[ { "id": 203542766, "name": "CVE-2019-11510", "full_name": "projectzeroindia\/CVE-2019-11510", "owner": { "login": "projectzeroindia", "id": 54312442, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4", "html_url": "https:\/\/github.com\/projectzeroindia" }, "html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510", "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "fork": false, "created_at": "2019-08-21T08:40:26Z", "updated_at": "2022-05-16T19:01:24Z", "pushed_at": "2020-01-11T13:55:33Z", "stargazers_count": 355, "watchers_count": 355, "forks_count": 143, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 143, "watchers": 355, "score": 0 }, { "id": 203575464, "name": "Pulse", "full_name": "nuc13us\/Pulse", "owner": { "login": "nuc13us", "id": 22916937, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4", "html_url": "https:\/\/github.com\/nuc13us" }, "html_url": "https:\/\/github.com\/nuc13us\/Pulse", "description": "Pulse Secure VPN CVE-2019-11510", "fork": false, "created_at": "2019-08-21T12:03:14Z", "updated_at": "2020-10-19T12:40:24Z", "pushed_at": "2019-08-21T12:03:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 203747377, "name": "CVE-2019-11510-poc", "full_name": "imjdl\/CVE-2019-11510-poc", "owner": { "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", "html_url": "https:\/\/github.com\/imjdl" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc", "description": "Pulse Secure SSL VPN pre-auth file reading", "fork": false, "created_at": "2019-08-22T08:18:19Z", "updated_at": "2021-12-15T14:37:03Z", "pushed_at": "2019-08-26T19:33:43Z", "stargazers_count": 54, "watchers_count": 54, "forks_count": 17, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 54, "score": 0 }, { "id": 204579243, "name": "CVE-2019-11510_poc", "full_name": "es0\/CVE-2019-11510_poc", "owner": { "login": "es0", "id": 10739380, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4", "html_url": "https:\/\/github.com\/es0" }, "html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc", "description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability", "fork": false, "created_at": "2019-08-26T23:30:15Z", "updated_at": "2021-12-05T21:57:04Z", "pushed_at": "2019-08-27T00:52:49Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 5, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 6, "score": 0 }, { "id": 204608508, "name": "http-pulse_ssl_vpn.nse", "full_name": "r00tpgp\/http-pulse_ssl_vpn.nse", "owner": { "login": "r00tpgp", "id": 29351179, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4", "html_url": "https:\/\/github.com\/r00tpgp" }, "html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse", "description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510", "fork": false, "created_at": "2019-08-27T03:04:19Z", "updated_at": "2022-04-28T11:20:33Z", "pushed_at": "2019-08-27T07:03:26Z", "stargazers_count": 19, "watchers_count": 19, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 19, "score": 0 }, { "id": 204666616, "name": "CVE-2019-11510-1", "full_name": "jas502n\/CVE-2019-11510-1", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1", "description": "SSL VPN Rce", "fork": false, "created_at": "2019-08-27T09:21:10Z", "updated_at": "2021-12-05T21:57:04Z", "pushed_at": "2019-08-27T09:29:05Z", "stargazers_count": 53, "watchers_count": 53, "forks_count": 22, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 53, "score": 0 }, { "id": 205106127, "name": "CVE-2019-11510", "full_name": "jason3e7\/CVE-2019-11510", "owner": { "login": "jason3e7", "id": 3059297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4", "html_url": "https:\/\/github.com\/jason3e7" }, "html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510", "description": null, "fork": false, "created_at": "2019-08-29T07:27:57Z", "updated_at": "2019-08-29T07:28:54Z", "pushed_at": "2019-08-29T07:28:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 207348255, "name": "pwn-pulse", "full_name": "BishopFox\/pwn-pulse", "owner": { "login": "BishopFox", "id": 4523757, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4", "html_url": "https:\/\/github.com\/BishopFox" }, "html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse", "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", "updated_at": "2022-03-15T08:44:21Z", "pushed_at": "2020-01-15T17:01:50Z", "stargazers_count": 127, "watchers_count": 127, "forks_count": 58, "allow_forking": true, "is_template": false, "topics": [ "cve", "exploit", "infosec", "penetration-testing", "pentest-scripts", "pentesting", "red-team", "security-tools" ], "visibility": "public", "forks": 58, "watchers": 127, "score": 0 }, { "id": 226548291, "name": "pulsexploit", "full_name": "aqhmal\/pulsexploit", "owner": { "login": "aqhmal", "id": 22043590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4", "html_url": "https:\/\/github.com\/aqhmal" }, "html_url": "https:\/\/github.com\/aqhmal\/pulsexploit", "description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.", "fork": false, "created_at": "2019-12-07T17:09:24Z", "updated_at": "2021-12-05T21:57:04Z", "pushed_at": "2020-04-25T05:06:45Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ "exploit", "information-extraction", "infosec", "offset", "pentest-script", "python3" ], "visibility": "public", "forks": 4, "watchers": 7, "score": 0 }, { "id": 256271162, "name": "check-your-pulse", "full_name": "cisagov\/check-your-pulse", "owner": { "login": "cisagov", "id": 18539691, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4", "html_url": "https:\/\/github.com\/cisagov" }, "html_url": "https:\/\/github.com\/cisagov\/check-your-pulse", "description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.", "fork": false, "created_at": "2020-04-16T16:32:47Z", "updated_at": "2022-03-06T07:12:20Z", "pushed_at": "2020-08-19T22:44:06Z", "stargazers_count": 28, "watchers_count": 28, "forks_count": 8, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 28, "score": 0 }, { "id": 282932489, "name": "pulse-exploit", "full_name": "andripwn\/pulse-exploit", "owner": { "login": "andripwn", "id": 52893492, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4", "html_url": "https:\/\/github.com\/andripwn" }, "html_url": "https:\/\/github.com\/andripwn\/pulse-exploit", "description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.", "fork": false, "created_at": "2020-07-27T15:06:08Z", "updated_at": "2020-12-13T12:56:51Z", "pushed_at": "2020-07-27T15:07:24Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 296402155, "name": "CVE-2019-11510-PulseVPN", "full_name": "pwn3z\/CVE-2019-11510-PulseVPN", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN", "description": null, "fork": false, "created_at": "2020-09-17T17:53:56Z", "updated_at": "2020-11-05T21:41:20Z", "pushed_at": "2020-11-05T21:41:18Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 } ]