[ { "id": 252131233, "name": "exphub", "full_name": "zhzyker\/exphub", "owner": { "login": "zhzyker", "id": 32918050, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4", "html_url": "https:\/\/github.com\/zhzyker" }, "html_url": "https:\/\/github.com\/zhzyker\/exphub", "description": "Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340", "fork": false, "created_at": "2020-04-01T09:33:35Z", "updated_at": "2020-12-14T09:10:00Z", "pushed_at": "2020-11-07T05:55:00Z", "stargazers_count": 2158, "watchers_count": 2158, "forks_count": 605, "forks": 605, "watchers": 2158, "score": 0 }, { "id": 302553989, "name": "vulmap", "full_name": "zhzyker\/vulmap", "owner": { "login": "zhzyker", "id": 32918050, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32918050?v=4", "html_url": "https:\/\/github.com\/zhzyker" }, "html_url": "https:\/\/github.com\/zhzyker\/vulmap", "description": "Vulmap - Web漏洞扫描和验证工具,可对Web容器、Web服务器、Web中间件以及CMS等Web程序进行漏洞扫描,并且具备漏洞利用功能。 相关测试人员可以使用vulmap检测目标是否存在特定漏洞,并且可以使用漏洞利用功能验证漏洞是否真实存在。CVE-2020-14882, CVE-2020-2555, CVE-2020-2883", "fork": false, "created_at": "2020-10-09T06:34:36Z", "updated_at": "2020-12-14T05:35:16Z", "pushed_at": "2020-12-04T06:42:58Z", "stargazers_count": 422, "watchers_count": 422, "forks_count": 81, "forks": 81, "watchers": 422, "score": 0 }, { "id": 307998445, "name": "CVE-2020-14882", "full_name": "jas502n\/CVE-2020-14882", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2020-14882", "description": "CVE-2020–14882、CVE-2020–14883", "fork": false, "created_at": "2020-10-28T11:43:37Z", "updated_at": "2020-12-12T09:29:09Z", "pushed_at": "2020-11-16T04:23:09Z", "stargazers_count": 202, "watchers_count": 202, "forks_count": 38, "forks": 38, "watchers": 202, "score": 0 }, { "id": 308145197, "name": "CVE-2020-14882", "full_name": "s1kr10s\/CVE-2020-14882", "owner": { "login": "s1kr10s", "id": 5374475, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5374475?v=4", "html_url": "https:\/\/github.com\/s1kr10s" }, "html_url": "https:\/\/github.com\/s1kr10s\/CVE-2020-14882", "description": "CVE-2020–14882 by Jang", "fork": false, "created_at": "2020-10-28T21:28:12Z", "updated_at": "2020-12-03T17:40:24Z", "pushed_at": "2020-10-29T03:57:09Z", "stargazers_count": 25, "watchers_count": 25, "forks_count": 19, "forks": 19, "watchers": 25, "score": 0 }, { "id": 308184758, "name": "-Patched-McMaster-University-Blind-Command-Injection", "full_name": "Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", "owner": { "login": "Umarovm", "id": 25722145, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/25722145?v=4", "html_url": "https:\/\/github.com\/Umarovm" }, "html_url": "https:\/\/github.com\/Umarovm\/-Patched-McMaster-University-Blind-Command-Injection", "description": "(patched) This targets McMaster University's website and takes advantage of CVE-2020-14882 in the outdated version of WebLogic Server (12.2.1.3.0), which is present in the university's subdomains, mosaic.mcmaster.ca and epprd.uts.mcmaster.ca.", "fork": false, "created_at": "2020-10-29T01:28:41Z", "updated_at": "2020-12-04T02:16:03Z", "pushed_at": "2020-12-04T02:16:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308238126, "name": "CVE-2020-14882", "full_name": "RedTeamWing\/CVE-2020-14882", "owner": { "login": "RedTeamWing", "id": 25416365, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25416365?v=4", "html_url": "https:\/\/github.com\/RedTeamWing" }, "html_url": "https:\/\/github.com\/RedTeamWing\/CVE-2020-14882", "description": "CVE-2020-14882 Weblogic-Exp", "fork": false, "created_at": "2020-10-29T06:30:30Z", "updated_at": "2020-11-02T15:26:30Z", "pushed_at": "2020-10-29T06:36:01Z", "stargazers_count": 13, "watchers_count": 13, "forks_count": 8, "forks": 8, "watchers": 13, "score": 0 }, { "id": 308343789, "name": "cve-2020-14882", "full_name": "0thm4n3\/cve-2020-14882", "owner": { "login": "0thm4n3", "id": 12746014, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/12746014?v=4", "html_url": "https:\/\/github.com\/0thm4n3" }, "html_url": "https:\/\/github.com\/0thm4n3\/cve-2020-14882", "description": "Bash script to exploit the Oracle's Weblogic Unauthenticated Remote Command Execution - CVE-2020-14882", "fork": false, "created_at": "2020-10-29T13:53:31Z", "updated_at": "2020-10-31T13:03:28Z", "pushed_at": "2020-10-31T13:03:26Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 308374913, "name": "cve-2020-14882", "full_name": "wsfengfan\/cve-2020-14882", "owner": { "login": "wsfengfan", "id": 33821840, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33821840?v=4", "html_url": "https:\/\/github.com\/wsfengfan" }, "html_url": "https:\/\/github.com\/wsfengfan\/cve-2020-14882", "description": "CVE-2020-14882 EXP 回显", "fork": false, "created_at": "2020-10-29T15:44:23Z", "updated_at": "2020-12-06T17:09:24Z", "pushed_at": "2020-11-09T09:55:10Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 2, "forks": 2, "watchers": 3, "score": 0 }, { "id": 308605927, "name": "CVE-2020-14882", "full_name": "alexfrancow\/CVE-2020-14882", "owner": { "login": "alexfrancow", "id": 23419929, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/23419929?v=4", "html_url": "https:\/\/github.com\/alexfrancow" }, "html_url": "https:\/\/github.com\/alexfrancow\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-10-30T11:07:11Z", "updated_at": "2020-10-31T15:57:21Z", "pushed_at": "2020-10-31T15:57:19Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 308716809, "name": "CVE-2020-14882", "full_name": "sickwell\/CVE-2020-14882", "owner": { "login": "sickwell", "id": 32671944, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/32671944?v=4", "html_url": "https:\/\/github.com\/sickwell" }, "html_url": "https:\/\/github.com\/sickwell\/CVE-2020-14882", "description": "PoC for CVE-2020-14882", "fork": false, "created_at": "2020-10-30T18:46:34Z", "updated_at": "2020-10-30T18:46:34Z", "pushed_at": "2020-10-30T18:46:35Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 308782228, "name": "CVE-2020-14882_POC", "full_name": "GGyao\/CVE-2020-14882_POC", "owner": { "login": "GGyao", "id": 38530938, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4", "html_url": "https:\/\/github.com\/GGyao" }, "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_POC", "description": "CVE-2020-14882批量验证工具。", "fork": false, "created_at": "2020-10-31T01:43:54Z", "updated_at": "2020-12-01T05:05:26Z", "pushed_at": "2020-12-01T05:05:24Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 1, "forks": 1, "watchers": 11, "score": 0 }, { "id": 309098912, "name": "Weblogic_Unauthorized-bypass-RCE", "full_name": "ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "owner": { "login": "ludy-dev", "id": 70466565, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4", "html_url": "https:\/\/github.com\/ludy-dev" }, "html_url": "https:\/\/github.com\/ludy-dev\/Weblogic_Unauthorized-bypass-RCE", "description": "(CVE-2020-14882) Oracle Weblogic Unauthorized bypass RCE test script", "fork": false, "created_at": "2020-11-01T13:12:27Z", "updated_at": "2020-11-24T16:16:12Z", "pushed_at": "2020-11-01T13:56:48Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "forks": 1, "watchers": 2, "score": 0 }, { "id": 309655403, "name": "CVE-2020-14882_ALL", "full_name": "GGyao\/CVE-2020-14882_ALL", "owner": { "login": "GGyao", "id": 38530938, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4", "html_url": "https:\/\/github.com\/GGyao" }, "html_url": "https:\/\/github.com\/GGyao\/CVE-2020-14882_ALL", "description": "CVE-2020-14882_ALL综合利用工具,支持命令回显检测、批量命令回显、外置xml无回显命令执行等功能。", "fork": false, "created_at": "2020-11-03T10:49:35Z", "updated_at": "2020-12-08T08:46:40Z", "pushed_at": "2020-12-01T05:08:41Z", "stargazers_count": 67, "watchers_count": 67, "forks_count": 15, "forks": 15, "watchers": 67, "score": 0 }, { "id": 309666360, "name": "CVE-2020-14882-checker", "full_name": "ovProphet\/CVE-2020-14882-checker", "owner": { "login": "ovProphet", "id": 12277617, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12277617?v=4", "html_url": "https:\/\/github.com\/ovProphet" }, "html_url": "https:\/\/github.com\/ovProphet\/CVE-2020-14882-checker", "description": "CVE-2020-14882 detection script", "fork": false, "created_at": "2020-11-03T11:34:38Z", "updated_at": "2020-11-03T11:42:04Z", "pushed_at": "2020-11-03T11:34:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 309868259, "name": "CVE-2020-14882", "full_name": "NS-Sp4ce\/CVE-2020-14882", "owner": { "login": "NS-Sp4ce", "id": 33349032, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/33349032?v=4", "html_url": "https:\/\/github.com\/NS-Sp4ce" }, "html_url": "https:\/\/github.com\/NS-Sp4ce\/CVE-2020-14882", "description": "CVE-2020-14882\/14883\/14750", "fork": false, "created_at": "2020-11-04T03:09:13Z", "updated_at": "2020-11-14T00:16:44Z", "pushed_at": "2020-11-04T03:15:33Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 1, "forks": 1, "watchers": 10, "score": 0 }, { "id": 310303375, "name": "cve-2020-14882", "full_name": "mmioimm\/cve-2020-14882", "owner": { "login": "mmioimm", "id": 19258899, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19258899?v=4", "html_url": "https:\/\/github.com\/mmioimm" }, "html_url": "https:\/\/github.com\/mmioimm\/cve-2020-14882", "description": null, "fork": false, "created_at": "2020-11-05T13:12:28Z", "updated_at": "2020-11-06T09:22:23Z", "pushed_at": "2020-11-05T13:14:57Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 311265070, "name": "CVE-2020-14882", "full_name": "QmF0c3UK\/CVE-2020-14882", "owner": { "login": "QmF0c3UK", "id": 29447678, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/29447678?v=4", "html_url": "https:\/\/github.com\/QmF0c3UK" }, "html_url": "https:\/\/github.com\/QmF0c3UK\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-09T08:03:44Z", "updated_at": "2020-12-02T02:25:44Z", "pushed_at": "2020-11-12T06:23:23Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "forks": 2, "watchers": 4, "score": 0 }, { "id": 311340226, "name": "CVE-2020-14882", "full_name": "murataydemir\/CVE-2020-14882", "owner": { "login": "murataydemir", "id": 16391655, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4", "html_url": "https:\/\/github.com\/murataydemir" }, "html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-14882", "description": "[CVE-2020-14882] Oracle WebLogic Server Authentication Bypass", "fork": false, "created_at": "2020-11-09T13:02:43Z", "updated_at": "2020-11-09T16:35:41Z", "pushed_at": "2020-11-09T16:35:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 311887487, "name": "CVE-2020-14882-GUI-Test", "full_name": "AirEvan\/CVE-2020-14882-GUI-Test", "owner": { "login": "AirEvan", "id": 26640179, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/26640179?v=4", "html_url": "https:\/\/github.com\/AirEvan" }, "html_url": "https:\/\/github.com\/AirEvan\/CVE-2020-14882-GUI-Test", "description": "基于qt的图形化CVE-2020-14882漏洞回显测试工具.", "fork": false, "created_at": "2020-11-11T06:52:32Z", "updated_at": "2020-11-11T07:22:06Z", "pushed_at": "2020-11-11T07:19:30Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 312193698, "name": "CVE-2020-14882-weblogicRCE", "full_name": "corelight\/CVE-2020-14882-weblogicRCE", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2020-14882-weblogicRCE", "description": "Detection of RCE in Oracle's WebLogic Server CVE-2020-14882 \/ CVE-2020-14750", "fork": false, "created_at": "2020-11-12T06:59:54Z", "updated_at": "2020-12-02T21:43:55Z", "pushed_at": "2020-12-02T21:43:52Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 312256179, "name": "CVE-2020-14882", "full_name": "x51\/CVE-2020-14882", "owner": { "login": "x51", "id": 45651912, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/45651912?v=4", "html_url": "https:\/\/github.com\/x51" }, "html_url": "https:\/\/github.com\/x51\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-12T11:27:39Z", "updated_at": "2020-11-16T14:43:25Z", "pushed_at": "2020-11-13T03:35:44Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 313643357, "name": "CVE-2020-14882", "full_name": "BabyTeam1024\/CVE-2020-14882", "owner": { "login": "BabyTeam1024", "id": 74447452, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/74447452?v=4", "html_url": "https:\/\/github.com\/BabyTeam1024" }, "html_url": "https:\/\/github.com\/BabyTeam1024\/CVE-2020-14882", "description": null, "fork": false, "created_at": "2020-11-17T14:23:23Z", "updated_at": "2020-11-17T14:23:23Z", "pushed_at": "2020-11-17T14:23:24Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]