[ { "id": 203542766, "name": "CVE-2019-11510", "full_name": "projectzeroindia\/CVE-2019-11510", "owner": { "login": "projectzeroindia", "id": 54312442, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4", "html_url": "https:\/\/github.com\/projectzeroindia", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510", "description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)", "fork": false, "created_at": "2019-08-21T08:40:26Z", "updated_at": "2024-09-11T02:56:59Z", "pushed_at": "2020-01-11T13:55:33Z", "stargazers_count": 361, "watchers_count": 361, "has_discussions": false, "forks_count": 135, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 135, "watchers": 361, "score": 0, "subscribers_count": 14 }, { "id": 203575464, "name": "Pulse", "full_name": "nuc13us\/Pulse", "owner": { "login": "nuc13us", "id": 22916937, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4", "html_url": "https:\/\/github.com\/nuc13us", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nuc13us\/Pulse", "description": "Pulse Secure VPN CVE-2019-11510", "fork": false, "created_at": "2019-08-21T12:03:14Z", "updated_at": "2020-10-19T12:40:24Z", "pushed_at": "2019-08-21T12:03:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 203747377, "name": "CVE-2019-11510-poc", "full_name": "imjdl\/CVE-2019-11510-poc", "owner": { "login": "imjdl", "id": 31382943, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4", "html_url": "https:\/\/github.com\/imjdl", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc", "description": "Pulse Secure SSL VPN pre-auth file reading", "fork": false, "created_at": "2019-08-22T08:18:19Z", "updated_at": "2024-08-12T19:52:14Z", "pushed_at": "2019-08-26T19:33:43Z", "stargazers_count": 50, "watchers_count": 50, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 50, "score": 0, "subscribers_count": 2 }, { "id": 204579243, "name": "CVE-2019-11510_poc", "full_name": "es0\/CVE-2019-11510_poc", "owner": { "login": "es0", "id": 10739380, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4", "html_url": "https:\/\/github.com\/es0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc", "description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability", "fork": false, "created_at": "2019-08-26T23:30:15Z", "updated_at": "2024-08-12T19:52:23Z", "pushed_at": "2019-08-27T00:52:49Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 204608508, "name": "http-pulse_ssl_vpn.nse", "full_name": "r00tpgp\/http-pulse_ssl_vpn.nse", "owner": { "login": "r00tpgp", "id": 29351179, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4", "html_url": "https:\/\/github.com\/r00tpgp", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse", "description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510", "fork": false, "created_at": "2019-08-27T03:04:19Z", "updated_at": "2024-08-12T19:52:23Z", "pushed_at": "2019-08-27T07:03:26Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 9, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 18, "score": 0, "subscribers_count": 2 }, { "id": 204666616, "name": "CVE-2019-11510-1", "full_name": "jas502n\/CVE-2019-11510-1", "owner": { "login": "jas502n", "id": 16593068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4", "html_url": "https:\/\/github.com\/jas502n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1", "description": "SSL VPN Rce", "fork": false, "created_at": "2019-08-27T09:21:10Z", "updated_at": "2024-09-11T15:28:24Z", "pushed_at": "2019-08-27T09:29:05Z", "stargazers_count": 53, "watchers_count": 53, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 53, "score": 0, "subscribers_count": 2 }, { "id": 205106127, "name": "CVE-2019-11510", "full_name": "jason3e7\/CVE-2019-11510", "owner": { "login": "jason3e7", "id": 3059297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4", "html_url": "https:\/\/github.com\/jason3e7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510", "description": null, "fork": false, "created_at": "2019-08-29T07:27:57Z", "updated_at": "2019-08-29T07:28:54Z", "pushed_at": "2019-08-29T07:28:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 207348255, "name": "pwn-pulse", "full_name": "BishopFox\/pwn-pulse", "owner": { "login": "BishopFox", "id": 4523757, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4", "html_url": "https:\/\/github.com\/BishopFox", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse", "description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)", "fork": false, "created_at": "2019-09-09T15:58:39Z", "updated_at": "2024-10-03T05:14:13Z", "pushed_at": "2020-01-15T17:01:50Z", "stargazers_count": 137, "watchers_count": 137, "has_discussions": false, "forks_count": 60, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "infosec", "penetration-testing", "pentest-scripts", "pentesting", "red-team", "security-tools" ], "visibility": "public", "forks": 60, "watchers": 137, "score": 0, "subscribers_count": 15 }, { "id": 226548291, "name": "pulsexploit", "full_name": "aqhmal\/pulsexploit", "owner": { "login": "aqhmal", "id": 22043590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4", "html_url": "https:\/\/github.com\/aqhmal", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aqhmal\/pulsexploit", "description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.", "fork": false, "created_at": "2019-12-07T17:09:24Z", "updated_at": "2024-08-12T19:55:32Z", "pushed_at": "2020-04-25T05:06:45Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "information-extraction", "infosec", "offset", "pentest-script", "python3" ], "visibility": "public", "forks": 4, "watchers": 8, "score": 0, "subscribers_count": 2 }, { "id": 256271162, "name": "check-your-pulse", "full_name": "cisagov\/check-your-pulse", "owner": { "login": "cisagov", "id": 18539691, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4", "html_url": "https:\/\/github.com\/cisagov", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cisagov\/check-your-pulse", "description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.", "fork": false, "created_at": "2020-04-16T16:32:47Z", "updated_at": "2024-08-12T20:00:16Z", "pushed_at": "2020-08-19T22:44:06Z", "stargazers_count": 28, "watchers_count": 28, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 28, "score": 0, "subscribers_count": 7 }, { "id": 282932489, "name": "pulse-exploit", "full_name": "andripwn\/pulse-exploit", "owner": { "login": "andripwn", "id": 52893492, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4", "html_url": "https:\/\/github.com\/andripwn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/andripwn\/pulse-exploit", "description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.", "fork": false, "created_at": "2020-07-27T15:06:08Z", "updated_at": "2020-12-13T12:56:51Z", "pushed_at": "2020-07-27T15:07:24Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 296402155, "name": "CVE-2019-11510-PulseVPN", "full_name": "pwn3z\/CVE-2019-11510-PulseVPN", "owner": { "login": "pwn3z", "id": 71440287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4", "html_url": "https:\/\/github.com\/pwn3z", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN", "description": null, "fork": false, "created_at": "2020-09-17T17:53:56Z", "updated_at": "2020-11-05T21:41:20Z", "pushed_at": "2020-11-05T21:41:18Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 577662602, "name": "APT-Backpack", "full_name": "34zY\/APT-Backpack", "owner": { "login": "34zY", "id": 55347142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4", "html_url": "https:\/\/github.com\/34zY", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/34zY\/APT-Backpack", "description": "cve-2019-11510, cve-2019-19781, cve-2020-5902,               cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865", "fork": false, "created_at": "2022-12-13T08:41:44Z", "updated_at": "2024-11-05T01:37:50Z", "pushed_at": "2023-04-19T17:10:15Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 } ]