PoC-in-GitHub/2016/CVE-2016-3088.json
2025-01-09 15:32:28 +09:00

192 lines
No EOL
6.4 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 283991287,
"name": "ActiveMQ_putshell-CVE-2016-3088",
"full_name": "Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088",
"owner": {
"login": "Ma1Dong",
"id": 52943794,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52943794?v=4",
"html_url": "https:\/\/github.com\/Ma1Dong",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ma1Dong\/ActiveMQ_putshell-CVE-2016-3088",
"description": "ActiveMQ_putshell直接获取webshell",
"fork": false,
"created_at": "2020-07-31T09:06:15Z",
"updated_at": "2025-01-09T03:35:46Z",
"pushed_at": "2020-08-01T06:47:34Z",
"stargazers_count": 14,
"watchers_count": 14,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 14,
"score": 0,
"subscribers_count": 0
},
{
"id": 324094419,
"name": "CVE-2016-3088",
"full_name": "pudiding\/CVE-2016-3088",
"owner": {
"login": "pudiding",
"id": 68523175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68523175?v=4",
"html_url": "https:\/\/github.com\/pudiding",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pudiding\/CVE-2016-3088",
"description": null,
"fork": false,
"created_at": "2020-12-24T07:26:00Z",
"updated_at": "2021-08-27T00:32:50Z",
"pushed_at": "2020-04-04T06:57:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 346593761,
"name": "CVE-2016-3088",
"full_name": "cyberaguiar\/CVE-2016-3088",
"owner": {
"login": "cyberaguiar",
"id": 152955,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152955?v=4",
"html_url": "https:\/\/github.com\/cyberaguiar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyberaguiar\/CVE-2016-3088",
"description": "Apache ActiveMQ Remote Code Execution Exploit",
"fork": false,
"created_at": "2021-03-11T05:54:34Z",
"updated_at": "2024-01-22T21:43:15Z",
"pushed_at": "2021-03-11T13:53:18Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 347140858,
"name": "CVE-2016-3088",
"full_name": "vonderchild\/CVE-2016-3088",
"owner": {
"login": "vonderchild",
"id": 51471592,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51471592?v=4",
"html_url": "https:\/\/github.com\/vonderchild",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vonderchild\/CVE-2016-3088",
"description": null,
"fork": false,
"created_at": "2021-03-12T17:12:09Z",
"updated_at": "2021-03-14T18:55:43Z",
"pushed_at": "2021-03-14T18:55:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 382586519,
"name": "CVE-2016-3088",
"full_name": "cl4ym0re\/CVE-2016-3088",
"owner": {
"login": "cl4ym0re",
"id": 70927349,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70927349?v=4",
"html_url": "https:\/\/github.com\/cl4ym0re",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cl4ym0re\/CVE-2016-3088",
"description": "Apache ActiveMQ PUT RCE Scan",
"fork": false,
"created_at": "2021-07-03T10:23:59Z",
"updated_at": "2022-08-16T09:31:30Z",
"pushed_at": "2022-02-20T07:21:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"activemq",
"exploit",
"poc"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 476996538,
"name": "ActiveMQ_Crack",
"full_name": "YutuSec\/ActiveMQ_Crack",
"owner": {
"login": "YutuSec",
"id": 41934714,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41934714?v=4",
"html_url": "https:\/\/github.com\/YutuSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/YutuSec\/ActiveMQ_Crack",
"description": "ActiveMQ系列漏洞探测利用工具包括ActiveMQ 默认口令漏洞及ActiveMQ任意文件写入漏洞CVE-2016-3088支持批量探测利用。",
"fork": false,
"created_at": "2022-04-02T08:40:10Z",
"updated_at": "2024-12-26T03:30:18Z",
"pushed_at": "2022-04-02T08:55:07Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 17,
"score": 0,
"subscribers_count": 1
}
]