[ { "id": 488929451, "name": "CVE-2022-1388", "full_name": "numanturle\/CVE-2022-1388", "owner": { "login": "numanturle", "id": 7007951, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4", "html_url": "https:\/\/github.com\/numanturle" }, "html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388", "description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388", "fork": false, "created_at": "2022-05-05T10:35:35Z", "updated_at": "2024-03-23T06:00:36Z", "pushed_at": "2022-05-09T21:09:45Z", "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 54, "score": 0, "subscribers_count": 4 }, { "id": 489026843, "name": "CVE-2022-1388-checker", "full_name": "jheeree\/CVE-2022-1388-checker", "owner": { "login": "jheeree", "id": 19227591, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4", "html_url": "https:\/\/github.com\/jheeree" }, "html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker", "description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)", "fork": false, "created_at": "2022-05-05T15:25:53Z", "updated_at": "2024-01-11T02:27:17Z", "pushed_at": "2022-05-05T22:49:40Z", "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 12, "watchers": 24, "score": 0, "subscribers_count": 2 }, { "id": 489240417, "name": "Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed", "full_name": "MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed", "owner": { "login": "MrCl0wnLab", "id": 17049332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4", "html_url": "https:\/\/github.com\/MrCl0wnLab" }, "html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-CVE-2022-1388-BIG-IP-iControl-REST-Exposed", "description": "This vulnerability may allow an unauthenticated attacker with network access to the BIG-IP system through the management port and\/or self IP addresses to execute arbitrary system commands, create or delete files, or disable services. There is no data plane exposure; this is a control plane issue only.", "fork": false, "created_at": "2022-05-06T06:22:47Z", "updated_at": "2024-03-04T17:13:22Z", "pushed_at": "2022-05-06T15:33:14Z", "stargazers_count": 24, "watchers_count": 24, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bigip", "bigip-rest-api", "cve-2022-1388", "nuclei", "nuclei-detection", "nuclei-templates" ], "visibility": "public", "forks": 9, "watchers": 24, "score": 0, "subscribers_count": 2 }, { "id": 489669248, "name": "westone-CVE-2022-1388-scanner", "full_name": "Osyanina\/westone-CVE-2022-1388-scanner", "owner": { "login": "Osyanina", "id": 78467376, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78467376?v=4", "html_url": "https:\/\/github.com\/Osyanina" }, "html_url": "https:\/\/github.com\/Osyanina\/westone-CVE-2022-1388-scanner", "description": "A vulnerability scanner that detects CVE-2021-21980 vulnerabilities.", "fork": false, "created_at": "2022-05-07T12:36:41Z", "updated_at": "2022-05-07T12:37:01Z", "pushed_at": "2022-05-07T12:41:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 489745068, "name": "CVE-2022-1388-EXP", "full_name": "doocop\/CVE-2022-1388-EXP", "owner": { "login": "doocop", "id": 52679771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4", "html_url": "https:\/\/github.com\/doocop" }, "html_url": "https:\/\/github.com\/doocop\/CVE-2022-1388-EXP", "description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测", "fork": false, "created_at": "2022-05-07T17:54:08Z", "updated_at": "2024-01-29T17:31:43Z", "pushed_at": "2022-05-09T11:15:27Z", "stargazers_count": 94, "watchers_count": 94, "has_discussions": false, "forks_count": 24, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 24, "watchers": 94, "score": 0, "subscribers_count": 1 }, { "id": 489899447, "name": "CVE-2022-1388-RCE-checker-and-POC-Exploit", "full_name": "blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit", "owner": { "login": "blind-intruder", "id": 41877347, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4", "html_url": "https:\/\/github.com\/blind-intruder" }, "html_url": "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit", "description": null, "fork": false, "created_at": "2022-05-08T09:28:19Z", "updated_at": "2023-03-05T05:01:36Z", "pushed_at": "2022-05-12T11:46:56Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0, "subscribers_count": 2 }, { "id": 490120378, "name": "CVE-2022-1388", "full_name": "Hudi233\/CVE-2022-1388", "owner": { "login": "Hudi233", "id": 20939673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4", "html_url": "https:\/\/github.com\/Hudi233" }, "html_url": "https:\/\/github.com\/Hudi233\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-09T03:20:46Z", "updated_at": "2022-05-09T03:30:48Z", "pushed_at": "2022-05-09T03:35:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 490182003, "name": "CVE-2022-1388-Exploit-POC", "full_name": "sherlocksecurity\/CVE-2022-1388-Exploit-POC", "owner": { "login": "sherlocksecurity", "id": 52328067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4", "html_url": "https:\/\/github.com\/sherlocksecurity" }, "html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2022-1388-Exploit-POC", "description": "PoC for CVE-2022-1388_F5_BIG-IP", "fork": false, "created_at": "2022-05-09T07:39:55Z", "updated_at": "2024-01-24T11:19:45Z", "pushed_at": "2022-05-15T02:30:40Z", "stargazers_count": 61, "watchers_count": 61, "has_discussions": false, "forks_count": 15, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 15, "watchers": 61, "score": 0, "subscribers_count": 1 }, { "id": 490229104, "name": "CVE-2022-1388", "full_name": "yukar1z0e\/CVE-2022-1388", "owner": { "login": "yukar1z0e", "id": 44317939, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4", "html_url": "https:\/\/github.com\/yukar1z0e" }, "html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2022-1388", "description": "batch scan CVE-2022-1388", "fork": false, "created_at": "2022-05-09T10:06:11Z", "updated_at": "2022-08-16T11:10:19Z", "pushed_at": "2022-05-09T10:07:45Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490234251, "name": "CVE-2022-1388", "full_name": "0xf4n9x\/CVE-2022-1388", "owner": { "login": "0xf4n9x", "id": 40891670, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4", "html_url": "https:\/\/github.com\/0xf4n9x" }, "html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE", "fork": false, "created_at": "2022-05-09T10:22:31Z", "updated_at": "2024-01-29T17:31:43Z", "pushed_at": "2022-06-28T18:14:40Z", "stargazers_count": 86, "watchers_count": 86, "has_discussions": false, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 30, "watchers": 86, "score": 0, "subscribers_count": 2 }, { "id": 490237968, "name": "CVE-2022-1388_PoC", "full_name": "alt3kx\/CVE-2022-1388_PoC", "owner": { "login": "alt3kx", "id": 3140111, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4", "html_url": "https:\/\/github.com\/alt3kx" }, "html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-1388_PoC", "description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)", "fork": false, "created_at": "2022-05-09T10:34:38Z", "updated_at": "2024-02-25T20:44:22Z", "pushed_at": "2022-05-16T12:40:51Z", "stargazers_count": 89, "watchers_count": 89, "has_discussions": false, "forks_count": 20, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 20, "watchers": 89, "score": 0, "subscribers_count": 2 }, { "id": 490241404, "name": "F5-Big-IP-CVE-2022-1388", "full_name": "Vulnmachines\/F5-Big-IP-CVE-2022-1388", "owner": { "login": "Vulnmachines", "id": 79006904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4", "html_url": "https:\/\/github.com\/Vulnmachines" }, "html_url": "https:\/\/github.com\/Vulnmachines\/F5-Big-IP-CVE-2022-1388", "description": "CVE-2022-1388 F5 Big IP unauth remote code execution", "fork": false, "created_at": "2022-05-09T10:46:19Z", "updated_at": "2023-09-28T11:38:41Z", "pushed_at": "2022-07-26T05:18:58Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 490254474, "name": "F5-CVE-2022-1388-Exploit", "full_name": "ZephrFish\/F5-CVE-2022-1388-Exploit", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/F5-CVE-2022-1388-Exploit", "description": "Exploit and Check Script for CVE 2022-1388", "fork": false, "created_at": "2022-05-09T11:30:09Z", "updated_at": "2024-03-23T09:30:02Z", "pushed_at": "2022-05-26T23:51:01Z", "stargazers_count": 57, "watchers_count": 57, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 31, "watchers": 57, "score": 0, "subscribers_count": 3 }, { "id": 490259731, "name": "CVE-2022-1388", "full_name": "horizon3ai\/CVE-2022-1388", "owner": { "login": "horizon3ai", "id": 79593994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", "html_url": "https:\/\/github.com\/horizon3ai" }, "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-1388", "description": "POC for CVE-2022-1388", "fork": false, "created_at": "2022-05-09T11:46:45Z", "updated_at": "2024-03-24T21:44:02Z", "pushed_at": "2022-05-09T20:52:07Z", "stargazers_count": 235, "watchers_count": 235, "has_discussions": false, "forks_count": 41, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 41, "watchers": 235, "score": 0, "subscribers_count": 6 }, { "id": 490307613, "name": "CVE-2022-1388", "full_name": "Al1ex\/CVE-2022-1388", "owner": { "login": "Al1ex", "id": 38161463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4", "html_url": "https:\/\/github.com\/Al1ex" }, "html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE", "fork": false, "created_at": "2022-05-09T14:01:38Z", "updated_at": "2023-09-28T11:38:42Z", "pushed_at": "2022-05-09T14:20:40Z", "stargazers_count": 36, "watchers_count": 36, "has_discussions": false, "forks_count": 12, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "f5-big-ip-icontrol-rest-rce" ], "visibility": "public", "forks": 12, "watchers": 36, "score": 0, "subscribers_count": 1 }, { "id": 490307975, "name": "CVE-2022-1388", "full_name": "Henry4E36\/CVE-2022-1388", "owner": { "login": "Henry4E36", "id": 41940481, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4", "html_url": "https:\/\/github.com\/Henry4E36" }, "html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-1388", "description": "F5 BIG-IP iControl REST身份验证绕过漏洞", "fork": false, "created_at": "2022-05-09T14:02:34Z", "updated_at": "2024-01-29T17:31:44Z", "pushed_at": "2022-08-22T01:20:14Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 490321219, "name": "CVE-2022-1388", "full_name": "savior-only\/CVE-2022-1388", "owner": { "login": "savior-only", "id": 69495405, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4", "html_url": "https:\/\/github.com\/savior-only" }, "html_url": "https:\/\/github.com\/savior-only\/CVE-2022-1388", "description": "CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞", "fork": false, "created_at": "2022-05-09T14:37:04Z", "updated_at": "2022-05-09T14:39:16Z", "pushed_at": "2022-05-13T18:18:48Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 490339060, "name": "CVE-2022-1388", "full_name": "saucer-man\/CVE-2022-1388", "owner": { "login": "saucer-man", "id": 32133080, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32133080?v=4", "html_url": "https:\/\/github.com\/saucer-man" }, "html_url": "https:\/\/github.com\/saucer-man\/CVE-2022-1388", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-05-09T15:24:27Z", "updated_at": "2023-03-08T01:02:33Z", "pushed_at": "2022-05-09T16:14:49Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 490345813, "name": "CVE-2022-1388", "full_name": "superzerosec\/CVE-2022-1388", "owner": { "login": "superzerosec", "id": 57648217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4", "html_url": "https:\/\/github.com\/superzerosec" }, "html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-1388", "description": "CVE-2022-1388 POC exploit", "fork": false, "created_at": "2022-05-09T15:42:55Z", "updated_at": "2022-08-23T19:50:16Z", "pushed_at": "2022-05-10T04:53:23Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 490521216, "name": "Exploit-F5-CVE-2022-1388", "full_name": "Stonzyy\/Exploit-F5-CVE-2022-1388", "owner": { "login": "Stonzyy", "id": 33039121, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33039121?v=4", "html_url": "https:\/\/github.com\/Stonzyy" }, "html_url": "https:\/\/github.com\/Stonzyy\/Exploit-F5-CVE-2022-1388", "description": "PoC For F5 BIG-IP - bash script Exploit one Liner", "fork": false, "created_at": "2022-05-10T02:57:31Z", "updated_at": "2024-01-26T09:41:01Z", "pushed_at": "2022-05-10T08:38:58Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 490537604, "name": "Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "full_name": "MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "owner": { "login": "MrCl0wnLab", "id": 17049332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4", "html_url": "https:\/\/github.com\/MrCl0wnLab" }, "html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter", "description": "CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IP’s iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.", "fork": false, "created_at": "2022-05-10T04:10:46Z", "updated_at": "2023-10-21T05:24:43Z", "pushed_at": "2022-05-12T17:06:29Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bigip", "bigip-rest-api", "cve-2022-1388", "exploit", "f5-bigip", "nuclei", "nuclei-templates" ], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 490544324, "name": "F5-BigIP-CVE-2022-1388", "full_name": "qusaialhaddad\/F5-BigIP-CVE-2022-1388", "owner": { "login": "qusaialhaddad", "id": 9527146, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9527146?v=4", "html_url": "https:\/\/github.com\/qusaialhaddad" }, "html_url": "https:\/\/github.com\/qusaialhaddad\/F5-BigIP-CVE-2022-1388", "description": "Reverse Shell for CVE-2022-1388", "fork": false, "created_at": "2022-05-10T04:44:05Z", "updated_at": "2023-09-28T11:38:42Z", "pushed_at": "2022-05-10T05:00:43Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 490545813, "name": "CVE-2022-1388", "full_name": "chesterblue\/CVE-2022-1388", "owner": { "login": "chesterblue", "id": 38368702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38368702?v=4", "html_url": "https:\/\/github.com\/chesterblue" }, "html_url": "https:\/\/github.com\/chesterblue\/CVE-2022-1388", "description": "POC of CVE-2022-1388", "fork": false, "created_at": "2022-05-10T04:51:06Z", "updated_at": "2022-05-10T05:01:29Z", "pushed_at": "2022-05-10T04:58:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490554565, "name": "F5-BIG-IP-RCE-CVE-2022-1388", "full_name": "Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388", "owner": { "login": "Angus-Team", "id": 103045627, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103045627?v=4", "html_url": "https:\/\/github.com\/Angus-Team" }, "html_url": "https:\/\/github.com\/Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-10T05:30:11Z", "updated_at": "2023-09-28T11:38:43Z", "pushed_at": "2022-05-10T05:35:23Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 490601730, "name": "CVE-2022-1388-EXP", "full_name": "LinJacck\/CVE-2022-1388-EXP", "owner": { "login": "LinJacck", "id": 57176639, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57176639?v=4", "html_url": "https:\/\/github.com\/LinJacck" }, "html_url": "https:\/\/github.com\/LinJacck\/CVE-2022-1388-EXP", "description": "CVE-2022-1388-EXP可批量实现攻击", "fork": false, "created_at": "2022-05-10T08:09:30Z", "updated_at": "2022-08-15T15:42:24Z", "pushed_at": "2022-05-10T08:14:49Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490606277, "name": "cve-2022-1388-1veresk", "full_name": "iveresk\/cve-2022-1388-1veresk", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-1veresk", "description": "Simple shell script for the exploit", "fork": false, "created_at": "2022-05-10T08:22:46Z", "updated_at": "2022-12-20T12:13:57Z", "pushed_at": "2022-05-24T12:39:02Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490613608, "name": "CVE-2022-1388", "full_name": "shamo0\/CVE-2022-1388", "owner": { "login": "shamo0", "id": 48299520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", "html_url": "https:\/\/github.com\/shamo0" }, "html_url": "https:\/\/github.com\/shamo0\/CVE-2022-1388", "description": "BIG-IP iControl REST vulnerability CVE-2022-1388 PoC", "fork": false, "created_at": "2022-05-10T08:44:24Z", "updated_at": "2023-03-10T12:12:32Z", "pushed_at": "2022-05-10T09:09:23Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "1388", "2022", "bash", "bigip", "cve", "cve-2022-1388", "exploit", "f5", "icontrol", "python", "rest", "script", "shell", "vulnerabilit" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490623250, "name": "CVE-2022-1388-F5-BIG-IP", "full_name": "vesperp\/CVE-2022-1388-F5-BIG-IP", "owner": { "login": "vesperp", "id": 28191544, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4", "html_url": "https:\/\/github.com\/vesperp" }, "html_url": "https:\/\/github.com\/vesperp\/CVE-2022-1388-F5-BIG-IP", "description": null, "fork": false, "created_at": "2022-05-10T09:12:22Z", "updated_at": "2022-05-18T08:46:17Z", "pushed_at": "2022-05-18T08:32:27Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 490752282, "name": "CVE-2022-1388-Exploit", "full_name": "thatonesecguy\/CVE-2022-1388-Exploit", "owner": { "login": "thatonesecguy", "id": 34110198, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4", "html_url": "https:\/\/github.com\/thatonesecguy" }, "html_url": "https:\/\/github.com\/thatonesecguy\/CVE-2022-1388-Exploit", "description": "Test and Exploit Scripts for CVE 2022-1388 (F5 Big-IP)", "fork": false, "created_at": "2022-05-10T15:16:12Z", "updated_at": "2023-09-28T11:38:43Z", "pushed_at": "2022-05-10T15:28:13Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 490758825, "name": "CVE2022-1388_TestAPI", "full_name": "bandit92\/CVE2022-1388_TestAPI", "owner": { "login": "bandit92", "id": 11216382, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11216382?v=4", "html_url": "https:\/\/github.com\/bandit92" }, "html_url": "https:\/\/github.com\/bandit92\/CVE2022-1388_TestAPI", "description": "A Test API for testing the POC against CVE-2022-1388", "fork": false, "created_at": "2022-05-10T15:34:14Z", "updated_at": "2022-05-26T21:22:13Z", "pushed_at": "2022-05-10T15:37:42Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 490762622, "name": "CVE-2022-1388-PocExp", "full_name": "0x7eTeam\/CVE-2022-1388-PocExp", "owner": { "login": "0x7eTeam", "id": 96908273, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96908273?v=4", "html_url": "https:\/\/github.com\/0x7eTeam" }, "html_url": "https:\/\/github.com\/0x7eTeam\/CVE-2022-1388-PocExp", "description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation", "fork": false, "created_at": "2022-05-10T15:44:50Z", "updated_at": "2023-09-28T11:38:43Z", "pushed_at": "2022-05-16T14:02:29Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 490856318, "name": "CVE-2022-1388", "full_name": "0xAgun\/CVE-2022-1388", "owner": { "login": "0xAgun", "id": 78228966, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4", "html_url": "https:\/\/github.com\/0xAgun" }, "html_url": "https:\/\/github.com\/0xAgun\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-10T20:49:12Z", "updated_at": "2023-09-28T11:38:44Z", "pushed_at": "2022-05-14T15:01:16Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 491215019, "name": "CVE-2022-1388-Scanner", "full_name": "AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner", "owner": { "login": "AmirHoseinTangsiriNET", "id": 64230943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64230943?v=4", "html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET" }, "html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner", "description": null, "fork": false, "created_at": "2022-05-11T17:43:44Z", "updated_at": "2024-01-18T07:21:27Z", "pushed_at": "2022-05-27T11:27:32Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 491248239, "name": "CVE-2022-1388", "full_name": "EvilLizard666\/CVE-2022-1388", "owner": { "login": "EvilLizard666", "id": 46286364, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46286364?v=4", "html_url": "https:\/\/github.com\/EvilLizard666" }, "html_url": "https:\/\/github.com\/EvilLizard666\/CVE-2022-1388", "description": "CVE-2022-1388 Scanner", "fork": false, "created_at": "2022-05-11T19:33:37Z", "updated_at": "2024-03-23T10:55:01Z", "pushed_at": "2023-01-22T02:08:58Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 491258779, "name": "CVE-2022-1388", "full_name": "mr-vill4in\/CVE-2022-1388", "owner": { "login": "mr-vill4in", "id": 51061936, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4", "html_url": "https:\/\/github.com\/mr-vill4in" }, "html_url": "https:\/\/github.com\/mr-vill4in\/CVE-2022-1388", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-05-11T20:13:09Z", "updated_at": "2022-10-07T18:14:59Z", "pushed_at": "2022-05-11T20:15:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 491262541, "name": "CVE-2022-1388", "full_name": "omnigodz\/CVE-2022-1388", "owner": { "login": "omnigodz", "id": 20488509, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20488509?v=4", "html_url": "https:\/\/github.com\/omnigodz" }, "html_url": "https:\/\/github.com\/omnigodz\/CVE-2022-1388", "description": "This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) ", "fork": false, "created_at": "2022-05-11T20:27:36Z", "updated_at": "2022-05-11T20:27:59Z", "pushed_at": "2022-06-08T13:57:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 491283164, "name": "CVE-2022-1388", "full_name": "pauloink\/CVE-2022-1388", "owner": { "login": "pauloink", "id": 64289774, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64289774?v=4", "html_url": "https:\/\/github.com\/pauloink" }, "html_url": "https:\/\/github.com\/pauloink\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-11T21:55:43Z", "updated_at": "2023-09-28T11:38:46Z", "pushed_at": "2022-05-11T22:00:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 491500644, "name": "CVE-2022-1388", "full_name": "SecTheBit\/CVE-2022-1388", "owner": { "login": "SecTheBit", "id": 46895441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46895441?v=4", "html_url": "https:\/\/github.com\/SecTheBit" }, "html_url": "https:\/\/github.com\/SecTheBit\/CVE-2022-1388", "description": "Nuclei Template for CVE-2022-1388", "fork": false, "created_at": "2022-05-12T12:17:11Z", "updated_at": "2022-05-13T06:43:45Z", "pushed_at": "2022-05-12T12:32:38Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 491598048, "name": "CVE-2022-1388", "full_name": "Zeyad-Azima\/CVE-2022-1388", "owner": { "login": "Zeyad-Azima", "id": 62406753, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4", "html_url": "https:\/\/github.com\/Zeyad-Azima" }, "html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2022-1388", "description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB", "fork": false, "created_at": "2022-05-12T16:54:52Z", "updated_at": "2023-09-28T11:38:46Z", "pushed_at": "2023-05-11T02:55:01Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2022-1388", "exploit", "f5", "f5-bigip", "icontrol", "rest-api" ], "visibility": "public", "forks": 5, "watchers": 11, "score": 0, "subscribers_count": 2 }, { "id": 491851727, "name": "CVE-2022-1388", "full_name": "justakazh\/CVE-2022-1388", "owner": { "login": "justakazh", "id": 36891477, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4", "html_url": "https:\/\/github.com\/justakazh" }, "html_url": "https:\/\/github.com\/justakazh\/CVE-2022-1388", "description": "Tool for CVE-2022-1388 ", "fork": false, "created_at": "2022-05-13T10:18:29Z", "updated_at": "2023-09-28T11:38:47Z", "pushed_at": "2022-05-13T10:22:08Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "automation", "cve", "cve-2022-1388", "exploit", "tools" ], "visibility": "public", "forks": 4, "watchers": 14, "score": 0, "subscribers_count": 3 }, { "id": 492382276, "name": "CVE-2022-1388-POC", "full_name": "PsychoSec2\/CVE-2022-1388-POC", "owner": { "login": "PsychoSec2", "id": 102695468, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102695468?v=4", "html_url": "https:\/\/github.com\/PsychoSec2" }, "html_url": "https:\/\/github.com\/PsychoSec2\/CVE-2022-1388-POC", "description": "An Improved Proof of Concept for CVE-2022-1388 w\/ an Interactive Shell", "fork": false, "created_at": "2022-05-15T03:58:21Z", "updated_at": "2023-10-18T22:22:53Z", "pushed_at": "2022-05-15T16:34:54Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 14, "score": 0, "subscribers_count": 1 }, { "id": 492435532, "name": "cve-2022-1388-iveresk-command-shell", "full_name": "iveresk\/cve-2022-1388-iveresk-command-shell", "owner": { "login": "iveresk", "id": 28754633, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4", "html_url": "https:\/\/github.com\/iveresk" }, "html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-iveresk-command-shell", "description": "Improved POC for CVE-2022-1388 that affects multiple F5 products.", "fork": false, "created_at": "2022-05-15T08:58:22Z", "updated_at": "2022-05-18T05:53:50Z", "pushed_at": "2022-05-24T12:39:26Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 492651669, "name": "CVE-2022-1388", "full_name": "Wrin9\/CVE-2022-1388", "owner": { "login": "Wrin9", "id": 54984589, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4", "html_url": "https:\/\/github.com\/Wrin9" }, "html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-05-16T01:49:44Z", "updated_at": "2023-09-28T11:38:51Z", "pushed_at": "2022-05-16T01:52:19Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 493209789, "name": "CVE-2022-1388-rs", "full_name": "aancw\/CVE-2022-1388-rs", "owner": { "login": "aancw", "id": 6284204, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6284204?v=4", "html_url": "https:\/\/github.com\/aancw" }, "html_url": "https:\/\/github.com\/aancw\/CVE-2022-1388-rs", "description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust", "fork": false, "created_at": "2022-05-17T10:51:39Z", "updated_at": "2022-07-04T19:12:27Z", "pushed_at": "2022-06-01T09:09:07Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 497326298, "name": "F5-BIG-IP-POC", "full_name": "west9b\/F5-BIG-IP-POC", "owner": { "login": "west9b", "id": 103512651, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4", "html_url": "https:\/\/github.com\/west9b" }, "html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC", "description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合", "fork": false, "created_at": "2022-05-28T13:30:22Z", "updated_at": "2023-09-13T08:48:13Z", "pushed_at": "2022-07-30T00:16:29Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 11, "score": 0, "subscribers_count": 2 }, { "id": 499893663, "name": "F5-BIG-IP-exploit", "full_name": "sashka3076\/F5-BIG-IP-exploit", "owner": { "login": "sashka3076", "id": 76051636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76051636?v=4", "html_url": "https:\/\/github.com\/sashka3076" }, "html_url": "https:\/\/github.com\/sashka3076\/F5-BIG-IP-exploit", "description": "CVE-2022-1388", "fork": false, "created_at": "2022-06-04T17:30:04Z", "updated_at": "2022-05-17T03:24:54Z", "pushed_at": "2022-05-17T10:45:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 505672326, "name": "CVE-2022-1388", "full_name": "li8u99\/CVE-2022-1388", "owner": { "login": "li8u99", "id": 37184853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37184853?v=4", "html_url": "https:\/\/github.com\/li8u99" }, "html_url": "https:\/\/github.com\/li8u99\/CVE-2022-1388", "description": "CVE-2022-1388 | F5 - Big IP Pre Auth RCE via '\/mgmt\/tm\/util\/bash' endpoint", "fork": false, "created_at": "2022-06-21T03:09:26Z", "updated_at": "2022-06-20T05:14:08Z", "pushed_at": "2022-06-20T02:00:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 506835397, "name": "Mass-CVE-2022-1388", "full_name": "electr0lulz\/Mass-CVE-2022-1388", "owner": { "login": "electr0lulz", "id": 106660834, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106660834?v=4", "html_url": "https:\/\/github.com\/electr0lulz" }, "html_url": "https:\/\/github.com\/electr0lulz\/Mass-CVE-2022-1388", "description": "Mass-Exploit-CVE-2022-1388", "fork": false, "created_at": "2022-06-24T00:58:37Z", "updated_at": "2022-07-12T08:48:37Z", "pushed_at": "2022-06-24T01:30:40Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "1388", "bash", "big-ip", "cve", "cve-2022-1388", "f5", "f5-bigip", "f5networks", "python", "shodan" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 509548569, "name": "CVE-2022-1388_refresh", "full_name": "Luchoane\/CVE-2022-1388_refresh", "owner": { "login": "Luchoane", "id": 40374879, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4", "html_url": "https:\/\/github.com\/Luchoane" }, "html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh", "description": "PoC for exploiting CVE-2022-1388 on BIG IP F5", "fork": false, "created_at": "2022-07-01T18:08:50Z", "updated_at": "2022-07-07T19:22:09Z", "pushed_at": "2022-07-01T20:04:27Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 510239425, "name": "CVE-2022-1388", "full_name": "jbharucha05\/CVE-2022-1388", "owner": { "login": "jbharucha05", "id": 13020621, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4", "html_url": "https:\/\/github.com\/jbharucha05" }, "html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388", "description": "CVE-2022-1388, bypassing iControl REST authentication", "fork": false, "created_at": "2022-07-04T06:31:56Z", "updated_at": "2022-07-04T07:08:22Z", "pushed_at": "2022-07-04T10:37:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "f5-big-ip-icontrol-rest-rce", "f5-bigip" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 557286411, "name": "CVE-2022-1388", "full_name": "On-Cyber-War\/CVE-2022-1388", "owner": { "login": "On-Cyber-War", "id": 114944421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114944421?v=4", "html_url": "https:\/\/github.com\/On-Cyber-War" }, "html_url": "https:\/\/github.com\/On-Cyber-War\/CVE-2022-1388", "description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE", "fork": false, "created_at": "2022-10-25T12:15:31Z", "updated_at": "2022-10-25T12:15:31Z", "pushed_at": "2022-10-25T12:23:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 557293075, "name": "CVE-2022-1388", "full_name": "OnCyberWar\/CVE-2022-1388", "owner": { "login": "OnCyberWar", "id": 61333042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61333042?v=4", "html_url": "https:\/\/github.com\/OnCyberWar" }, "html_url": "https:\/\/github.com\/OnCyberWar\/CVE-2022-1388", "description": "cURL one-liner to test for CVE-2022-1388 BIG-IP iControl REST RCE", "fork": false, "created_at": "2022-10-25T12:29:54Z", "updated_at": "2023-08-14T21:05:37Z", "pushed_at": "2023-05-19T05:55:52Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 572343924, "name": "CVE-2022-1388", "full_name": "revanmalang\/CVE-2022-1388", "owner": { "login": "revanmalang", "id": 91707288, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91707288?v=4", "html_url": "https:\/\/github.com\/revanmalang" }, "html_url": "https:\/\/github.com\/revanmalang\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-11-30T04:06:56Z", "updated_at": "2022-12-16T12:56:47Z", "pushed_at": "2022-11-30T04:07:51Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 575059061, "name": "CVE-2022-1388", "full_name": "amitlttwo\/CVE-2022-1388", "owner": { "login": "amitlttwo", "id": 55759090, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55759090?v=4", "html_url": "https:\/\/github.com\/amitlttwo" }, "html_url": "https:\/\/github.com\/amitlttwo\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-12-06T16:59:56Z", "updated_at": "2023-02-07T11:10:10Z", "pushed_at": "2023-02-07T11:02:37Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 576167094, "name": "CVE-2022-1388", "full_name": "M4fiaB0y\/CVE-2022-1388", "owner": { "login": "M4fiaB0y", "id": 95071636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95071636?v=4", "html_url": "https:\/\/github.com\/M4fiaB0y" }, "html_url": "https:\/\/github.com\/M4fiaB0y\/CVE-2022-1388", "description": "Scan IP ranges for IP's vulnerable to the F5 Big IP exploit (CVE-2022-1388)", "fork": false, "created_at": "2022-12-09T06:51:21Z", "updated_at": "2022-12-09T06:52:56Z", "pushed_at": "2022-12-09T06:51:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 580855703, "name": "CVE-2022-1388", "full_name": "devengpk\/CVE-2022-1388", "owner": { "login": "devengpk", "id": 41437020, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41437020?v=4", "html_url": "https:\/\/github.com\/devengpk" }, "html_url": "https:\/\/github.com\/devengpk\/CVE-2022-1388", "description": null, "fork": false, "created_at": "2022-12-21T16:11:48Z", "updated_at": "2023-07-06T22:42:46Z", "pushed_at": "2022-12-21T17:35:41Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 581717116, "name": "CVE-2022-1388", "full_name": "vaelwolf\/CVE-2022-1388", "owner": { "login": "vaelwolf", "id": 58718722, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58718722?v=4", "html_url": "https:\/\/github.com\/vaelwolf" }, "html_url": "https:\/\/github.com\/vaelwolf\/CVE-2022-1388", "description": "-- FOR EDUCATIONAL USE ONLY -- Proof-of-Concept RCE for CVE-2022-1388, plus some added functionality for blue and red teams", "fork": false, "created_at": "2022-12-24T03:59:24Z", "updated_at": "2023-02-09T11:25:05Z", "pushed_at": "2022-12-25T02:43:04Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "exploit", "pcap", "reverse-shell" ], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 627124485, "name": "tippa-my-tongue", "full_name": "j-baines\/tippa-my-tongue", "owner": { "login": "j-baines", "id": 113205286, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113205286?v=4", "html_url": "https:\/\/github.com\/j-baines" }, "html_url": "https:\/\/github.com\/j-baines\/tippa-my-tongue", "description": "F5 BIG-IP Exploit Using CVE-2022-1388 and CVE-2022-41800", "fork": false, "created_at": "2023-04-12T20:46:03Z", "updated_at": "2023-04-14T17:24:44Z", "pushed_at": "2023-04-12T21:03:44Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2022-1388", "cve-2022-41800" ], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 665620716, "name": "F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study", "full_name": "SudeepaShiranthaka\/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study", "owner": { "login": "SudeepaShiranthaka", "id": 58376903, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58376903?v=4", "html_url": "https:\/\/github.com\/SudeepaShiranthaka" }, "html_url": "https:\/\/github.com\/SudeepaShiranthaka\/F5-BIG-IP-Remote-Code-Execution-Vulnerability-CVE-2022-1388-A-Case-Study", "description": "F5-BIG-IP Remote Code Execution Vulnerability CVE-2022-1388: A Case Study", "fork": false, "created_at": "2023-07-12T15:53:33Z", "updated_at": "2023-07-12T15:53:34Z", "pushed_at": "2023-07-12T15:54:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 673481578, "name": "refresh", "full_name": "battleofthebots\/refresh", "owner": { "login": "battleofthebots", "id": 122462368, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122462368?v=4", "html_url": "https:\/\/github.com\/battleofthebots" }, "html_url": "https:\/\/github.com\/battleofthebots\/refresh", "description": "CVE-2022-1388 - F5 Router RCE Replica", "fork": false, "created_at": "2023-08-01T18:12:52Z", "updated_at": "2023-10-16T10:21:39Z", "pushed_at": "2023-10-11T22:07:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 738523749, "name": "CVE-2022-1388-exploit", "full_name": "nvk0x\/CVE-2022-1388-exploit", "owner": { "login": "nvk0x", "id": 22233431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22233431?v=4", "html_url": "https:\/\/github.com\/nvk0x" }, "html_url": "https:\/\/github.com\/nvk0x\/CVE-2022-1388-exploit", "description": "exploit poc", "fork": false, "created_at": "2024-01-03T12:28:06Z", "updated_at": "2024-01-09T07:31:14Z", "pushed_at": "2024-01-03T12:28:54Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 741149336, "name": "CVE-2022-1388", "full_name": "nico989\/CVE-2022-1388", "owner": { "login": "nico989", "id": 55981787, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55981787?v=4", "html_url": "https:\/\/github.com\/nico989" }, "html_url": "https:\/\/github.com\/nico989\/CVE-2022-1388", "description": "PoC for CVE-2022-1388 affecting F5 BIG-IP.", "fork": false, "created_at": "2024-01-09T19:52:36Z", "updated_at": "2024-03-23T10:44:09Z", "pushed_at": "2024-01-12T22:42:14Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 } ]