[ { "id": 356390440, "name": "vsftpd2.3.4PyExploit", "full_name": "HerculesRD\/vsftpd2.3.4PyExploit", "owner": { "login": "HerculesRD", "id": 73125772, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4", "html_url": "https:\/\/github.com\/HerculesRD", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit", "description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python", "fork": false, "created_at": "2021-04-09T20:26:01Z", "updated_at": "2021-04-12T17:16:08Z", "pushed_at": "2021-04-12T17:16:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 363437748, "name": "CVE-2011-2523", "full_name": "nobodyatall648\/CVE-2011-2523", "owner": { "login": "nobodyatall648", "id": 35725871, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4", "html_url": "https:\/\/github.com\/nobodyatall648", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523", "description": "vsftpd 2.3.4 Backdoor Exploit", "fork": false, "created_at": "2021-05-01T15:03:55Z", "updated_at": "2023-08-21T04:47:15Z", "pushed_at": "2021-06-25T19:05:49Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 401789640, "name": "CVE-2011-2523", "full_name": "Gr4ykt\/CVE-2011-2523", "owner": { "login": "Gr4ykt", "id": 78503985, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4", "html_url": "https:\/\/github.com\/Gr4ykt", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523", "description": "https:\/\/www.exploit-db.com\/exploits\/49757", "fork": false, "created_at": "2021-08-31T17:31:30Z", "updated_at": "2021-08-31T17:34:41Z", "pushed_at": "2021-08-31T17:34:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 425428807, "name": "CVE-2011-2523", "full_name": "padsalatushal\/CVE-2011-2523", "owner": { "login": "padsalatushal", "id": 57517785, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4", "html_url": "https:\/\/github.com\/padsalatushal", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution", "fork": false, "created_at": "2021-11-07T06:20:27Z", "updated_at": "2024-09-02T04:20:45Z", "pushed_at": "2023-01-08T17:46:12Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2011-2523", "exploit", "python", "security", "vsftpd-exploit" ], "visibility": "public", "forks": 2, "watchers": 12, "score": 0, "subscribers_count": 1 }, { "id": 497133986, "name": "OffensivePascal-CVE-2011-2523", "full_name": "MFernstrom\/OffensivePascal-CVE-2011-2523", "owner": { "login": "MFernstrom", "id": 9220603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4", "html_url": "https:\/\/github.com\/MFernstrom", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523", "description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523", "fork": false, "created_at": "2022-05-27T20:47:01Z", "updated_at": "2022-05-29T18:03:07Z", "pushed_at": "2022-05-28T00:24:53Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 501728395, "name": "-CVE-2011-2523", "full_name": "0xSojalSec\/-CVE-2011-2523", "owner": { "login": "0xSojalSec", "id": 92203029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4", "html_url": "https:\/\/github.com\/0xSojalSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", "fork": false, "created_at": "2022-06-09T16:25:25Z", "updated_at": "2024-08-12T20:23:59Z", "pushed_at": "2022-06-09T16:31:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 501728828, "name": "CVE-2011-2523", "full_name": "0xSojalSec\/CVE-2011-2523", "owner": { "login": "0xSojalSec", "id": 92203029, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4", "html_url": "https:\/\/github.com\/0xSojalSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xSojalSec\/CVE-2011-2523", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", "fork": false, "created_at": "2022-06-09T16:26:43Z", "updated_at": "2023-02-16T21:08:24Z", "pushed_at": "2022-06-04T17:26:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 573823365, "name": "CTF---CVE-2011-2523", "full_name": "XiangSi-Howard\/CTF---CVE-2011-2523", "owner": { "login": "XiangSi-Howard", "id": 54540850, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54540850?v=4", "html_url": "https:\/\/github.com\/XiangSi-Howard", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/XiangSi-Howard\/CTF---CVE-2011-2523", "description": null, "fork": false, "created_at": "2022-12-03T14:47:52Z", "updated_at": "2022-12-03T14:47:52Z", "pushed_at": "2022-12-04T15:22:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 597877966, "name": "CVE-2011-2523", "full_name": "cowsecurity\/CVE-2011-2523", "owner": { "login": "cowsecurity", "id": 74612612, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4", "html_url": "https:\/\/github.com\/cowsecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cowsecurity\/CVE-2011-2523", "description": "CVE-2011-2523 exploit", "fork": false, "created_at": "2023-02-05T22:17:34Z", "updated_at": "2023-04-01T15:46:38Z", "pushed_at": "2023-02-05T22:19:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 638624173, "name": "CVE-2011-2523", "full_name": "Lynk4\/CVE-2011-2523", "owner": { "login": "Lynk4", "id": 44930131, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44930131?v=4", "html_url": "https:\/\/github.com\/Lynk4", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Lynk4\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution", "fork": false, "created_at": "2023-05-09T18:44:05Z", "updated_at": "2024-03-26T03:45:20Z", "pushed_at": "2023-05-09T19:14:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2011-2523", "exploit", "metasploitable", "metasploitable-2", "metasploitable-3", "python", "vsftpd-exploit" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 705865634, "name": "CVE-2011-2523", "full_name": "vaishnavucv\/CVE-2011-2523", "owner": { "login": "vaishnavucv", "id": 76824366, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76824366?v=4", "html_url": "https:\/\/github.com\/vaishnavucv", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vaishnavucv\/CVE-2011-2523", "description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ", "fork": false, "created_at": "2023-10-16T21:00:27Z", "updated_at": "2024-10-22T16:11:18Z", "pushed_at": "2024-10-22T16:11:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 723160395, "name": "vsftpd-exploit", "full_name": "chleba124\/vsftpd-exploit", "owner": { "login": "chleba124", "id": 121700816, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121700816?v=4", "html_url": "https:\/\/github.com\/chleba124", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/chleba124\/vsftpd-exploit", "description": "A tool that exploits the CVE-2011-2523 vulnerability.", "fork": false, "created_at": "2023-11-24T21:09:00Z", "updated_at": "2024-03-02T06:59:24Z", "pushed_at": "2024-03-02T07:04:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 724568768, "name": "CVE-2011-2523-poc", "full_name": "4m3rr0r\/CVE-2011-2523-poc", "owner": { "login": "4m3rr0r", "id": 90191914, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4", "html_url": "https:\/\/github.com\/4m3rr0r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2011-2523-poc", "description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)", "fork": false, "created_at": "2023-11-28T10:52:33Z", "updated_at": "2023-12-13T13:37:13Z", "pushed_at": "2023-11-28T13:36:42Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2011-2523", "exploit", "python", "security", "vsftpd-exploit" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 767459057, "name": "Exploit-CVE-2011-2523", "full_name": "Shubham-2k1\/Exploit-CVE-2011-2523", "owner": { "login": "Shubham-2k1", "id": 71768868, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71768868?v=4", "html_url": "https:\/\/github.com\/Shubham-2k1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Shubham-2k1\/Exploit-CVE-2011-2523", "description": null, "fork": false, "created_at": "2024-03-05T10:31:42Z", "updated_at": "2024-03-05T10:32:04Z", "pushed_at": "2024-03-05T10:35:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 790562403, "name": "SmileySploit", "full_name": "Tenor-Z\/SmileySploit", "owner": { "login": "Tenor-Z", "id": 55516164, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4", "html_url": "https:\/\/github.com\/Tenor-Z", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit", "description": "A basic script that exploits CVE-2011-2523", "fork": false, "created_at": "2024-04-23T05:33:39Z", "updated_at": "2024-04-23T05:36:57Z", "pushed_at": "2024-04-23T05:36:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 806726183, "name": "CVE-2011-2523-PoC", "full_name": "0xB0y426\/CVE-2011-2523-PoC", "owner": { "login": "0xB0y426", "id": 132174647, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4", "html_url": "https:\/\/github.com\/0xB0y426", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xB0y426\/CVE-2011-2523-PoC", "description": "PoC CVE-2011-2523 ", "fork": false, "created_at": "2024-05-27T19:13:59Z", "updated_at": "2024-09-15T18:39:16Z", "pushed_at": "2024-05-27T19:16:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 815324755, "name": "CVE-2011-2523", "full_name": "sug4r-wr41th\/CVE-2011-2523", "owner": { "login": "sug4r-wr41th", "id": 136193030, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136193030?v=4", "html_url": "https:\/\/github.com\/sug4r-wr41th", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sug4r-wr41th\/CVE-2011-2523", "description": "vsFTPd 2.3.4 Remote Code Execution (CVE-2011-2523) PoC", "fork": false, "created_at": "2024-06-14T21:32:09Z", "updated_at": "2024-11-22T07:39:06Z", "pushed_at": "2024-06-15T18:03:42Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823495260, "name": "CVE-Research", "full_name": "AnugiArrawwala\/CVE-Research", "owner": { "login": "AnugiArrawwala", "id": 141626082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141626082?v=4", "html_url": "https:\/\/github.com\/AnugiArrawwala", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AnugiArrawwala\/CVE-Research", "description": "CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523", "fork": false, "created_at": "2024-07-03T06:30:54Z", "updated_at": "2024-07-03T06:52:39Z", "pushed_at": "2024-07-03T06:52:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 837704091, "name": "vsFTP-2.3.4-Remote-Root-Shell-Exploit", "full_name": "Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit", "owner": { "login": "Gill-Singh-A", "id": 123238182, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123238182?v=4", "html_url": "https:\/\/github.com\/Gill-Singh-A", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit", "description": "A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4", "fork": false, "created_at": "2024-08-03T19:06:59Z", "updated_at": "2024-11-20T16:30:59Z", "pushed_at": "2024-08-03T19:07:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "ftp", "python3", "remote-exploit", "ssh", "vsftp" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 852500356, "name": "vsFTPd-Backdoor-Exploit-CVE-2011-2523-", "full_name": "everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-", "owner": { "login": "everythingBlackkk", "id": 142638957, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142638957?v=4", "html_url": "https:\/\/github.com\/everythingBlackkk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/everythingBlackkk\/vsFTPd-Backdoor-Exploit-CVE-2011-2523-", "description": "This tool exploits a well-known backdoor vulnerability found in vsFTPd version 2.3.4 (CVE-2011-2523)", "fork": false, "created_at": "2024-09-04T23:10:14Z", "updated_at": "2024-09-15T19:55:00Z", "pushed_at": "2024-09-04T23:42:37Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 908317555, "name": "CVE-2011-2523", "full_name": "NullBrunk\/CVE-2011-2523", "owner": { "login": "NullBrunk", "id": 125673909, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125673909?v=4", "html_url": "https:\/\/github.com\/NullBrunk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/NullBrunk\/CVE-2011-2523", "description": "VsFTPd 2.3.4 Backdoor Command Execution", "fork": false, "created_at": "2024-12-25T18:04:10Z", "updated_at": "2024-12-26T13:05:44Z", "pushed_at": "2024-12-26T13:05:41Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 } ]