mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
161 lines
No EOL
6.3 KiB
JSON
161 lines
No EOL
6.3 KiB
JSON
[
|
|
{
|
|
"id": 31661477,
|
|
"name": "FreakVulnChecker",
|
|
"full_name": "felmoltor\/FreakVulnChecker",
|
|
"owner": {
|
|
"login": "felmoltor",
|
|
"id": 846513,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/846513?v=4",
|
|
"html_url": "https:\/\/github.com\/felmoltor",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/felmoltor\/FreakVulnChecker",
|
|
"description": "This script check if your list of server is accepting Export cipher suites and could be vulnerable to CVE-2015-0204",
|
|
"fork": false,
|
|
"created_at": "2015-03-04T14:35:54Z",
|
|
"updated_at": "2024-04-24T12:18:20Z",
|
|
"pushed_at": "2015-03-04T14:47:02Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 31731578,
|
|
"name": "Freak-Scanner",
|
|
"full_name": "scottjpack\/Freak-Scanner",
|
|
"owner": {
|
|
"login": "scottjpack",
|
|
"id": 2293674,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2293674?v=4",
|
|
"html_url": "https:\/\/github.com\/scottjpack",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/scottjpack\/Freak-Scanner",
|
|
"description": "Multithreaded FREAK scanner, used to detect SSL EXP Ciphers, vulnerable to CVE-2015-0204",
|
|
"fork": false,
|
|
"created_at": "2015-03-05T19:21:50Z",
|
|
"updated_at": "2022-12-20T13:00:44Z",
|
|
"pushed_at": "2015-03-05T19:23:23Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 31762660,
|
|
"name": "FREAK-Attack-CVE-2015-0204-Testing-Script",
|
|
"full_name": "AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script",
|
|
"owner": {
|
|
"login": "AbhishekGhosh",
|
|
"id": 879054,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/879054?v=4",
|
|
"html_url": "https:\/\/github.com\/AbhishekGhosh",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AbhishekGhosh\/FREAK-Attack-CVE-2015-0204-Testing-Script",
|
|
"description": "Basic BASH Script to Automate OpenSSL based testing for FREAK Attack (CVE-2015-0204) as advised by Akamai.",
|
|
"fork": false,
|
|
"created_at": "2015-03-06T09:40:54Z",
|
|
"updated_at": "2024-05-26T02:34:46Z",
|
|
"pushed_at": "2015-03-06T10:00:25Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"abhishekghosh",
|
|
"freak-attack",
|
|
"shell"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 32724854,
|
|
"name": "patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
|
"full_name": "niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
|
"owner": {
|
|
"login": "niccoX",
|
|
"id": 10669660,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10669660?v=4",
|
|
"html_url": "https:\/\/github.com\/niccoX",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/niccoX\/patch-openssl-CVE-2014-0291_CVE-2015-0204",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2015-03-23T10:18:08Z",
|
|
"updated_at": "2018-08-10T09:10:45Z",
|
|
"pushed_at": "2015-03-23T13:04:01Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 325974459,
|
|
"name": "A2SV--SSL-VUL-Scan",
|
|
"full_name": "anthophilee\/A2SV--SSL-VUL-Scan",
|
|
"owner": {
|
|
"login": "anthophilee",
|
|
"id": 75995332,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4",
|
|
"html_url": "https:\/\/github.com\/anthophilee",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan",
|
|
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
|
|
"fork": false,
|
|
"created_at": "2021-01-01T12:26:08Z",
|
|
"updated_at": "2025-01-04T11:54:28Z",
|
|
"pushed_at": "2021-01-01T12:26:10Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |