mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
198 lines
No EOL
7.5 KiB
JSON
198 lines
No EOL
7.5 KiB
JSON
[
|
|
{
|
|
"id": 106299703,
|
|
"name": "CVE-2017-0781",
|
|
"full_name": "ojasookert\/CVE-2017-0781",
|
|
"owner": {
|
|
"login": "ojasookert",
|
|
"id": 12931198,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
|
|
"html_url": "https:\/\/github.com\/ojasookert",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
|
|
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
|
"fork": false,
|
|
"created_at": "2017-10-09T15:13:25Z",
|
|
"updated_at": "2024-12-16T21:39:31Z",
|
|
"pushed_at": "2021-07-29T12:00:48Z",
|
|
"stargazers_count": 139,
|
|
"watchers_count": 139,
|
|
"has_discussions": false,
|
|
"forks_count": 49,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"armis",
|
|
"blueborne",
|
|
"bluetooth",
|
|
"exploit",
|
|
"poc"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 49,
|
|
"watchers": 139,
|
|
"score": 0,
|
|
"subscribers_count": 11
|
|
},
|
|
{
|
|
"id": 128436971,
|
|
"name": "android712-blueborne",
|
|
"full_name": "X3eRo0\/android712-blueborne",
|
|
"owner": {
|
|
"login": "X3eRo0",
|
|
"id": 24680989,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24680989?v=4",
|
|
"html_url": "https:\/\/github.com\/X3eRo0",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/X3eRo0\/android712-blueborne",
|
|
"description": "Android Blueborne RCE CVE-2017-0781",
|
|
"fork": false,
|
|
"created_at": "2018-04-06T18:32:19Z",
|
|
"updated_at": "2018-12-05T14:30:22Z",
|
|
"pushed_at": "2018-04-04T12:59:18Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 20,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 20,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 283876725,
|
|
"name": "BlueborneDetection",
|
|
"full_name": "mjancek\/BlueborneDetection",
|
|
"owner": {
|
|
"login": "mjancek",
|
|
"id": 32901382,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32901382?v=4",
|
|
"html_url": "https:\/\/github.com\/mjancek",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mjancek\/BlueborneDetection",
|
|
"description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ",
|
|
"fork": false,
|
|
"created_at": "2020-07-30T21:06:19Z",
|
|
"updated_at": "2024-12-04T00:57:52Z",
|
|
"pushed_at": "2021-04-30T12:44:54Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"blueborne",
|
|
"bluetooth",
|
|
"c"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 303310240,
|
|
"name": "Blue-Borne",
|
|
"full_name": "CrackSoft900\/Blue-Borne",
|
|
"owner": {
|
|
"login": "CrackSoft900",
|
|
"id": 69074572,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69074572?v=4",
|
|
"html_url": "https:\/\/github.com\/CrackSoft900",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CrackSoft900\/Blue-Borne",
|
|
"description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:",
|
|
"fork": false,
|
|
"created_at": "2020-10-12T07:21:08Z",
|
|
"updated_at": "2024-08-07T03:01:06Z",
|
|
"pushed_at": "2020-11-04T16:49:05Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 8,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 440265596,
|
|
"name": "sploit-bX",
|
|
"full_name": "CarlosDelRosario7\/sploit-bX",
|
|
"owner": {
|
|
"login": "CarlosDelRosario7",
|
|
"id": 65183782,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65183782?v=4",
|
|
"html_url": "https:\/\/github.com\/CarlosDelRosario7",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CarlosDelRosario7\/sploit-bX",
|
|
"description": "Bash que instala los sploit CVE-2017-0781 y CVE-2017-0785 y lo necesario para su usos.",
|
|
"fork": false,
|
|
"created_at": "2021-12-20T18:14:36Z",
|
|
"updated_at": "2024-10-13T21:11:08Z",
|
|
"pushed_at": "2021-12-21T13:05:16Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 670160089,
|
|
"name": "Learn.BlueJam",
|
|
"full_name": "DamianSuess\/Learn.BlueJam",
|
|
"owner": {
|
|
"login": "DamianSuess",
|
|
"id": 1216684,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1216684?v=4",
|
|
"html_url": "https:\/\/github.com\/DamianSuess",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DamianSuess\/Learn.BlueJam",
|
|
"description": "Learn what is BlueJam CVE-2017-0781",
|
|
"fork": false,
|
|
"created_at": "2023-07-24T12:28:02Z",
|
|
"updated_at": "2023-08-22T10:28:29Z",
|
|
"pushed_at": "2023-07-24T12:28:46Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |