Auto Update 2022/01/03 12:13:51

This commit is contained in:
motikan2010-bot 2022-01-03 21:13:51 +09:00
parent c49eb8d52b
commit ec59077297
36 changed files with 187 additions and 187 deletions

View file

@ -148,17 +148,17 @@
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.", "description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false, "fork": false,
"created_at": "2014-04-08T10:10:43Z", "created_at": "2014-04-08T10:10:43Z",
"updated_at": "2021-12-08T08:06:33Z", "updated_at": "2022-01-03T08:41:25Z",
"pushed_at": "2015-07-02T14:47:31Z", "pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 576, "stargazers_count": 575,
"watchers_count": 576, "watchers_count": 575,
"forks_count": 233, "forks_count": 233,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 233, "forks": 233,
"watchers": 576, "watchers": 575,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -71,7 +71,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -44,7 +44,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ", "description": "Apache Tomcat < 9.0.1 (Beta) \/ < 8.5.23 \/ < 8.0.47 \/ < 7.0.8 - JSP Upload Bypass \/ Remote Code Execution ",
"fork": false, "fork": false,
"created_at": "2017-10-05T23:41:52Z", "created_at": "2017-10-05T23:41:52Z",
"updated_at": "2021-12-20T07:44:42Z", "updated_at": "2022-01-03T07:19:46Z",
"pushed_at": "2017-10-11T07:43:50Z", "pushed_at": "2017-10-11T07:43:50Z",
"stargazers_count": 366, "stargazers_count": 367,
"watchers_count": 366, "watchers_count": 367,
"forks_count": 136, "forks_count": 136,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 136, "forks": 136,
"watchers": 366, "watchers": 367,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -71,7 +71,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13", "description": "CVE-2018-17246 - Kibana LFI < 6.4.3 & 5.6.13",
"fork": false, "fork": false,
"created_at": "2019-03-08T20:06:15Z", "created_at": "2019-03-08T20:06:15Z",
"updated_at": "2021-07-19T14:30:17Z", "updated_at": "2022-01-03T08:45:33Z",
"pushed_at": "2019-10-26T13:28:34Z", "pushed_at": "2019-10-26T13:28:34Z",
"stargazers_count": 56, "stargazers_count": 55,
"watchers_count": 56, "watchers_count": 55,
"forks_count": 14, "forks_count": 14,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 14, "forks": 14,
"watchers": 56, "watchers": 55,
"score": 0 "score": 0
} }
] ]

View file

@ -530,10 +530,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -561,7 +561,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
}, },
{ {

View file

@ -40,10 +40,10 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false, "fork": false,
"created_at": "2019-12-21T22:45:55Z", "created_at": "2019-12-21T22:45:55Z",
"updated_at": "2022-01-02T06:20:54Z", "updated_at": "2022-01-03T09:18:13Z",
"pushed_at": "2020-01-05T21:46:25Z", "pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 481, "stargazers_count": 482,
"watchers_count": 481, "watchers_count": 482,
"forks_count": 111, "forks_count": 111,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -63,7 +63,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 111, "forks": 111,
"watchers": 481, "watchers": 482,
"score": 0 "score": 0
} }
] ]

View file

@ -13,7 +13,7 @@
"description": "Exploit for CVE-2019-11043", "description": "Exploit for CVE-2019-11043",
"fork": false, "fork": false,
"created_at": "2019-09-23T21:37:27Z", "created_at": "2019-09-23T21:37:27Z",
"updated_at": "2022-01-01T10:47:04Z", "updated_at": "2022-01-03T10:30:14Z",
"pushed_at": "2019-11-12T18:53:14Z", "pushed_at": "2019-11-12T18:53:14Z",
"stargazers_count": 1692, "stargazers_count": 1692,
"watchers_count": 1692, "watchers_count": 1692,

File diff suppressed because one or more lines are too long

View file

@ -40,10 +40,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false, "fork": false,
"created_at": "2021-05-22T05:06:33Z", "created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-12-30T05:12:22Z", "updated_at": "2022-01-03T09:06:25Z",
"pushed_at": "2021-11-21T10:34:06Z", "pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -54,7 +54,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 44, "watchers": 45,
"score": 0 "score": 0
}, },
{ {

View file

@ -17,12 +17,12 @@
"pushed_at": "2019-08-24T19:27:24Z", "pushed_at": "2019-08-24T19:27:24Z",
"stargazers_count": 13, "stargazers_count": 13,
"watchers_count": 13, "watchers_count": 13,
"forks_count": 7, "forks_count": 8,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 8,
"watchers": 13, "watchers": 13,
"score": 0 "score": 0
}, },

View file

@ -405,12 +405,12 @@
"pushed_at": "2021-02-07T19:51:24Z", "pushed_at": "2021-02-07T19:51:24Z",
"stargazers_count": 20, "stargazers_count": 20,
"watchers_count": 20, "watchers_count": 20,
"forks_count": 6, "forks_count": 5,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 6, "forks": 5,
"watchers": 20, "watchers": 20,
"score": 0 "score": 0
}, },

View file

@ -40,10 +40,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-02T14:54:44Z", "updated_at": "2022-01-03T10:01:04Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3081, "stargazers_count": 3082,
"watchers_count": 3081, "watchers_count": 3082,
"forks_count": 915, "forks_count": 915,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -70,7 +70,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 915, "forks": 915,
"watchers": 3081, "watchers": 3082,
"score": 0 "score": 0
}, },
{ {

View file

@ -175,10 +175,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -206,7 +206,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
} }
] ]

View file

@ -472,8 +472,8 @@
"description": "weblogic CVE-2019-2725利用exp。", "description": "weblogic CVE-2019-2725利用exp。",
"fork": false, "fork": false,
"created_at": "2020-01-08T06:35:28Z", "created_at": "2020-01-08T06:35:28Z",
"updated_at": "2020-01-08T06:43:35Z", "updated_at": "2022-01-03T07:44:53Z",
"pushed_at": "2020-01-08T06:42:30Z", "pushed_at": "2022-01-03T07:44:50Z",
"stargazers_count": 2, "stargazers_count": 2,
"watchers_count": 2, "watchers_count": 2,
"forks_count": 0, "forks_count": 0,

View file

@ -40,17 +40,17 @@
"description": "Test tool for CVE-2020-1472", "description": "Test tool for CVE-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-08T08:58:37Z", "created_at": "2020-09-08T08:58:37Z",
"updated_at": "2022-01-02T14:24:24Z", "updated_at": "2022-01-03T10:11:50Z",
"pushed_at": "2021-12-08T10:31:54Z", "pushed_at": "2021-12-08T10:31:54Z",
"stargazers_count": 1406, "stargazers_count": 1407,
"watchers_count": 1406, "watchers_count": 1407,
"forks_count": 316, "forks_count": 316,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 316, "forks": 316,
"watchers": 1406, "watchers": 1407,
"score": 0 "score": 0
}, },
{ {
@ -155,17 +155,17 @@
"description": "Exploit for zerologon cve-2020-1472", "description": "Exploit for zerologon cve-2020-1472",
"fork": false, "fork": false,
"created_at": "2020-09-14T19:19:07Z", "created_at": "2020-09-14T19:19:07Z",
"updated_at": "2022-01-01T01:55:52Z", "updated_at": "2022-01-03T11:19:52Z",
"pushed_at": "2020-10-15T18:31:15Z", "pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 391, "stargazers_count": 393,
"watchers_count": 391, "watchers_count": 393,
"forks_count": 118, "forks_count": 118,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 118, "forks": 118,
"watchers": 391, "watchers": 393,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340",
"fork": false, "fork": false,
"created_at": "2020-04-01T09:33:35Z", "created_at": "2020-04-01T09:33:35Z",
"updated_at": "2022-01-02T14:54:44Z", "updated_at": "2022-01-03T10:01:04Z",
"pushed_at": "2021-04-04T09:13:57Z", "pushed_at": "2021-04-04T09:13:57Z",
"stargazers_count": 3081, "stargazers_count": 3082,
"watchers_count": 3081, "watchers_count": 3082,
"forks_count": 915, "forks_count": 915,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -43,7 +43,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 915, "forks": 915,
"watchers": 3081, "watchers": 3082,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883", "description": "weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14882、CVE-2020-14883",
"fork": false, "fork": false,
"created_at": "2020-01-15T04:26:29Z", "created_at": "2020-01-15T04:26:29Z",
"updated_at": "2022-01-01T18:27:19Z", "updated_at": "2022-01-03T08:42:08Z",
"pushed_at": "2020-11-27T15:10:58Z", "pushed_at": "2020-11-27T15:10:58Z",
"stargazers_count": 1256, "stargazers_count": 1255,
"watchers_count": 1256, "watchers_count": 1255,
"forks_count": 277, "forks_count": 277,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -44,7 +44,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 277, "forks": 277,
"watchers": 1256, "watchers": 1255,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.", "description": "CVE-2020-26259: XStream is vulnerable to an Arbitrary File Deletion on the local host when unmarshalling as long as the executing process has sufficient rights.",
"fork": false, "fork": false,
"created_at": "2020-12-13T17:39:11Z", "created_at": "2020-12-13T17:39:11Z",
"updated_at": "2021-06-30T13:25:40Z", "updated_at": "2022-01-03T08:14:12Z",
"pushed_at": "2020-12-13T19:12:34Z", "pushed_at": "2020-12-13T19:12:34Z",
"stargazers_count": 26, "stargazers_count": 27,
"watchers_count": 26, "watchers_count": 27,
"forks_count": 1, "forks_count": 1,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 1,
"watchers": 26, "watchers": 27,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2020-12-14T19:39:42Z", "created_at": "2020-12-14T19:39:42Z",
"updated_at": "2021-09-18T10:25:12Z", "updated_at": "2022-01-03T07:13:02Z",
"pushed_at": "2020-12-20T17:29:07Z", "pushed_at": "2020-12-20T17:29:07Z",
"stargazers_count": 32, "stargazers_count": 33,
"watchers_count": 32, "watchers_count": 33,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 32, "watchers": 33,
"score": 0 "score": 0
} }
] ]

View file

@ -13,17 +13,17 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-10-12T14:52:38Z", "created_at": "2021-10-12T14:52:38Z",
"updated_at": "2022-01-02T20:14:49Z", "updated_at": "2022-01-03T06:35:43Z",
"pushed_at": "2021-10-12T16:05:19Z", "pushed_at": "2021-10-12T16:05:19Z",
"stargazers_count": 8, "stargazers_count": 9,
"watchers_count": 8, "watchers_count": 9,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 8, "watchers": 9,
"score": 0 "score": 0
} }
] ]

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-01-24T05:28:07Z", "pushed_at": "2021-01-24T05:28:07Z",
"stargazers_count": 101, "stargazers_count": 101,
"watchers_count": 101, "watchers_count": 101,
"forks_count": 42, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 42, "forks": 44,
"watchers": 101, "watchers": 101,
"score": 0 "score": 0
}, },
@ -179,17 +179,17 @@
"description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)", "description": "Laravel <= v8.4.2 debug mode: Remote code execution (CVE-2021-3129)",
"fork": false, "fork": false,
"created_at": "2021-02-18T05:42:13Z", "created_at": "2021-02-18T05:42:13Z",
"updated_at": "2021-12-25T08:14:40Z", "updated_at": "2022-01-03T12:05:29Z",
"pushed_at": "2021-12-14T05:12:17Z", "pushed_at": "2021-12-14T05:12:17Z",
"stargazers_count": 63, "stargazers_count": 64,
"watchers_count": 63, "watchers_count": 64,
"forks_count": 32, "forks_count": 32,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 32, "forks": 32,
"watchers": 63, "watchers": 64,
"score": 0 "score": 0
}, },
{ {

View file

@ -757,12 +757,12 @@
"pushed_at": "2021-02-03T22:28:14Z", "pushed_at": "2021-02-03T22:28:14Z",
"stargazers_count": 82, "stargazers_count": 82,
"watchers_count": 82, "watchers_count": 82,
"forks_count": 35, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 36,
"watchers": 82, "watchers": 82,
"score": 0 "score": 0
}, },

View file

@ -13,8 +13,8 @@
"description": "PoC of CVE-2021-35296 - PTCL Modem HG150-Ub", "description": "PoC of CVE-2021-35296 - PTCL Modem HG150-Ub",
"fork": false, "fork": false,
"created_at": "2021-09-30T18:18:27Z", "created_at": "2021-09-30T18:18:27Z",
"updated_at": "2021-10-06T13:51:00Z", "updated_at": "2022-01-03T10:52:49Z",
"pushed_at": "2021-10-06T13:50:58Z", "pushed_at": "2022-01-03T10:52:45Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 0, "forks_count": 0,

View file

@ -44,12 +44,12 @@
"pushed_at": "2021-10-28T06:37:37Z", "pushed_at": "2021-10-28T06:37:37Z",
"stargazers_count": 76, "stargazers_count": 76,
"watchers_count": 76, "watchers_count": 76,
"forks_count": 35, "forks_count": 36,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 35, "forks": 36,
"watchers": 76, "watchers": 76,
"score": 0 "score": 0
}, },

View file

@ -13,10 +13,10 @@
"description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露", "description": "漏洞POC、EXP合集持续更新。Apache Druid-任意文件读取CVE-2021-36749、ConfluenceRCECVE-2021-26084、ZeroShell防火墙RCECVE-2019-12725、ApacheSolr任意文件读取、蓝凌OA任意文件读取、phpStudyRCE、ShowDoc任意文件上传、原创先锋后台未授权、Kyan账号密码泄露、TerraMasterTos任意文件读取、TamronOS-IPTV系统RCE、Wayos防火墙账号密码泄露",
"fork": false, "fork": false,
"created_at": "2021-05-22T05:06:33Z", "created_at": "2021-05-22T05:06:33Z",
"updated_at": "2021-12-30T05:12:22Z", "updated_at": "2022-01-03T09:06:25Z",
"pushed_at": "2021-11-21T10:34:06Z", "pushed_at": "2021-11-21T10:34:06Z",
"stargazers_count": 44, "stargazers_count": 45,
"watchers_count": 44, "watchers_count": 45,
"forks_count": 12, "forks_count": 12,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -27,7 +27,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 12, "forks": 12,
"watchers": 44, "watchers": 45,
"score": 0 "score": 0
}, },
{ {

View file

@ -207,10 +207,10 @@
"description": "Exploit for CVE-2021-36934", "description": "Exploit for CVE-2021-36934",
"fork": false, "fork": false,
"created_at": "2021-08-12T18:01:21Z", "created_at": "2021-08-12T18:01:21Z",
"updated_at": "2022-01-02T11:20:33Z", "updated_at": "2022-01-03T09:14:05Z",
"pushed_at": "2021-08-13T21:05:51Z", "pushed_at": "2021-08-13T21:05:51Z",
"stargazers_count": 3, "stargazers_count": 4,
"watchers_count": 3, "watchers_count": 4,
"forks_count": 0, "forks_count": 0,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -224,7 +224,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 0, "forks": 0,
"watchers": 3, "watchers": 4,
"score": 0 "score": 0
} }
] ]

View file

@ -229,17 +229,17 @@
"description": "CVE-2021-40444 PoC", "description": "CVE-2021-40444 PoC",
"fork": false, "fork": false,
"created_at": "2021-09-10T16:55:53Z", "created_at": "2021-09-10T16:55:53Z",
"updated_at": "2021-12-31T09:36:22Z", "updated_at": "2022-01-03T07:36:14Z",
"pushed_at": "2021-12-25T18:31:02Z", "pushed_at": "2021-12-25T18:31:02Z",
"stargazers_count": 1334, "stargazers_count": 1335,
"watchers_count": 1334, "watchers_count": 1335,
"forks_count": 436, "forks_count": 436,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 436, "forks": 436,
"watchers": 1334, "watchers": 1335,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,10 +13,10 @@
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false, "fork": false,
"created_at": "2021-12-11T15:10:30Z", "created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-01-02T11:06:16Z", "updated_at": "2022-01-03T11:09:12Z",
"pushed_at": "2021-12-21T10:11:05Z", "pushed_at": "2021-12-21T10:11:05Z",
"stargazers_count": 674, "stargazers_count": 675,
"watchers_count": 674, "watchers_count": 675,
"forks_count": 142, "forks_count": 142,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -28,7 +28,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 142, "forks": 142,
"watchers": 674, "watchers": 675,
"score": 0 "score": 0
}, },
{ {

View file

@ -13,17 +13,17 @@
"description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.", "description": "CVE-2021-42287\/CVE-2021-42278 Scanner & Exploiter.",
"fork": false, "fork": false,
"created_at": "2021-12-11T19:27:30Z", "created_at": "2021-12-11T19:27:30Z",
"updated_at": "2022-01-02T11:10:59Z", "updated_at": "2022-01-03T06:24:22Z",
"pushed_at": "2021-12-16T09:50:15Z", "pushed_at": "2021-12-16T09:50:15Z",
"stargazers_count": 968, "stargazers_count": 969,
"watchers_count": 968, "watchers_count": 969,
"forks_count": 256, "forks_count": 256,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 256, "forks": 256,
"watchers": 968, "watchers": 969,
"score": 0 "score": 0
} }
] ]

View file

@ -94,8 +94,8 @@
"description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ", "description": "Checks your files for existence of Unicode BIDI characters which can be misused for supply chain attacks. See CVE-2021-42574 ",
"fork": false, "fork": false,
"created_at": "2021-11-06T22:12:35Z", "created_at": "2021-11-06T22:12:35Z",
"updated_at": "2021-12-13T20:25:31Z", "updated_at": "2022-01-03T08:53:14Z",
"pushed_at": "2022-01-03T05:21:35Z", "pushed_at": "2022-01-03T08:53:12Z",
"stargazers_count": 4, "stargazers_count": 4,
"watchers_count": 4, "watchers_count": 4,
"forks_count": 2, "forks_count": 2,

View file

@ -67,17 +67,17 @@
"description": "Grafana Unauthorized arbitrary file reading vulnerability", "description": "Grafana Unauthorized arbitrary file reading vulnerability",
"fork": false, "fork": false,
"created_at": "2021-12-07T09:02:16Z", "created_at": "2021-12-07T09:02:16Z",
"updated_at": "2022-01-03T05:51:51Z", "updated_at": "2022-01-03T09:01:23Z",
"pushed_at": "2021-12-09T03:16:21Z", "pushed_at": "2021-12-09T03:16:21Z",
"stargazers_count": 237, "stargazers_count": 239,
"watchers_count": 237, "watchers_count": 239,
"forks_count": 63, "forks_count": 63,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 63, "forks": 63,
"watchers": 237, "watchers": 239,
"score": 0 "score": 0
}, },
{ {

View file

@ -574,17 +574,17 @@
"description": "Vulnerability CVE-2021-44228 checker", "description": "Vulnerability CVE-2021-44228 checker",
"fork": false, "fork": false,
"created_at": "2021-12-10T17:24:47Z", "created_at": "2021-12-10T17:24:47Z",
"updated_at": "2021-12-30T13:29:50Z", "updated_at": "2022-01-03T11:28:03Z",
"pushed_at": "2021-12-13T15:16:23Z", "pushed_at": "2021-12-13T15:16:23Z",
"stargazers_count": 37, "stargazers_count": 38,
"watchers_count": 37, "watchers_count": 38,
"forks_count": 4, "forks_count": 4,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 4, "forks": 4,
"watchers": 37, "watchers": 38,
"score": 0 "score": 0
}, },
{ {
@ -858,10 +858,10 @@
"description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches", "description": "🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - A trick to bypass words blocking patches",
"fork": false, "fork": false,
"created_at": "2021-12-10T22:35:00Z", "created_at": "2021-12-10T22:35:00Z",
"updated_at": "2022-01-02T17:25:58Z", "updated_at": "2022-01-03T07:44:51Z",
"pushed_at": "2021-12-31T11:47:19Z", "pushed_at": "2021-12-31T11:47:19Z",
"stargazers_count": 571, "stargazers_count": 573,
"watchers_count": 571, "watchers_count": 573,
"forks_count": 86, "forks_count": 86,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -888,7 +888,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 86, "forks": 86,
"watchers": 571, "watchers": 573,
"score": 0 "score": 0
}, },
{ {
@ -905,11 +905,11 @@
"description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ", "description": "A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability. ",
"fork": false, "fork": false,
"created_at": "2021-12-10T23:19:28Z", "created_at": "2021-12-10T23:19:28Z",
"updated_at": "2022-01-01T23:36:54Z", "updated_at": "2022-01-03T07:49:53Z",
"pushed_at": "2022-01-02T07:12:10Z", "pushed_at": "2022-01-02T07:12:10Z",
"stargazers_count": 1080, "stargazers_count": 1081,
"watchers_count": 1080, "watchers_count": 1081,
"forks_count": 265, "forks_count": 266,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -919,8 +919,8 @@
"security" "security"
], ],
"visibility": "public", "visibility": "public",
"forks": 265, "forks": 266,
"watchers": 1080, "watchers": 1081,
"score": 0 "score": 0
}, },
{ {
@ -1139,10 +1139,10 @@
"description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.", "description": "A minimalistic LDAP server that is meant for test vulnerability to JNDI+LDAP injection attacks in Java, especially CVE-2021-44228.",
"fork": false, "fork": false,
"created_at": "2021-12-11T03:08:14Z", "created_at": "2021-12-11T03:08:14Z",
"updated_at": "2021-12-14T05:02:21Z", "updated_at": "2022-01-03T09:26:00Z",
"pushed_at": "2021-12-13T16:17:03Z", "pushed_at": "2021-12-13T16:17:03Z",
"stargazers_count": 6, "stargazers_count": 7,
"watchers_count": 6, "watchers_count": 7,
"forks_count": 3, "forks_count": 3,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1155,7 +1155,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 3, "forks": 3,
"watchers": 6, "watchers": 7,
"score": 0 "score": 0
}, },
{ {
@ -1373,10 +1373,10 @@
"description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228", "description": "Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-11T11:18:46Z", "created_at": "2021-12-11T11:18:46Z",
"updated_at": "2022-01-02T15:09:10Z", "updated_at": "2022-01-03T10:28:39Z",
"pushed_at": "2022-01-02T15:10:51Z", "pushed_at": "2022-01-02T15:10:51Z",
"stargazers_count": 686, "stargazers_count": 689,
"watchers_count": 686, "watchers_count": 689,
"forks_count": 139, "forks_count": 139,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1393,7 +1393,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 139, "forks": 139,
"watchers": 686, "watchers": 689,
"score": 0 "score": 0
}, },
{ {
@ -1885,10 +1885,10 @@
"description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!", "description": "Log4J scanner that detects vulnerable Log4J versions (CVE-2021-44228, CVE-2021-45046, etc) on your file-system within any application. It is able to even find Log4J instances that are hidden several layers deep. Works on Linux, Windows, and Mac, and everywhere else Java runs, too!",
"fork": false, "fork": false,
"created_at": "2021-12-12T00:29:03Z", "created_at": "2021-12-12T00:29:03Z",
"updated_at": "2022-01-03T03:43:07Z", "updated_at": "2022-01-03T09:26:32Z",
"pushed_at": "2022-01-01T19:44:06Z", "pushed_at": "2022-01-01T19:44:06Z",
"stargazers_count": 546, "stargazers_count": 548,
"watchers_count": 546, "watchers_count": 548,
"forks_count": 88, "forks_count": 88,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -1907,7 +1907,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 88, "forks": 88,
"watchers": 546, "watchers": 548,
"score": 0 "score": 0
}, },
{ {
@ -1986,17 +1986,17 @@
"description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.", "description": "An agent to hotpatch the log4j RCE from CVE-2021-44228.",
"fork": false, "fork": false,
"created_at": "2021-12-12T01:24:51Z", "created_at": "2021-12-12T01:24:51Z",
"updated_at": "2022-01-03T05:01:49Z", "updated_at": "2022-01-03T09:58:30Z",
"pushed_at": "2021-12-23T20:40:44Z", "pushed_at": "2021-12-23T20:40:44Z",
"stargazers_count": 459, "stargazers_count": 460,
"watchers_count": 459, "watchers_count": 460,
"forks_count": 59, "forks_count": 59,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 59, "forks": 59,
"watchers": 459, "watchers": 460,
"score": 0 "score": 0
}, },
{ {
@ -3198,17 +3198,17 @@
"description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)", "description": "Nmap NSE scripts to check against log4shell or LogJam vulnerabilities (CVE-2021-44228)",
"fork": false, "fork": false,
"created_at": "2021-12-12T22:52:02Z", "created_at": "2021-12-12T22:52:02Z",
"updated_at": "2022-01-01T12:18:00Z", "updated_at": "2022-01-03T11:01:47Z",
"pushed_at": "2021-12-20T15:34:21Z", "pushed_at": "2021-12-20T15:34:21Z",
"stargazers_count": 293, "stargazers_count": 295,
"watchers_count": 293, "watchers_count": 295,
"forks_count": 44, "forks_count": 44,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 44, "forks": 44,
"watchers": 293, "watchers": 295,
"score": 0 "score": 0
}, },
{ {
@ -3542,12 +3542,12 @@
"pushed_at": "2022-01-02T20:21:42Z", "pushed_at": "2022-01-02T20:21:42Z",
"stargazers_count": 2489, "stargazers_count": 2489,
"watchers_count": 2489, "watchers_count": 2489,
"forks_count": 580, "forks_count": 582,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 580, "forks": 582,
"watchers": 2489, "watchers": 2489,
"score": 0 "score": 0
}, },
@ -3565,17 +3565,17 @@
"description": "a fast check, if your server could be vulnerable to CVE-2021-44228", "description": "a fast check, if your server could be vulnerable to CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-13T04:14:18Z", "created_at": "2021-12-13T04:14:18Z",
"updated_at": "2022-01-02T11:02:11Z", "updated_at": "2022-01-03T11:48:52Z",
"pushed_at": "2022-01-01T23:46:03Z", "pushed_at": "2022-01-01T23:46:03Z",
"stargazers_count": 233, "stargazers_count": 234,
"watchers_count": 233, "watchers_count": 234,
"forks_count": 82, "forks_count": 82,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 82, "forks": 82,
"watchers": 233, "watchers": 234,
"score": 0 "score": 0
}, },
{ {
@ -3681,12 +3681,12 @@
"pushed_at": "2021-12-22T05:37:11Z", "pushed_at": "2021-12-22T05:37:11Z",
"stargazers_count": 0, "stargazers_count": 0,
"watchers_count": 0, "watchers_count": 0,
"forks_count": 1, "forks_count": 2,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 1, "forks": 2,
"watchers": 0, "watchers": 0,
"score": 0 "score": 0
}, },
@ -4393,8 +4393,8 @@
"description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)", "description": "log4j \/ log4shell IoCs from multiple sources put together in one big file (IPs) more coming soon (CVE-2021-44228)",
"fork": false, "fork": false,
"created_at": "2021-12-13T16:39:16Z", "created_at": "2021-12-13T16:39:16Z",
"updated_at": "2022-01-03T06:00:28Z", "updated_at": "2022-01-03T12:00:33Z",
"pushed_at": "2022-01-03T06:00:25Z", "pushed_at": "2022-01-03T12:00:30Z",
"stargazers_count": 26, "stargazers_count": 26,
"watchers_count": 26, "watchers_count": 26,
"forks_count": 10, "forks_count": 10,
@ -5412,10 +5412,10 @@
"description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)", "description": "Find vulnerable Log4j2 versions on disk and also inside Java Archive Files (Log4Shell CVE-2021-44228, CVE-2021-45046, CVE-2021-45105)",
"fork": false, "fork": false,
"created_at": "2021-12-14T10:04:42Z", "created_at": "2021-12-14T10:04:42Z",
"updated_at": "2022-01-02T14:12:43Z", "updated_at": "2022-01-03T11:47:44Z",
"pushed_at": "2022-01-03T01:27:06Z", "pushed_at": "2022-01-03T01:27:06Z",
"stargazers_count": 361, "stargazers_count": 362,
"watchers_count": 361, "watchers_count": 362,
"forks_count": 67, "forks_count": 67,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
@ -5431,7 +5431,7 @@
], ],
"visibility": "public", "visibility": "public",
"forks": 67, "forks": 67,
"watchers": 361, "watchers": 362,
"score": 0 "score": 0
}, },
{ {
@ -5691,17 +5691,17 @@
"description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228", "description": "Internal network honeypot for detecting if an attacker or insider threat scans your network for log4j CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-14T18:08:45Z", "created_at": "2021-12-14T18:08:45Z",
"updated_at": "2022-01-02T23:22:39Z", "updated_at": "2022-01-03T11:50:57Z",
"pushed_at": "2021-12-20T14:44:27Z", "pushed_at": "2021-12-20T14:44:27Z",
"stargazers_count": 123, "stargazers_count": 125,
"watchers_count": 123, "watchers_count": 125,
"forks_count": 20, "forks_count": 20,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 20, "forks": 20,
"watchers": 123, "watchers": 125,
"score": 0 "score": 0
}, },
{ {
@ -6580,8 +6580,8 @@
"description": "Scans for Log4j versions effected by CVE-2021-44228", "description": "Scans for Log4j versions effected by CVE-2021-44228",
"fork": false, "fork": false,
"created_at": "2021-12-15T16:21:26Z", "created_at": "2021-12-15T16:21:26Z",
"updated_at": "2021-12-23T15:00:48Z", "updated_at": "2022-01-03T11:01:26Z",
"pushed_at": "2021-12-23T15:01:22Z", "pushed_at": "2022-01-03T11:01:23Z",
"stargazers_count": 3, "stargazers_count": 3,
"watchers_count": 3, "watchers_count": 3,
"forks_count": 1, "forks_count": 1,

View file

@ -40,17 +40,17 @@
"description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046", "description": "Log4j 2.15.0 Privilege Escalation -- CVE-2021-45046",
"fork": false, "fork": false,
"created_at": "2021-12-15T05:48:53Z", "created_at": "2021-12-15T05:48:53Z",
"updated_at": "2021-12-29T03:10:22Z", "updated_at": "2022-01-03T08:12:55Z",
"pushed_at": "2021-12-23T10:57:19Z", "pushed_at": "2021-12-23T10:57:19Z",
"stargazers_count": 18, "stargazers_count": 19,
"watchers_count": 18, "watchers_count": 19,
"forks_count": 7, "forks_count": 7,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [], "topics": [],
"visibility": "public", "visibility": "public",
"forks": 7, "forks": 7,
"watchers": 18, "watchers": 19,
"score": 0 "score": 0
}, },
{ {

View file

@ -175,11 +175,11 @@
"description": null, "description": null,
"fork": false, "fork": false,
"created_at": "2021-12-29T07:32:30Z", "created_at": "2021-12-29T07:32:30Z",
"updated_at": "2022-01-03T03:01:19Z", "updated_at": "2022-01-03T11:45:57Z",
"pushed_at": "2021-12-31T08:30:33Z", "pushed_at": "2021-12-31T08:30:33Z",
"stargazers_count": 36, "stargazers_count": 38,
"watchers_count": 36, "watchers_count": 38,
"forks_count": 17, "forks_count": 18,
"allow_forking": true, "allow_forking": true,
"is_template": false, "is_template": false,
"topics": [ "topics": [
@ -187,8 +187,8 @@
"cve-2021-45232" "cve-2021-45232"
], ],
"visibility": "public", "visibility": "public",
"forks": 17, "forks": 18,
"watchers": 36, "watchers": 38,
"score": 0 "score": 0
}, },
{ {