": 113,
|
||||
"watchers_count": 113,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 112,
|
||||
"watchers": 113,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -887,13 +887,13 @@
|
|||
"description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
|
||||
"fork": false,
|
||||
"created_at": "2015-09-24T08:39:28Z",
|
||||
"updated_at": "2019-01-26T19:09:27Z",
|
||||
"updated_at": "2020-02-04T11:41:19Z",
|
||||
"pushed_at": "2015-09-24T16:15:11Z",
|
||||
"stargazers_count": 12,
|
||||
"watchers_count": 12,
|
||||
"stargazers_count": 13,
|
||||
"watchers_count": 13,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 12,
|
||||
"watchers": 13,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "This script is designed for detection of vulnerable servers (CVE-2014-0224.) in a wide range of configurations. It attempts to negotiate using each affected protocol version (SSLv3, TLSv1, TLSv1.1, and TLSv1.2) advertising a comprehensive set of ciphers.",
|
||||
"fork": false,
|
||||
"created_at": "2014-06-12T04:44:13Z",
|
||||
"updated_at": "2019-12-04T01:49:51Z",
|
||||
"updated_at": "2020-02-04T13:52:23Z",
|
||||
"pushed_at": "2014-07-24T20:47:27Z",
|
||||
"stargazers_count": 31,
|
||||
"watchers_count": 31,
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"watchers": 31,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)",
|
||||
"fork": false,
|
||||
"created_at": "2017-07-16T19:44:04Z",
|
||||
"updated_at": "2020-02-01T21:18:38Z",
|
||||
"updated_at": "2020-02-04T15:02:18Z",
|
||||
"pushed_at": "2019-07-23T19:24:01Z",
|
||||
"stargazers_count": 250,
|
||||
"watchers_count": 250,
|
||||
"stargazers_count": 251,
|
||||
"watchers_count": 251,
|
||||
"forks_count": 95,
|
||||
"forks": 95,
|
||||
"watchers": 250,
|
||||
"watchers": 251,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-10T04:23:41Z",
|
||||
"updated_at": "2019-12-06T03:02:52Z",
|
||||
"updated_at": "2020-02-04T14:22:39Z",
|
||||
"pushed_at": "2017-03-11T04:11:39Z",
|
||||
"stargazers_count": 36,
|
||||
"watchers_count": 36,
|
||||
"stargazers_count": 37,
|
||||
"watchers_count": 37,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 36,
|
||||
"watchers": 37,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -312,13 +312,13 @@
|
|||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||||
"fork": false,
|
||||
"created_at": "2017-03-12T02:02:25Z",
|
||||
"updated_at": "2020-01-29T13:55:03Z",
|
||||
"updated_at": "2020-02-04T11:06:52Z",
|
||||
"pushed_at": "2018-05-21T18:33:26Z",
|
||||
"stargazers_count": 354,
|
||||
"watchers_count": 354,
|
||||
"stargazers_count": 355,
|
||||
"watchers_count": 355,
|
||||
"forks_count": 124,
|
||||
"forks": 124,
|
||||
"watchers": 354,
|
||||
"watchers": 355,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-09-22T19:18:47Z",
|
||||
"updated_at": "2018-12-20T15:08:06Z",
|
||||
"updated_at": "2020-02-04T11:05:56Z",
|
||||
"pushed_at": "2018-09-22T21:17:51Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 14,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Base64-based encryption oracle exploit for CVE-2017-9248 (Telerik UI for ASP.NET AJAX dialog handler)",
|
||||
"fork": false,
|
||||
"created_at": "2018-01-16T00:23:34Z",
|
||||
"updated_at": "2020-01-20T17:28:44Z",
|
||||
"updated_at": "2020-02-04T14:54:46Z",
|
||||
"pushed_at": "2019-06-16T09:53:10Z",
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"forks_count": 19,
|
||||
"forks": 19,
|
||||
"watchers": 64,
|
||||
"watchers": 65,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -36,13 +36,13 @@
|
|||
"description": "A Burp extension to detect and exploit versions of Telerik Web UI vulnerable to CVE-2017-9248.",
|
||||
"fork": false,
|
||||
"created_at": "2018-08-03T04:36:23Z",
|
||||
"updated_at": "2020-01-29T22:40:58Z",
|
||||
"updated_at": "2020-02-04T11:37:41Z",
|
||||
"pushed_at": "2018-08-14T07:47:02Z",
|
||||
"stargazers_count": 63,
|
||||
"watchers_count": 63,
|
||||
"stargazers_count": 64,
|
||||
"watchers_count": 64,
|
||||
"forks_count": 16,
|
||||
"forks": 16,
|
||||
"watchers": 63,
|
||||
"watchers": 64,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "Script to identify hosts vulnerable to CVE-2018-10933",
|
||||
"fork": false,
|
||||
"created_at": "2018-10-17T23:05:10Z",
|
||||
"updated_at": "2020-01-11T19:40:31Z",
|
||||
"updated_at": "2020-02-04T11:33:55Z",
|
||||
"pushed_at": "2018-11-04T17:29:33Z",
|
||||
"stargazers_count": 228,
|
||||
"watchers_count": 228,
|
||||
"stargazers_count": 229,
|
||||
"watchers_count": 229,
|
||||
"forks_count": 51,
|
||||
"forks": 51,
|
||||
"watchers": 228,
|
||||
"watchers": 229,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -86,8 +86,8 @@
|
|||
"pushed_at": "2018-08-08T05:48:24Z",
|
||||
"stargazers_count": 259,
|
||||
"watchers_count": 259,
|
||||
"forks_count": 108,
|
||||
"forks": 108,
|
||||
"forks_count": 107,
|
||||
"forks": 107,
|
||||
"watchers": 259,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -59,13 +59,13 @@
|
|||
"description": "CVE-2018-8581",
|
||||
"fork": false,
|
||||
"created_at": "2019-01-24T06:08:23Z",
|
||||
"updated_at": "2020-01-09T16:11:24Z",
|
||||
"updated_at": "2020-02-04T13:04:29Z",
|
||||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 291,
|
||||
"watchers_count": 291,
|
||||
"stargazers_count": 292,
|
||||
"watchers_count": 292,
|
||||
"forks_count": 59,
|
||||
"forks": 59,
|
||||
"watchers": 291,
|
||||
"watchers": 292,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1075,8 +1075,8 @@
|
|||
"pushed_at": "2019-06-01T05:15:11Z",
|
||||
"stargazers_count": 451,
|
||||
"watchers_count": 451,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"forks_count": 183,
|
||||
"forks": 183,
|
||||
"watchers": 451,
|
||||
"score": 0
|
||||
},
|
||||
|
@ -1163,13 +1163,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2020-01-29T00:36:01Z",
|
||||
"updated_at": "2020-02-04T15:01:11Z",
|
||||
"pushed_at": "2019-10-01T12:23:59Z",
|
||||
"stargazers_count": 1079,
|
||||
"watchers_count": 1079,
|
||||
"stargazers_count": 1080,
|
||||
"watchers_count": 1080,
|
||||
"forks_count": 359,
|
||||
"forks": 359,
|
||||
"watchers": 1079,
|
||||
"watchers": 1080,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -1370,13 +1370,13 @@
|
|||
"description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-23T22:50:12Z",
|
||||
"updated_at": "2020-01-31T11:18:46Z",
|
||||
"updated_at": "2020-02-04T13:50:59Z",
|
||||
"pushed_at": "2019-06-22T21:48:45Z",
|
||||
"stargazers_count": 691,
|
||||
"watchers_count": 691,
|
||||
"stargazers_count": 692,
|
||||
"watchers_count": 692,
|
||||
"forks_count": 160,
|
||||
"forks": 160,
|
||||
"watchers": 691,
|
||||
"watchers": 692,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2405,13 +2405,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2020-02-03T13:07:48Z",
|
||||
"updated_at": "2020-02-04T10:49:26Z",
|
||||
"pushed_at": "2019-10-16T01:04:12Z",
|
||||
"stargazers_count": 137,
|
||||
"watchers_count": 137,
|
||||
"stargazers_count": 138,
|
||||
"watchers_count": 138,
|
||||
"forks_count": 47,
|
||||
"forks": 47,
|
||||
"watchers": 137,
|
||||
"watchers": 138,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -40,8 +40,8 @@
|
|||
"pushed_at": "2019-04-01T13:19:49Z",
|
||||
"stargazers_count": 240,
|
||||
"watchers_count": 240,
|
||||
"forks_count": 66,
|
||||
"forks": 66,
|
||||
"forks_count": 67,
|
||||
"forks": 67,
|
||||
"watchers": 240,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2019-11-12T18:53:14Z",
|
||||
"stargazers_count": 1528,
|
||||
"watchers_count": 1528,
|
||||
"forks_count": 209,
|
||||
"forks": 209,
|
||||
"forks_count": 210,
|
||||
"forks": 210,
|
||||
"watchers": 1528,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Full exploit chain (CVE-2019-11708 & CVE-2019-9810) against Firefox on Windows 64-bit.",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-29T07:08:52Z",
|
||||
"updated_at": "2020-02-02T15:44:08Z",
|
||||
"updated_at": "2020-02-04T10:13:44Z",
|
||||
"pushed_at": "2019-12-28T18:23:58Z",
|
||||
"stargazers_count": 547,
|
||||
"watchers_count": 547,
|
||||
"stargazers_count": 548,
|
||||
"watchers_count": 548,
|
||||
"forks_count": 65,
|
||||
"forks": 65,
|
||||
"watchers": 547,
|
||||
"watchers": 548,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -59,13 +59,13 @@
|
|||
"description": "guest→system(UAC手动提权)",
|
||||
"fork": false,
|
||||
"created_at": "2019-11-27T02:47:37Z",
|
||||
"updated_at": "2020-02-04T06:16:20Z",
|
||||
"updated_at": "2020-02-04T11:22:51Z",
|
||||
"pushed_at": "2019-11-27T03:13:56Z",
|
||||
"stargazers_count": 22,
|
||||
"watchers_count": 22,
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 22,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "RCE exploit for a .NET deserialization vulnerability in Telerik UI for ASP.NET AJAX.",
|
||||
"fork": false,
|
||||
"created_at": "2019-12-12T07:58:11Z",
|
||||
"updated_at": "2020-02-03T19:44:22Z",
|
||||
"updated_at": "2020-02-04T11:24:30Z",
|
||||
"pushed_at": "2019-12-18T15:32:15Z",
|
||||
"stargazers_count": 106,
|
||||
"watchers_count": 106,
|
||||
"stargazers_count": 107,
|
||||
"watchers_count": 107,
|
||||
"forks_count": 18,
|
||||
"forks": 18,
|
||||
"watchers": 106,
|
||||
"watchers": 107,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -726,13 +726,13 @@
|
|||
"description": "Indicator of Compromise Scanner for CVE-2019-19781",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-21T15:20:25Z",
|
||||
"updated_at": "2020-02-04T00:26:12Z",
|
||||
"updated_at": "2020-02-04T12:55:32Z",
|
||||
"pushed_at": "2020-01-30T21:37:02Z",
|
||||
"stargazers_count": 45,
|
||||
"watchers_count": 45,
|
||||
"stargazers_count": 46,
|
||||
"watchers_count": 46,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 45,
|
||||
"watchers": 46,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "CVE-2019-8449 Exploit for Jira v2.1 - v8.3.4",
|
||||
"fork": false,
|
||||
"created_at": "2020-02-02T16:42:32Z",
|
||||
"updated_at": "2020-02-04T05:00:28Z",
|
||||
"updated_at": "2020-02-04T12:32:00Z",
|
||||
"pushed_at": "2020-02-03T15:11:25Z",
|
||||
"stargazers_count": 26,
|
||||
"watchers_count": 26,
|
||||
"stargazers_count": 29,
|
||||
"watchers_count": 29,
|
||||
"forks_count": 4,
|
||||
"forks": 4,
|
||||
"watchers": 26,
|
||||
"watchers": 29,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -128,13 +128,13 @@
|
|||
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-15T23:07:41Z",
|
||||
"updated_at": "2020-02-04T03:18:04Z",
|
||||
"updated_at": "2020-02-04T14:37:55Z",
|
||||
"pushed_at": "2020-01-20T23:33:19Z",
|
||||
"stargazers_count": 749,
|
||||
"watchers_count": 749,
|
||||
"stargazers_count": 752,
|
||||
"watchers_count": 752,
|
||||
"forks_count": 184,
|
||||
"forks": 184,
|
||||
"watchers": 749,
|
||||
"watchers": 752,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -243,13 +243,13 @@
|
|||
"description": "Proof of Concept for CVE-2020-0601",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-16T23:44:37Z",
|
||||
"updated_at": "2020-02-03T09:32:53Z",
|
||||
"updated_at": "2020-02-04T10:00:51Z",
|
||||
"pushed_at": "2020-01-17T16:32:39Z",
|
||||
"stargazers_count": 49,
|
||||
"watchers_count": 49,
|
||||
"stargazers_count": 50,
|
||||
"watchers_count": 50,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 49,
|
||||
"watchers": 50,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -36,13 +36,13 @@
|
|||
"description": "PoC (DoS + scanner) for CVE-2020-0609 & CVE-2020-0610 - RD Gateway RCE",
|
||||
"fork": false,
|
||||
"created_at": "2020-01-23T22:29:46Z",
|
||||
"updated_at": "2020-02-04T02:15:50Z",
|
||||
"updated_at": "2020-02-04T11:58:13Z",
|
||||
"pushed_at": "2020-01-24T15:21:06Z",
|
||||
"stargazers_count": 168,
|
||||
"watchers_count": 168,
|
||||
"stargazers_count": 169,
|
||||
"watchers_count": 169,
|
||||
"forks_count": 43,
|
||||
"forks": 43,
|
||||
"watchers": 168,
|
||||
"watchers": 169,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
Loading…
Reference in a new issue