mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-02-18 00:18:35 +01:00
369 lines
No EOL
13 KiB
JSON
369 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 1136048004,
|
|
"name": "DIY_WhisperPair",
|
|
"full_name": "SpectrixDev\/DIY_WhisperPair",
|
|
"owner": {
|
|
"login": "SpectrixDev",
|
|
"id": 29328207,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29328207?v=4",
|
|
"html_url": "https:\/\/github.com\/SpectrixDev",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SpectrixDev\/DIY_WhisperPair",
|
|
"description": "Hijacking Bluetooth Accessories Using Google Fast Pair: WhisperPair CVE-2025-36911 Reference Implementation & Vulnerability Verification Toolkit",
|
|
"fork": false,
|
|
"created_at": "2026-01-17T01:18:36Z",
|
|
"updated_at": "2026-02-17T15:33:42Z",
|
|
"pushed_at": "2026-01-18T13:14:21Z",
|
|
"stargazers_count": 61,
|
|
"watchers_count": 61,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [
|
|
"bluetooth",
|
|
"cve-2025-36911",
|
|
"cybersecurity",
|
|
"python",
|
|
"whisperpair"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 61,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 1136093040,
|
|
"name": "CVE-2025-36911_scan",
|
|
"full_name": "Cedric-Martz\/CVE-2025-36911_scan",
|
|
"owner": {
|
|
"login": "Cedric-Martz",
|
|
"id": 114771385,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114771385?v=4",
|
|
"html_url": "https:\/\/github.com\/Cedric-Martz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Cedric-Martz\/CVE-2025-36911_scan",
|
|
"description": "This script can be used to check if a Bluetooth device is vulnerable to CVE-2025-36911.",
|
|
"fork": false,
|
|
"created_at": "2026-01-17T03:48:47Z",
|
|
"updated_at": "2026-01-22T09:09:30Z",
|
|
"pushed_at": "2026-01-17T03:55:26Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1136124411,
|
|
"name": "wpair-app",
|
|
"full_name": "zalexdev\/wpair-app",
|
|
"owner": {
|
|
"login": "zalexdev",
|
|
"id": 73614708,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73614708?v=4",
|
|
"html_url": "https:\/\/github.com\/zalexdev",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zalexdev\/wpair-app",
|
|
"description": "WPair is a defensive security research tool that demonstrates the CVE-2025-36911 (eg WhisperPair) vulnerability in Google's Fast Pair protocol. This vulnerability affects millions of Bluetooth audio devices worldwide, allowing unauthorized pairing and potential microphone access without user consent.",
|
|
"fork": false,
|
|
"created_at": "2026-01-17T05:28:08Z",
|
|
"updated_at": "2026-02-17T15:26:27Z",
|
|
"pushed_at": "2026-01-18T00:15:59Z",
|
|
"stargazers_count": 651,
|
|
"watchers_count": 651,
|
|
"has_discussions": false,
|
|
"forks_count": 76,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 76,
|
|
"watchers": 651,
|
|
"score": 0,
|
|
"subscribers_count": 15
|
|
},
|
|
{
|
|
"id": 1136290406,
|
|
"name": "CVE-2025-36911-Wisper_Pair_Target_Finder",
|
|
"full_name": "SteamPunk424\/CVE-2025-36911-Wisper_Pair_Target_Finder",
|
|
"owner": {
|
|
"login": "SteamPunk424",
|
|
"id": 32554693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32554693?v=4",
|
|
"html_url": "https:\/\/github.com\/SteamPunk424",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SteamPunk424\/CVE-2025-36911-Wisper_Pair_Target_Finder",
|
|
"description": "This is not an exploit for CVE-2025-36911!!! This is a detector for finding potentially vulnerable devices! Only use on your own devices! I am not responsible for damages!",
|
|
"fork": false,
|
|
"created_at": "2026-01-17T12:21:30Z",
|
|
"updated_at": "2026-01-28T22:01:45Z",
|
|
"pushed_at": "2026-01-18T03:54:13Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1138002588,
|
|
"name": "FrostedFastPair",
|
|
"full_name": "PivotChip\/FrostedFastPair",
|
|
"owner": {
|
|
"login": "PivotChip",
|
|
"id": 250757727,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/250757727?v=4",
|
|
"html_url": "https:\/\/github.com\/PivotChip",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/PivotChip\/FrostedFastPair",
|
|
"description": "WhisperPair (CVE-2025-36911) POC for ESP32 device ",
|
|
"fork": false,
|
|
"created_at": "2026-01-20T05:50:37Z",
|
|
"updated_at": "2026-02-02T15:41:17Z",
|
|
"pushed_at": "2026-01-31T03:16:06Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [
|
|
"ble",
|
|
"bluetooth",
|
|
"cve-2025-36911",
|
|
"cybersecurity",
|
|
"esp32",
|
|
"whisperpair"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1138816494,
|
|
"name": "whisper-pair",
|
|
"full_name": "ap425q\/whisper-pair",
|
|
"owner": {
|
|
"login": "ap425q",
|
|
"id": 40756185,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40756185?v=4",
|
|
"html_url": "https:\/\/github.com\/ap425q",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ap425q\/whisper-pair",
|
|
"description": "A Vulnerablity Scanner for Whisper Pair (CVE-2025-36911)",
|
|
"fork": false,
|
|
"created_at": "2026-01-21T06:40:16Z",
|
|
"updated_at": "2026-01-27T14:44:14Z",
|
|
"pushed_at": "2026-01-23T10:06:00Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1142002086,
|
|
"name": "whisperpair-poc-tool",
|
|
"full_name": "aalex954\/whisperpair-poc-tool",
|
|
"owner": {
|
|
"login": "aalex954",
|
|
"id": 6628565,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6628565?v=4",
|
|
"html_url": "https:\/\/github.com\/aalex954",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aalex954\/whisperpair-poc-tool",
|
|
"description": "A security research tool that identifies and demonstrates the CVE-2025-36911: Fast Pair Pairing Mode Bypass vulnerability",
|
|
"fork": false,
|
|
"created_at": "2026-01-25T19:48:05Z",
|
|
"updated_at": "2026-01-29T18:52:30Z",
|
|
"pushed_at": "2026-01-25T20:52:36Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1143228184,
|
|
"name": "CVE-2025-36911-exploit",
|
|
"full_name": "PentHertz\/CVE-2025-36911-exploit",
|
|
"owner": {
|
|
"login": "PentHertz",
|
|
"id": 59710120,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59710120?v=4",
|
|
"html_url": "https:\/\/github.com\/PentHertz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/PentHertz\/CVE-2025-36911-exploit",
|
|
"description": "Exploit of the CVE-2025-36911 vulnerability in Python for testing our own equipment",
|
|
"fork": false,
|
|
"created_at": "2026-01-27T10:18:07Z",
|
|
"updated_at": "2026-02-11T18:10:57Z",
|
|
"pushed_at": "2026-01-28T17:42:44Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [
|
|
"cve-2025-36911",
|
|
"pentesting"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 18,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1144740257,
|
|
"name": "wpair-app",
|
|
"full_name": "fa1sa1142\/wpair-app",
|
|
"owner": {
|
|
"login": "fa1sa1142",
|
|
"id": 207318346,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/207318346?v=4",
|
|
"html_url": "https:\/\/github.com\/fa1sa1142",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fa1sa1142\/wpair-app",
|
|
"description": "🔍 Scan and research CVE-2025-36911 vulnerabilities with WPair, a specialized tool for Android built in Kotlin, ensuring your applications remain secure.",
|
|
"fork": false,
|
|
"created_at": "2026-01-29T01:59:47Z",
|
|
"updated_at": "2026-02-17T17:54:49Z",
|
|
"pushed_at": "2026-02-17T17:54:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [
|
|
"aliases",
|
|
"appengine-java",
|
|
"coronavirus",
|
|
"covid-19",
|
|
"dart",
|
|
"email",
|
|
"encrypted",
|
|
"epidemiology",
|
|
"evernote",
|
|
"firebase",
|
|
"flask",
|
|
"flutter",
|
|
"hacktoberfest",
|
|
"markdown",
|
|
"note-taking",
|
|
"notes",
|
|
"privacy",
|
|
"secure",
|
|
"simplelogin",
|
|
"snippets"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1144741164,
|
|
"name": "fa1sa1142.github.io",
|
|
"full_name": "fa1sa1142\/fa1sa1142.github.io",
|
|
"owner": {
|
|
"login": "fa1sa1142",
|
|
"id": 207318346,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/207318346?v=4",
|
|
"html_url": "https:\/\/github.com\/fa1sa1142",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fa1sa1142\/fa1sa1142.github.io",
|
|
"description": "🛡️ Scan for CVE-2025-36911 vulnerabilities with WPair, a research tool designed for Android developers using Kotlin. Secure your applications effectively.",
|
|
"fork": false,
|
|
"created_at": "2026-01-29T02:01:42Z",
|
|
"updated_at": "2026-01-29T02:02:19Z",
|
|
"pushed_at": "2026-01-29T02:02:16Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"has_pull_requests": true,
|
|
"pull_request_creation_policy": "all",
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |