[ { "id": 391818469, "name": "CVE-2021-31630-OpenPLC_RCE", "full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE", "owner": { "login": "hev0x", "id": 6265911, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4", "html_url": "https:\/\/github.com\/hev0x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE", "description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver", "fork": false, "created_at": "2021-08-02T04:48:24Z", "updated_at": "2024-08-12T20:15:12Z", "pushed_at": "2021-08-02T04:48:25Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 775165945, "name": "CVE-2021-31630-HTB", "full_name": "Hunt3r0x\/CVE-2021-31630-HTB", "owner": { "login": "Hunt3r0x", "id": 106396603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4", "html_url": "https:\/\/github.com\/Hunt3r0x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB", "description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.", "fork": false, "created_at": "2024-03-20T22:02:53Z", "updated_at": "2024-11-20T19:01:18Z", "pushed_at": "2024-03-21T15:50:45Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 779013491, "name": "cve-2021-31630", "full_name": "thewhiteh4t\/cve-2021-31630", "owner": { "login": "thewhiteh4t", "id": 36354846, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4", "html_url": "https:\/\/github.com\/thewhiteh4t", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630", "description": "Python script for exploiting command injection in Open PLC Webserver v3", "fork": false, "created_at": "2024-03-28T21:31:45Z", "updated_at": "2024-10-29T02:45:45Z", "pushed_at": "2024-07-12T00:16:13Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "openplc", "rce" ], "visibility": "public", "forks": 5, "watchers": 16, "score": 0, "subscribers_count": 2 }, { "id": 782064396, "name": "htb-wifinetictwo-exploit", "full_name": "behindsecurity\/htb-wifinetictwo-exploit", "owner": { "login": "behindsecurity", "id": 32421959, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32421959?v=4", "html_url": "https:\/\/github.com\/behindsecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/behindsecurity\/htb-wifinetictwo-exploit", "description": "A simple python script to exploit CVE-2021-31630 on HTB WifineticTwo CTF", "fork": false, "created_at": "2024-04-04T15:12:57Z", "updated_at": "2024-09-18T21:06:48Z", "pushed_at": "2024-04-04T16:29:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 786978803, "name": "CVE-2021-31630", "full_name": "mind2hex\/CVE-2021-31630", "owner": { "login": "mind2hex", "id": 51345640, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4", "html_url": "https:\/\/github.com\/mind2hex", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mind2hex\/CVE-2021-31630", "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.", "fork": false, "created_at": "2024-04-15T16:55:30Z", "updated_at": "2024-04-15T16:56:49Z", "pushed_at": "2024-04-15T17:07:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 800033894, "name": "CVE-2021-31630-PoC", "full_name": "sealldeveloper\/CVE-2021-31630-PoC", "owner": { "login": "sealldeveloper", "id": 120470330, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4", "html_url": "https:\/\/github.com\/sealldeveloper", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC", "description": "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary.", "fork": false, "created_at": "2024-05-13T15:17:38Z", "updated_at": "2024-05-13T15:21:58Z", "pushed_at": "2024-05-13T15:21:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 810053844, "name": "CVE-2021-31630", "full_name": "junnythemarksman\/CVE-2021-31630", "owner": { "login": "junnythemarksman", "id": 20056452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4", "html_url": "https:\/\/github.com\/junnythemarksman", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2021-31630", "description": "Modified the PoC CVE-2021-31630 script by Fellipe Oliveira for HTB ", "fork": false, "created_at": "2024-06-04T00:44:47Z", "updated_at": "2024-06-04T00:46:34Z", "pushed_at": "2024-06-04T00:46:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 818448931, "name": "cve-2021-31630", "full_name": "ttps-byte\/cve-2021-31630", "owner": { "login": "ttps-byte", "id": 76139191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4", "html_url": "https:\/\/github.com\/ttps-byte", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ttps-byte\/cve-2021-31630", "description": "This is a automation of cve-2021-31630 exploitation", "fork": false, "created_at": "2024-06-21T22:10:49Z", "updated_at": "2024-06-29T17:40:49Z", "pushed_at": "2024-06-29T17:40:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 833217533, "name": "CVE-2021-31630", "full_name": "manuelsantosiglesias\/CVE-2021-31630", "owner": { "login": "manuelsantosiglesias", "id": 29311335, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29311335?v=4", "html_url": "https:\/\/github.com\/manuelsantosiglesias", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/manuelsantosiglesias\/CVE-2021-31630", "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.", "fork": false, "created_at": "2024-07-24T15:28:47Z", "updated_at": "2024-07-24T16:22:41Z", "pushed_at": "2024-07-24T16:22:38Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 834167517, "name": "CVE-2021-31630", "full_name": "FlojBoj\/CVE-2021-31630", "owner": { "login": "FlojBoj", "id": 170850781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170850781?v=4", "html_url": "https:\/\/github.com\/FlojBoj", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FlojBoj\/CVE-2021-31630", "description": "POC Exploit for CVE-2021-31630 written in Python3 and using C reverse shell with non-blocking mode", "fork": false, "created_at": "2024-07-26T15:06:44Z", "updated_at": "2024-07-27T14:33:18Z", "pushed_at": "2024-07-27T14:33:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]