[ { "id": 256271162, "name": "check-your-pulse", "full_name": "cisagov\/check-your-pulse", "owner": { "login": "cisagov", "id": 18539691, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4", "html_url": "https:\/\/github.com\/cisagov" }, "html_url": "https:\/\/github.com\/cisagov\/check-your-pulse", "description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.", "fork": false, "created_at": "2020-04-16T16:32:47Z", "updated_at": "2022-10-22T13:35:06Z", "pushed_at": "2020-08-19T22:44:06Z", "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 27, "score": 0 }, { "id": 282932489, "name": "pulse-exploit", "full_name": "andripwn\/pulse-exploit", "owner": { "login": "andripwn", "id": 52893492, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4", "html_url": "https:\/\/github.com\/andripwn" }, "html_url": "https:\/\/github.com\/andripwn\/pulse-exploit", "description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.", "fork": false, "created_at": "2020-07-27T15:06:08Z", "updated_at": "2020-12-13T12:56:51Z", "pushed_at": "2020-07-27T15:07:24Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 296402155, "name": "CVE-2019-11510-PulseVPN", "full_name": "pwn3z\/CVE-2019-11510-PulseVPN", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN", "description": null, "fork": false, "created_at": "2020-09-17T17:53:56Z", "updated_at": "2020-11-05T21:41:20Z", "pushed_at": "2020-11-05T21:41:18Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 577600604, "name": "CVE-2019-11510", "full_name": "trhacknon\/CVE-2019-11510", "owner": { "login": "trhacknon", "id": 98242014, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4", "html_url": "https:\/\/github.com\/trhacknon" }, "html_url": "https:\/\/github.com\/trhacknon\/CVE-2019-11510", "description": null, "fork": false, "created_at": "2022-12-13T05:09:42Z", "updated_at": "2022-12-13T05:32:09Z", "pushed_at": "2022-12-13T05:12:21Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0 }, { "id": 577662602, "name": "APT-Backpack", "full_name": "34zY\/APT-Backpack", "owner": { "login": "34zY", "id": 55347142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4", "html_url": "https:\/\/github.com\/34zY" }, "html_url": "https:\/\/github.com\/34zY\/APT-Backpack", "description": "cve-2019-11510, cve-2019-19781, cve-2020-5902,               cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865", "fork": false, "created_at": "2022-12-13T08:41:44Z", "updated_at": "2022-12-20T08:22:23Z", "pushed_at": "2022-12-20T08:25:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "pentesting", "rat", "rce", "redteam" ], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]