[ { "id": 148261072, "name": "GitStackRCE", "full_name": "b0bac\/GitStackRCE", "owner": { "login": "b0bac", "id": 11972644, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11972644?v=4", "html_url": "https:\/\/github.com\/b0bac", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/b0bac\/GitStackRCE", "description": "GitStackRCE漏洞(CVE-2018-5955)EXP", "fork": false, "created_at": "2018-09-11T04:39:43Z", "updated_at": "2021-10-06T07:08:24Z", "pushed_at": "2018-09-11T04:40:52Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 229491909, "name": "Cerberus", "full_name": "YagamiiLight\/Cerberus", "owner": { "login": "YagamiiLight", "id": 58111801, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58111801?v=4", "html_url": "https:\/\/github.com\/YagamiiLight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/YagamiiLight\/Cerberus", "description": "一款功能强大的漏洞扫描器,子域名爆破使用aioDNS,asyncio异步快速扫描,覆盖目标全方位资产进行批量漏洞扫描,中间件信息收集,自动收集ip代理,探测Waf信息时自动使用来保护本机真实Ip,在本机Ip被Waf杀死后,自动切换代理Ip进行扫描,Waf信息收集(国内外100+款waf信息)包括安全狗,云锁,阿里云,云盾,腾讯云等,提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等),支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能", "fork": false, "created_at": "2019-12-21T22:45:55Z", "updated_at": "2024-11-29T03:20:33Z", "pushed_at": "2020-01-05T21:46:25Z", "stargazers_count": 649, "watchers_count": 649, "has_discussions": false, "forks_count": 128, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bypass", "hacking-tool", "middleware", "penetration-testing", "proxy", "python", "security-tools", "sql-injection", "ssrf", "waf", "websecurity", "xss" ], "visibility": "public", "forks": 128, "watchers": 649, "score": 0, "subscribers_count": 16 }, { "id": 657774080, "name": "CVE-2018-5955", "full_name": "MikeTheHash\/CVE-2018-5955", "owner": { "login": "MikeTheHash", "id": 80423783, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80423783?v=4", "html_url": "https:\/\/github.com\/MikeTheHash", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MikeTheHash\/CVE-2018-5955", "description": "An exploit for CVE-2018-5955 GitStack 2.3.10 Unauthenticated RCE", "fork": false, "created_at": "2023-06-23T20:25:47Z", "updated_at": "2024-11-17T20:05:51Z", "pushed_at": "2024-11-15T16:36:27Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2018-5955", "exploit", "gitstack", "hacking", "php", "vulnerabilities", "web-application", "web-hacking" ], "visibility": "public", "forks": 3, "watchers": 10, "score": 0, "subscribers_count": 1 } ]