mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
95 lines
No EOL
3.4 KiB
JSON
95 lines
No EOL
3.4 KiB
JSON
[
|
|
{
|
|
"id": 598309338,
|
|
"name": "CVE-2022-4510",
|
|
"full_name": "electr0sm0g\/CVE-2022-4510",
|
|
"owner": {
|
|
"login": "electr0sm0g",
|
|
"id": 8340491,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8340491?v=4",
|
|
"html_url": "https:\/\/github.com\/electr0sm0g",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/electr0sm0g\/CVE-2022-4510",
|
|
"description": "Binwalk Remote Command Execution",
|
|
"fork": false,
|
|
"created_at": "2023-02-06T20:53:49Z",
|
|
"updated_at": "2024-11-17T01:33:08Z",
|
|
"pushed_at": "2023-02-06T20:54:33Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 8,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 659028420,
|
|
"name": "CVE-2022-4510-WalkingPath",
|
|
"full_name": "adhikara13\/CVE-2022-4510-WalkingPath",
|
|
"owner": {
|
|
"login": "adhikara13",
|
|
"id": 44716348,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44716348?v=4",
|
|
"html_url": "https:\/\/github.com\/adhikara13",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/adhikara13\/CVE-2022-4510-WalkingPath",
|
|
"description": "A Python script for generating exploits targeting CVE-2022-4510 RCE Binwalk. It supports SSH, command execution, and reverse shell options. Exploits are saved in PNG format. Ideal for testing and demonstrations.",
|
|
"fork": false,
|
|
"created_at": "2023-06-27T02:20:13Z",
|
|
"updated_at": "2024-11-22T19:48:06Z",
|
|
"pushed_at": "2023-06-27T02:29:26Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 14,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 665275498,
|
|
"name": "BadPfs-CVE-2022-4510",
|
|
"full_name": "Kalagious\/BadPfs-CVE-2022-4510",
|
|
"owner": {
|
|
"login": "Kalagious",
|
|
"id": 44515549,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44515549?v=4",
|
|
"html_url": "https:\/\/github.com\/Kalagious",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Kalagious\/BadPfs-CVE-2022-4510",
|
|
"description": "Python script that generates pfs payloads to exploit CVE-2022-4510",
|
|
"fork": false,
|
|
"created_at": "2023-07-11T20:55:58Z",
|
|
"updated_at": "2024-06-08T19:59:42Z",
|
|
"pushed_at": "2023-07-11T20:59:48Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |