mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
94 lines
No EOL
4.1 KiB
JSON
94 lines
No EOL
4.1 KiB
JSON
[
|
|
{
|
|
"id": 106299703,
|
|
"name": "CVE-2017-0781",
|
|
"full_name": "ojasookert\/CVE-2017-0781",
|
|
"owner": {
|
|
"login": "ojasookert",
|
|
"id": 12931198,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
|
|
"html_url": "https:\/\/github.com\/ojasookert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
|
|
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
|
|
"fork": false,
|
|
"created_at": "2017-10-09T15:13:25Z",
|
|
"updated_at": "2021-07-02T12:38:47Z",
|
|
"pushed_at": "2017-10-09T15:20:11Z",
|
|
"stargazers_count": 77,
|
|
"watchers_count": 77,
|
|
"forks_count": 39,
|
|
"forks": 39,
|
|
"watchers": 77,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 125669064,
|
|
"name": "android712-blueborne",
|
|
"full_name": "marcinguy\/android712-blueborne",
|
|
"owner": {
|
|
"login": "marcinguy",
|
|
"id": 20355405,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
|
|
"html_url": "https:\/\/github.com\/marcinguy"
|
|
},
|
|
"html_url": "https:\/\/github.com\/marcinguy\/android712-blueborne",
|
|
"description": "Android Blueborne RCE CVE-2017-0781",
|
|
"fork": false,
|
|
"created_at": "2018-03-17T21:07:24Z",
|
|
"updated_at": "2020-12-14T00:02:06Z",
|
|
"pushed_at": "2018-04-04T12:59:18Z",
|
|
"stargazers_count": 68,
|
|
"watchers_count": 68,
|
|
"forks_count": 23,
|
|
"forks": 23,
|
|
"watchers": 68,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 283876725,
|
|
"name": "BlueborneDetection",
|
|
"full_name": "mjancek\/BlueborneDetection",
|
|
"owner": {
|
|
"login": "mjancek",
|
|
"id": 32901382,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32901382?v=4",
|
|
"html_url": "https:\/\/github.com\/mjancek"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mjancek\/BlueborneDetection",
|
|
"description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ",
|
|
"fork": false,
|
|
"created_at": "2020-07-30T21:06:19Z",
|
|
"updated_at": "2021-04-30T12:44:56Z",
|
|
"pushed_at": "2021-04-30T12:44:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 303310240,
|
|
"name": "Blue-Borne",
|
|
"full_name": "CrackSoft900\/Blue-Borne",
|
|
"owner": {
|
|
"login": "CrackSoft900",
|
|
"id": 69074572,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69074572?v=4",
|
|
"html_url": "https:\/\/github.com\/CrackSoft900"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CrackSoft900\/Blue-Borne",
|
|
"description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:",
|
|
"fork": false,
|
|
"created_at": "2020-10-12T07:21:08Z",
|
|
"updated_at": "2021-05-28T08:19:58Z",
|
|
"pushed_at": "2020-11-04T16:49:05Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |