[ { "id": 252131233, "name": "exphub", "full_name": "zhzyker\/exphub", "owner": { "login": "zhzyker", "id": 32918050, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32918050?v=4", "html_url": "https:\/\/github.com\/zhzyker" }, "html_url": "https:\/\/github.com\/zhzyker\/exphub", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", "updated_at": "2021-03-05T01:20:34Z", "pushed_at": "2020-11-07T05:55:00Z", "stargazers_count": 2364, "watchers_count": 2364, "forks_count": 672, "forks": 672, "watchers": 2364, "score": 0 }, { "id": 307998445, "name": "CVE-2020-14882", "full_name": "jas502n\/CVE-2020-14882", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882", "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", "updated_at": "2021-03-05T00:53:54Z", "pushed_at": "2020-11-16T04:23:09Z", "stargazers_count": 212, "watchers_count": 212, "forks_count": 43, "forks": 43, "watchers": 212, "score": 0 }, { "id": 308145197, "name": "CVE-2020-14882", "full_name": "s1kr10s\/CVE-2020-14882", "owner": { "login": "s1kr10s", "id": 5374475, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5374475?v=4", "html_url": "https:\/\/github.com\/s1kr10s" }, "html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882", "description": "CVE-2020–14882 by Jang", "fork": false, "created_at": "2020-10-28T21:28:12Z", "updated_at": "2021-02-24T06:37:09Z", "pushed_at": "2020-10-29T03:57:09Z", "stargazers_count": 27, "watchers_count": 27, "forks_count": 19, "forks": 19, "watchers": 27, "score": 0 }, { "id": 308184758, "name": "-Patched-McMaster-University-Blind-Command-Injection", "full_name": "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", "owner": { "login": "Umarovm", "id": 25722145, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25722145?v=4", "html_url": "https:\/\/github.com\/Umarovm" }, "html_url": "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", "description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.", "fork": false, "created_at": "2020-10-29T01:28:41Z", "updated_at": "2020-12-04T02:16:03Z", "pushed_at": "2020-12-04T02:16:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308238126, "name": "CVE-2020-14882", "full_name": "RedTeamWing\/CVE-2020-14882", "owner": { "login": "RedTeamWing", "id": 25416365, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25416365?v=4", "html_url": "https:\/\/github.com\/RedTeamWing" }, "html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882", "description": "CVE-2020-14882 Weblogic-Exp", "fork": false, "created_at": "2020-10-29T06:30:30Z", "updated_at": "2020-12-22T09:47:47Z", "pushed_at": "2020-10-29T06:36:01Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 8, "forks": 8, "watchers": 14, "score": 0 }, { "id": 308343789, "name": "cve-2020-14882", "full_name": "0thm4n3\/cve-2020-14882", "owner": { "login": "0thm4n3", "id": 12746014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12746014?v=4", "html_url": "https:\/\/github.com\/0thm4n3" }, "html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882", "description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882", "fork": false, "created_at": "2020-10-29T13:53:31Z", "updated_at": "2020-10-31T13:03:28Z", "pushed_at": "2020-10-31T13:03:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 308374913, "name": "cve-2020-14882", "full_name": "wsfengfan\/cve-2020-14882", "owner": { "login": "wsfengfan", "id": 33821840, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33821840?v=4", "html_url": "https:\/\/github.com\/wsfengfan" }, "html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882", "description": "CVE-2020-14882 EXP 回显", "fork": false, "created_at": "2020-10-29T15:44:23Z", "updated_at": "2020-12-06T17:09:24Z", "pushed_at": "2020-11-09T09:55:10Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, "forks": 2, "watchers": 3, "score": 0 }, { "id": 308605927, "name": "CVE-2020-14882", "full_name": "alexfrancow\/CVE-2020-14882", "owner": { "login": "alexfrancow", "id": 23419929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23419929?v=4", "html_url": "https:\/\/github.com\/alexfrancow" }, "html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-10-30T11:07:11Z", "updated_at": "2020-10-31T15:57:21Z", "pushed_at": "2020-10-31T15:57:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 308716809, "name": "CVE-2020-14882", "full_name": "sickwell\/CVE-2020-14882", "owner": { "login": "sickwell", "id": 32671944, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32671944?v=4", "html_url": "https:\/\/github.com\/sickwell" }, "html_url": "https:\/\/github.com\/sickwell\/CVE-2020-14882", "description": "PoC for CVE-2020-14882", "fork": false, "created_at": "2020-10-30T18:46:34Z", "updated_at": "2020-10-30T18:46:34Z", "pushed_at": "2020-10-30T18:46:35Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308782228, "name": "CVE-2020-14882_POC", "full_name": "GGyao\/CVE-2020-14882_POC", "owner": { "login": "GGyao", "id": 38530938, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4", "html_url": "https:\/\/github.com\/GGyao" }, "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC", "description": "CVE-2020-14882批量验证工具。", "fork": false, "created_at": "2020-10-31T01:43:54Z", "updated_at": "2020-12-01T05:05:26Z", "pushed_at": "2020-12-01T05:05:24Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 1, "forks": 1, "watchers": 11, "score": 0 }, { "id": 309098912, "name": "Weblogic_Unauthorized-bypass-RCE", "full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev" }, "html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script", "fork": false, "created_at": "2020-11-01T13:12:27Z", "updated_at": "2020-11-24T16:16:12Z", "pushed_at": "2020-11-01T13:56:48Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "forks": 1, "watchers": 2, "score": 0 }, { "id": 309655403, "name": "CVE-2020-14882_ALL", "full_name": "GGyao\/CVE-2020-14882_ALL", "owner": { "login": "GGyao", "id": 38530938, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38530938?v=4", "html_url": "https:\/\/github.com\/GGyao" }, "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL", "description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。", "fork": false, "created_at": "2020-11-03T10:49:35Z", "updated_at": "2021-03-01T03:09:16Z", "pushed_at": "2020-12-01T05:08:41Z", "stargazers_count": 74, "watchers_count": 74, "forks_count": 18, "forks": 18, "watchers": 74, "score": 0 }, { "id": 309666360, "name": "CVE-2020-14882-checker", "full_name": "ovProphet\/CVE-2020-14882-checker", "owner": { "login": "ovProphet", "id": 12277617, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12277617?v=4", "html_url": "https:\/\/github.com\/ovProphet" }, "html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker", "description": "CVE-2020-14882 detection script", "fork": false, "created_at": "2020-11-03T11:34:38Z", "updated_at": "2020-11-03T11:42:04Z", "pushed_at": "2020-11-03T11:34:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 309868259, "name": "CVE-2020-14882", "full_name": "NS-Sp4ce\/CVE-2020-14882", "owner": { "login": "NS-Sp4ce", "id": 33349032, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33349032?v=4", "html_url": "https:\/\/github.com\/NS-Sp4ce" }, "html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882", "description": "CVE-2020-14882\/14883\/14750", "fork": false, "created_at": "2020-11-04T03:09:13Z", "updated_at": "2021-01-19T07:12:06Z", "pushed_at": "2020-11-04T03:15:33Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 1, "forks": 1, "watchers": 11, "score": 0 }, { "id": 310303375, "name": "cve-2020-14882", "full_name": "mmioimm\/cve-2020-14882", "owner": { "login": "mmioimm", "id": 19258899, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19258899?v=4", "html_url": "https:\/\/github.com\/mmioimm" }, "html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882", "description": null, "fork": false, "created_at": "2020-11-05T13:12:28Z", "updated_at": "2021-01-29T03:18:00Z", "pushed_at": "2020-11-05T13:14:57Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 311265070, "name": "CVE-2020-14882", "full_name": "QmF0c3UK\/CVE-2020-14882", "owner": { "login": "QmF0c3UK", "id": 29447678, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29447678?v=4", "html_url": "https:\/\/github.com\/QmF0c3UK" }, "html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-09T08:03:44Z", "updated_at": "2021-02-25T04:22:24Z", "pushed_at": "2020-11-12T06:23:23Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 3, "forks": 3, "watchers": 7, "score": 0 }, { "id": 311340226, "name": "CVE-2020-14882", "full_name": "murataydemir\/CVE-2020-14882", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-14882", "description": "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass", "fork": false, "created_at": "2020-11-09T13:02:43Z", "updated_at": "2021-01-24T17:06:42Z", "pushed_at": "2020-11-09T16:35:39Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "forks": 1, "watchers": 2, "score": 0 }, { "id": 311887487, "name": "CVE-2020-14882-GUI-Test", "full_name": "AirEvan\/CVE-2020-14882-GUI-Test", "owner": { "login": "AirEvan", "id": 26640179, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26640179?v=4", "html_url": "https:\/\/github.com\/AirEvan" }, "html_url": "https:\/\/github.com\/AirEvan\/CVE-2020-14882-GUI-Test", "description": "基于qt的图形化CVE-2020-14882漏洞回显测试工具.", "fork": false, "created_at": "2020-11-11T06:52:32Z", "updated_at": "2020-11-11T07:22:06Z", "pushed_at": "2020-11-11T07:19:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 312193698, "name": "CVE-2020-14882-weblogicRCE", "full_name": "corelight\/CVE-2020-14882-weblogicRCE", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE", "description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750", "fork": false, "created_at": "2020-11-12T06:59:54Z", "updated_at": "2020-12-02T21:43:55Z", "pushed_at": "2020-12-02T21:43:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "forks": 2, "watchers": 0, "score": 0 }, { "id": 312256179, "name": "CVE-2020-14882", "full_name": "x51\/CVE-2020-14882", "owner": { "login": "x51", "id": 45651912, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45651912?v=4", "html_url": "https:\/\/github.com\/x51" }, "html_url": "https:\/\/github.com\/x51\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-12T11:27:39Z", "updated_at": "2020-11-16T14:43:25Z", "pushed_at": "2020-11-13T03:35:44Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 313643357, "name": "CVE-2020-14882", "full_name": "BabyTeam1024\/CVE-2020-14882", "owner": { "login": "BabyTeam1024", "id": 74447452, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74447452?v=4", "html_url": "https:\/\/github.com\/BabyTeam1024" }, "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-17T14:23:23Z", "updated_at": "2020-11-17T14:23:23Z", "pushed_at": "2020-11-17T14:23:24Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 325240057, "name": "CodeTest", "full_name": "xkx518\/CodeTest", "owner": { "login": "xkx518", "id": 49984697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49984697?v=4", "html_url": "https:\/\/github.com\/xkx518" }, "html_url": "https:\/\/github.com\/xkx518\/CodeTest", "description": "CodeTest信息收集和漏洞利用工具,可在进行渗透测试之时方便利用相关信息收集脚本进行信息的获取和验证工作,漏洞利用模块可选择需要测试的漏洞模块,或者选择所有模块测试,包含CVE-2020-14882, CVE-2020-2555等,可自己收集脚本后按照模板进行修改。", "fork": false, "created_at": "2020-12-29T09:11:31Z", "updated_at": "2021-01-25T08:54:10Z", "pushed_at": "2021-01-25T07:54:23Z", "stargazers_count": 22, "watchers_count": 22, "forks_count": 5, "forks": 5, "watchers": 22, "score": 0 }, { "id": 329870299, "name": "poc", "full_name": "securitysqs\/poc", "owner": { "login": "securitysqs", "id": 66762242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66762242?v=4", "html_url": "https:\/\/github.com\/securitysqs" }, "html_url": "https:\/\/github.com\/securitysqs\/poc", "description": "CVE-2020-14882", "fork": false, "created_at": "2021-01-15T09:44:35Z", "updated_at": "2021-01-15T09:57:01Z", "pushed_at": "2021-01-15T09:56:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 333326000, "name": "CVE-2020-14882", "full_name": "ShmilySec\/CVE-2020-14882", "owner": { "login": "ShmilySec", "id": 26423638, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26423638?v=4", "html_url": "https:\/\/github.com\/ShmilySec" }, "html_url": "https:\/\/github.com\/ShmilySec\/CVE-2020-14882", "description": "CVE-2020-14882部署冰蝎内存马", "fork": false, "created_at": "2021-01-27T06:29:52Z", "updated_at": "2021-01-27T06:32:10Z", "pushed_at": "2021-01-27T06:31:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 334149882, "name": "CVE-2020-14882-WebLogic", "full_name": "pwn3z\/CVE-2020-14882-WebLogic", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2020-14882-WebLogic", "description": null, "fork": false, "created_at": "2021-01-29T13:12:40Z", "updated_at": "2021-01-29T13:13:37Z", "pushed_at": "2021-01-29T13:13:07Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 342244938, "name": "CVE-2020-14882", "full_name": "milo2012\/CVE-2020-14882", "owner": { "login": "milo2012", "id": 905335, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/905335?v=4", "html_url": "https:\/\/github.com\/milo2012" }, "html_url": "https:\/\/github.com\/milo2012\/CVE-2020-14882", "description": "CVE-2020-14882", "fork": false, "created_at": "2021-02-25T12:57:08Z", "updated_at": "2021-03-01T16:34:12Z", "pushed_at": "2021-03-01T16:34:10Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "forks": 1, "watchers": 2, "score": 0 } ]