mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
Auto Update 2021/08/16 00:12:47
This commit is contained in:
parent
058890f96b
commit
f005b71f26
19 changed files with 103 additions and 79 deletions
|
@ -1240,5 +1240,28 @@
|
|||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396322717,
|
||||
"name": "bleeding-heart",
|
||||
"full_name": "pierceoneill\/bleeding-heart",
|
||||
"owner": {
|
||||
"login": "pierceoneill",
|
||||
"id": 37594104,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4",
|
||||
"html_url": "https:\/\/github.com\/pierceoneill"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart",
|
||||
"description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-15T11:05:23Z",
|
||||
"updated_at": "2021-08-15T11:13:05Z",
|
||||
"pushed_at": "2021-08-15T11:13:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -1393,13 +1393,13 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-03-09T12:56:08Z",
|
||||
"updated_at": "2021-04-04T16:57:46Z",
|
||||
"updated_at": "2021-08-15T12:24:09Z",
|
||||
"pushed_at": "2021-04-03T14:42:10Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"stargazers_count": 2,
|
||||
"watchers_count": 2,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 1,
|
||||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2017-05-30T16:13:24Z",
|
||||
"stargazers_count": 38,
|
||||
"watchers_count": 38,
|
||||
"forks_count": 22,
|
||||
"forks": 22,
|
||||
"forks_count": 23,
|
||||
"forks": 23,
|
||||
"watchers": 38,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,8 +13,8 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2018-07-26T19:31:45Z",
|
||||
"updated_at": "2021-08-04T16:44:06Z",
|
||||
"pushed_at": "2018-07-27T12:09:40Z",
|
||||
"updated_at": "2021-08-15T14:18:14Z",
|
||||
"pushed_at": "2021-08-15T14:18:12Z",
|
||||
"stargazers_count": 11,
|
||||
"watchers_count": 11,
|
||||
"forks_count": 7,
|
||||
|
|
|
@ -63,8 +63,8 @@
|
|||
"pushed_at": "2019-06-21T11:29:41Z",
|
||||
"stargazers_count": 322,
|
||||
"watchers_count": 322,
|
||||
"forks_count": 70,
|
||||
"forks": 70,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 322,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -344,29 +344,6 @@
|
|||
"watchers": 2,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 368409342,
|
||||
"name": "CVE-2018-9995-Exploit",
|
||||
"full_name": "kienquoc102\/CVE-2018-9995-Exploit",
|
||||
"owner": {
|
||||
"login": "kienquoc102",
|
||||
"id": 84182708,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84182708?v=4",
|
||||
"html_url": "https:\/\/github.com\/kienquoc102"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/kienquoc102\/CVE-2018-9995-Exploit",
|
||||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-05-18T05:19:28Z",
|
||||
"updated_at": "2021-06-04T12:03:29Z",
|
||||
"pushed_at": "2021-06-04T12:03:27Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 374551249,
|
||||
"name": "CVE-2018-9995-2",
|
||||
|
@ -381,7 +358,7 @@
|
|||
"description": null,
|
||||
"fork": false,
|
||||
"created_at": "2021-06-07T05:57:43Z",
|
||||
"updated_at": "2021-08-04T09:32:35Z",
|
||||
"updated_at": "2021-08-15T10:30:19Z",
|
||||
"pushed_at": "2021-06-10T11:42:32Z",
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
|
|
|
@ -1025,13 +1025,13 @@
|
|||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||||
"fork": false,
|
||||
"created_at": "2019-05-22T00:08:44Z",
|
||||
"updated_at": "2021-08-03T11:05:19Z",
|
||||
"updated_at": "2021-08-15T10:02:05Z",
|
||||
"pushed_at": "2020-12-06T04:48:38Z",
|
||||
"stargazers_count": 1156,
|
||||
"watchers_count": 1156,
|
||||
"stargazers_count": 1155,
|
||||
"watchers_count": 1155,
|
||||
"forks_count": 400,
|
||||
"forks": 400,
|
||||
"watchers": 1156,
|
||||
"watchers": 1155,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -2244,13 +2244,13 @@
|
|||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-30T19:46:21Z",
|
||||
"updated_at": "2021-07-30T03:25:43Z",
|
||||
"updated_at": "2021-08-15T10:18:04Z",
|
||||
"pushed_at": "2021-02-06T00:24:21Z",
|
||||
"stargazers_count": 189,
|
||||
"watchers_count": 189,
|
||||
"stargazers_count": 188,
|
||||
"watchers_count": 188,
|
||||
"forks_count": 72,
|
||||
"forks": 72,
|
||||
"watchers": 189,
|
||||
"watchers": 188,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "Root your MediaTek arm64 device using mtk-su (CVE-2020-0069).",
|
||||
"fork": false,
|
||||
"created_at": "2019-09-06T12:12:48Z",
|
||||
"updated_at": "2021-07-27T20:29:33Z",
|
||||
"updated_at": "2021-08-15T11:10:50Z",
|
||||
"pushed_at": "2021-05-31T21:22:33Z",
|
||||
"stargazers_count": 65,
|
||||
"watchers_count": 65,
|
||||
"stargazers_count": 66,
|
||||
"watchers_count": 66,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 65,
|
||||
"watchers": 66,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -105,13 +105,13 @@
|
|||
"description": "PoC exploit of CVE-2020-11651 and CVE-2020-11652",
|
||||
"fork": false,
|
||||
"created_at": "2020-05-04T11:52:28Z",
|
||||
"updated_at": "2021-07-01T18:10:42Z",
|
||||
"updated_at": "2021-08-15T11:52:58Z",
|
||||
"pushed_at": "2020-07-10T09:30:47Z",
|
||||
"stargazers_count": 96,
|
||||
"watchers_count": 96,
|
||||
"stargazers_count": 97,
|
||||
"watchers_count": 97,
|
||||
"forks_count": 39,
|
||||
"forks": 39,
|
||||
"watchers": 96,
|
||||
"watchers": 97,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-08-01T12:25:59Z",
|
||||
"stargazers_count": 32,
|
||||
"watchers_count": 32,
|
||||
"forks_count": 6,
|
||||
"forks": 6,
|
||||
"forks_count": 7,
|
||||
"forks": 7,
|
||||
"watchers": 32,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -128,13 +128,13 @@
|
|||
"description": "Exploit for zerologon cve-2020-1472",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-14T19:19:07Z",
|
||||
"updated_at": "2021-08-11T16:14:12Z",
|
||||
"updated_at": "2021-08-15T14:24:27Z",
|
||||
"pushed_at": "2020-10-15T18:31:15Z",
|
||||
"stargazers_count": 351,
|
||||
"watchers_count": 351,
|
||||
"stargazers_count": 352,
|
||||
"watchers_count": 352,
|
||||
"forks_count": 106,
|
||||
"forks": 106,
|
||||
"watchers": 351,
|
||||
"watchers": 352,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -17,8 +17,8 @@
|
|||
"pushed_at": "2021-01-24T09:05:40Z",
|
||||
"stargazers_count": 72,
|
||||
"watchers_count": 72,
|
||||
"forks_count": 34,
|
||||
"forks": 34,
|
||||
"forks_count": 35,
|
||||
"forks": 35,
|
||||
"watchers": 72,
|
||||
"score": 0
|
||||
}
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "PoCs and technical analysis of three vulnerabilities found on Cisco AnyConnect for Windows: CVE-2020-3433, CVE-2020-3434 and CVE-2020-3435 ",
|
||||
"fork": false,
|
||||
"created_at": "2020-09-25T20:53:48Z",
|
||||
"updated_at": "2021-08-15T04:52:29Z",
|
||||
"updated_at": "2021-08-15T11:35:37Z",
|
||||
"pushed_at": "2020-09-25T20:55:17Z",
|
||||
"stargazers_count": 14,
|
||||
"watchers_count": 14,
|
||||
"forks_count": 8,
|
||||
"forks": 8,
|
||||
"watchers": 14,
|
||||
"stargazers_count": 15,
|
||||
"watchers_count": 15,
|
||||
"forks_count": 10,
|
||||
"forks": 10,
|
||||
"watchers": 15,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -36,13 +36,13 @@
|
|||
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
||||
"fork": false,
|
||||
"created_at": "2021-06-29T17:24:14Z",
|
||||
"updated_at": "2021-08-14T13:05:37Z",
|
||||
"updated_at": "2021-08-15T14:08:24Z",
|
||||
"pushed_at": "2021-07-20T15:28:13Z",
|
||||
"stargazers_count": 1305,
|
||||
"watchers_count": 1305,
|
||||
"stargazers_count": 1307,
|
||||
"watchers_count": 1307,
|
||||
"forks_count": 471,
|
||||
"forks": 471,
|
||||
"watchers": 1305,
|
||||
"watchers": 1307,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
@ -224,8 +224,8 @@
|
|||
"pushed_at": "2021-07-05T08:54:06Z",
|
||||
"stargazers_count": 556,
|
||||
"watchers_count": 556,
|
||||
"forks_count": 146,
|
||||
"forks": 146,
|
||||
"forks_count": 147,
|
||||
"forks": 147,
|
||||
"watchers": 556,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -13,13 +13,13 @@
|
|||
"description": "POC of CVE-2021-2394",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-02T02:22:04Z",
|
||||
"updated_at": "2021-08-15T03:50:31Z",
|
||||
"updated_at": "2021-08-15T11:08:47Z",
|
||||
"pushed_at": "2021-08-15T03:48:55Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"stargazers_count": 1,
|
||||
"watchers_count": 1,
|
||||
"forks_count": 0,
|
||||
"forks": 0,
|
||||
"watchers": 0,
|
||||
"watchers": 1,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
|
|
|
@ -44,5 +44,28 @@
|
|||
"forks": 1,
|
||||
"watchers": 8,
|
||||
"score": 0
|
||||
},
|
||||
{
|
||||
"id": 396324186,
|
||||
"name": "CVE-2021-28476-tools-env",
|
||||
"full_name": "sh4m2hwz\/CVE-2021-28476-tools-env",
|
||||
"owner": {
|
||||
"login": "sh4m2hwz",
|
||||
"id": 77354315,
|
||||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77354315?v=4",
|
||||
"html_url": "https:\/\/github.com\/sh4m2hwz"
|
||||
},
|
||||
"html_url": "https:\/\/github.com\/sh4m2hwz\/CVE-2021-28476-tools-env",
|
||||
"description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
|
||||
"fork": false,
|
||||
"created_at": "2021-08-15T11:10:40Z",
|
||||
"updated_at": "2021-08-15T11:44:04Z",
|
||||
"pushed_at": "2021-08-15T11:44:02Z",
|
||||
"stargazers_count": 0,
|
||||
"watchers_count": 0,
|
||||
"forks_count": 1,
|
||||
"forks": 1,
|
||||
"watchers": 0,
|
||||
"score": 0
|
||||
}
|
||||
]
|
|
@ -109,8 +109,8 @@
|
|||
"pushed_at": "2021-07-19T01:22:40Z",
|
||||
"stargazers_count": 23,
|
||||
"watchers_count": 23,
|
||||
"forks_count": 12,
|
||||
"forks": 12,
|
||||
"forks_count": 13,
|
||||
"forks": 13,
|
||||
"watchers": 23,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -247,8 +247,8 @@
|
|||
"pushed_at": "2021-07-25T15:41:33Z",
|
||||
"stargazers_count": 181,
|
||||
"watchers_count": 181,
|
||||
"forks_count": 36,
|
||||
"forks": 36,
|
||||
"forks_count": 37,
|
||||
"forks": 37,
|
||||
"watchers": 181,
|
||||
"score": 0
|
||||
},
|
||||
|
|
|
@ -1307,6 +1307,7 @@ Hyper-V Remote Code Execution Vulnerability
|
|||
|
||||
- [0vercl0k/CVE-2021-28476](https://github.com/0vercl0k/CVE-2021-28476)
|
||||
- [bluefrostsecurity/CVE-2021-28476](https://github.com/bluefrostsecurity/CVE-2021-28476)
|
||||
- [sh4m2hwz/CVE-2021-28476-tools-env](https://github.com/sh4m2hwz/CVE-2021-28476-tools-env)
|
||||
|
||||
### CVE-2021-28480 (2021-04-13)
|
||||
|
||||
|
@ -11869,7 +11870,6 @@ TBK DVR4104 and DVR4216 devices, as well as Novo, CeNova, QSee, Pulnix, XVR 5 in
|
|||
- [akuhidayat/HTC](https://github.com/akuhidayat/HTC)
|
||||
- [g5q2/cve-2018-9995](https://github.com/g5q2/cve-2018-9995)
|
||||
- [HACKGM/CVE-2018-9995](https://github.com/HACKGM/CVE-2018-9995)
|
||||
- [kienquoc102/CVE-2018-9995-Exploit](https://github.com/kienquoc102/CVE-2018-9995-Exploit)
|
||||
- [kienquoc102/CVE-2018-9995-2](https://github.com/kienquoc102/CVE-2018-9995-2)
|
||||
|
||||
### CVE-2018-10118 (2018-04-15)
|
||||
|
@ -17829,6 +17829,7 @@ The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not p
|
|||
- [nyc-tophile/A2SV--SSL-VUL-Scan](https://github.com/nyc-tophile/A2SV--SSL-VUL-Scan)
|
||||
- [ingochris/heartpatch.us](https://github.com/ingochris/heartpatch.us)
|
||||
- [BelminD/heartbleed](https://github.com/BelminD/heartbleed)
|
||||
- [pierceoneill/bleeding-heart](https://github.com/pierceoneill/bleeding-heart)
|
||||
|
||||
### CVE-2014-0166 (2014-04-09)
|
||||
|
||||
|
|
Loading…
Reference in a new issue