PoC-in-GitHub/2015/CVE-2015-3636.json
2025-01-12 15:31:49 +09:00

219 lines
No EOL
7.3 KiB
JSON

[
{
"id": 39679436,
"name": "cve-2015-3636_crash",
"full_name": "betalphafai\/cve-2015-3636_crash",
"owner": {
"login": "betalphafai",
"id": 2919697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2919697?v=4",
"html_url": "https:\/\/github.com\/betalphafai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/betalphafai\/cve-2015-3636_crash",
"description": null,
"fork": false,
"created_at": "2015-07-25T09:29:27Z",
"updated_at": "2017-05-17T17:57:48Z",
"pushed_at": "2015-07-25T09:56:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 41139678,
"name": "libping_unhash_exploit_POC",
"full_name": "askk\/libping_unhash_exploit_POC",
"owner": {
"login": "askk",
"id": 4988461,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4988461?v=4",
"html_url": "https:\/\/github.com\/askk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/askk\/libping_unhash_exploit_POC",
"description": "CVE-2015-3636 exploit",
"fork": false,
"created_at": "2015-08-21T06:39:30Z",
"updated_at": "2024-08-12T19:18:54Z",
"pushed_at": "2015-08-20T14:36:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 41653791,
"name": "cve-2015-3636",
"full_name": "ludongxu\/cve-2015-3636",
"owner": {
"login": "ludongxu",
"id": 6722799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6722799?v=4",
"html_url": "https:\/\/github.com\/ludongxu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ludongxu\/cve-2015-3636",
"description": null,
"fork": false,
"created_at": "2015-08-31T03:28:51Z",
"updated_at": "2015-08-31T03:28:51Z",
"pushed_at": "2015-08-31T03:28:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 42340022,
"name": "CVE-2015-3636",
"full_name": "fi01\/CVE-2015-3636",
"owner": {
"login": "fi01",
"id": 3073214,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3073214?v=4",
"html_url": "https:\/\/github.com\/fi01",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fi01\/CVE-2015-3636",
"description": "PoC code for 32 bit Android OS",
"fork": false,
"created_at": "2015-09-12T01:31:36Z",
"updated_at": "2023-08-04T13:41:05Z",
"pushed_at": "2015-12-15T05:42:02Z",
"stargazers_count": 131,
"watchers_count": 131,
"has_discussions": false,
"forks_count": 88,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 88,
"watchers": 131,
"score": 0,
"subscribers_count": 17
},
{
"id": 43815628,
"name": "libpingpong_exploit",
"full_name": "android-rooting-tools\/libpingpong_exploit",
"owner": {
"login": "android-rooting-tools",
"id": 4747069,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747069?v=4",
"html_url": "https:\/\/github.com\/android-rooting-tools",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/android-rooting-tools\/libpingpong_exploit",
"description": "CVE-2015-3636 exploit ",
"fork": false,
"created_at": "2015-10-07T12:54:57Z",
"updated_at": "2023-06-30T06:36:02Z",
"pushed_at": "2015-11-22T06:20:42Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 32,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 32,
"watchers": 43,
"score": 0,
"subscribers_count": 15
},
{
"id": 63220214,
"name": "rattle_root",
"full_name": "debugfan\/rattle_root",
"owner": {
"login": "debugfan",
"id": 5540258,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5540258?v=4",
"html_url": "https:\/\/github.com\/debugfan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/debugfan\/rattle_root",
"description": "root with CVE-2015-3636",
"fork": false,
"created_at": "2016-07-13T06:23:54Z",
"updated_at": "2020-12-17T10:04:18Z",
"pushed_at": "2016-07-13T06:24:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 77807643,
"name": "CVE-2015-3636",
"full_name": "a7vinx\/CVE-2015-3636",
"owner": {
"login": "a7vinx",
"id": 12729836,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12729836?v=4",
"html_url": "https:\/\/github.com\/a7vinx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/a7vinx\/CVE-2015-3636",
"description": "Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.",
"fork": false,
"created_at": "2017-01-02T02:59:29Z",
"updated_at": "2024-01-19T07:25:53Z",
"pushed_at": "2017-01-03T02:38:48Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 18,
"score": 0,
"subscribers_count": 2
}
]