[ { "id": 283991287, "name": "ActiveMQ_putshell-CVE-2016-3088", "full_name": "Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088", "owner": { "login": "Ma1Dong", "id": 52943794, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4", "html_url": "https:\/\/github.com\/Ma1Dong", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088", "description": "ActiveMQ_putshell直接获取webshell", "fork": false, "created_at": "2020-07-31T09:06:15Z", "updated_at": "2025-01-09T03:35:46Z", "pushed_at": "2020-08-01T06:47:34Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 14, "score": 0, "subscribers_count": 0 }, { "id": 324094419, "name": "CVE-2016-3088", "full_name": "pudiding\/CVE-2016-3088", "owner": { "login": "pudiding", "id": 68523175, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68523175?v=4", "html_url": "https:\/\/github.com\/pudiding", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pudiding\/CVE-2016-3088", "description": null, "fork": false, "created_at": "2020-12-24T07:26:00Z", "updated_at": "2021-08-27T00:32:50Z", "pushed_at": "2020-04-04T06:57:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 346593761, "name": "CVE-2016-3088", "full_name": "cyberaguiar\/CVE-2016-3088", "owner": { "login": "cyberaguiar", "id": 152955, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152955?v=4", "html_url": "https:\/\/github.com\/cyberaguiar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyberaguiar\/CVE-2016-3088", "description": "Apache ActiveMQ Remote Code Execution Exploit", "fork": false, "created_at": "2021-03-11T05:54:34Z", "updated_at": "2024-01-22T21:43:15Z", "pushed_at": "2021-03-11T13:53:18Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 347140858, "name": "CVE-2016-3088", "full_name": "vonderchild\/CVE-2016-3088", "owner": { "login": "vonderchild", "id": 51471592, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51471592?v=4", "html_url": "https:\/\/github.com\/vonderchild", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vonderchild\/CVE-2016-3088", "description": null, "fork": false, "created_at": "2021-03-12T17:12:09Z", "updated_at": "2021-03-14T18:55:43Z", "pushed_at": "2021-03-14T18:55:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 382586519, "name": "CVE-2016-3088", "full_name": "cl4ym0re\/CVE-2016-3088", "owner": { "login": "cl4ym0re", "id": 70927349, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70927349?v=4", "html_url": "https:\/\/github.com\/cl4ym0re", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cl4ym0re\/CVE-2016-3088", "description": "Apache ActiveMQ PUT RCE Scan", "fork": false, "created_at": "2021-07-03T10:23:59Z", "updated_at": "2022-08-16T09:31:30Z", "pushed_at": "2022-02-20T07:21:24Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "activemq", "exploit", "poc" ], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 476996538, "name": "ActiveMQ_Crack", "full_name": "YutuSec\/ActiveMQ_Crack", "owner": { "login": "YutuSec", "id": 41934714, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41934714?v=4", "html_url": "https:\/\/github.com\/YutuSec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/YutuSec\/ActiveMQ_Crack", "description": "ActiveMQ系列漏洞探测利用工具,包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞(CVE-2016-3088),支持批量探测利用。", "fork": false, "created_at": "2022-04-02T08:40:10Z", "updated_at": "2024-12-26T03:30:18Z", "pushed_at": "2022-04-02T08:55:07Z", "stargazers_count": 17, "watchers_count": 17, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 17, "score": 0, "subscribers_count": 1 } ]