PoC-in-GitHub/2017/CVE-2017-0781.json
2021-07-03 00:11:48 +09:00

94 lines
No EOL
4.1 KiB
JSON

[
{
"id": 106299703,
"name": "CVE-2017-0781",
"full_name": "ojasookert\/CVE-2017-0781",
"owner": {
"login": "ojasookert",
"id": 12931198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12931198?v=4",
"html_url": "https:\/\/github.com\/ojasookert"
},
"html_url": "https:\/\/github.com\/ojasookert\/CVE-2017-0781",
"description": "Blueborne CVE-2017-0781 Android heap overflow vulnerability",
"fork": false,
"created_at": "2017-10-09T15:13:25Z",
"updated_at": "2021-07-02T12:38:47Z",
"pushed_at": "2017-10-09T15:20:11Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 39,
"forks": 39,
"watchers": 77,
"score": 0
},
{
"id": 125669064,
"name": "android712-blueborne",
"full_name": "marcinguy\/android712-blueborne",
"owner": {
"login": "marcinguy",
"id": 20355405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20355405?v=4",
"html_url": "https:\/\/github.com\/marcinguy"
},
"html_url": "https:\/\/github.com\/marcinguy\/android712-blueborne",
"description": "Android Blueborne RCE CVE-2017-0781",
"fork": false,
"created_at": "2018-03-17T21:07:24Z",
"updated_at": "2020-12-14T00:02:06Z",
"pushed_at": "2018-04-04T12:59:18Z",
"stargazers_count": 68,
"watchers_count": 68,
"forks_count": 23,
"forks": 23,
"watchers": 68,
"score": 0
},
{
"id": 283876725,
"name": "BlueborneDetection",
"full_name": "mjancek\/BlueborneDetection",
"owner": {
"login": "mjancek",
"id": 32901382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32901382?v=4",
"html_url": "https:\/\/github.com\/mjancek"
},
"html_url": "https:\/\/github.com\/mjancek\/BlueborneDetection",
"description": "Simple detection tool for Blueborne vulnerability found on Android devices --- CVE-2017-0781. ",
"fork": false,
"created_at": "2020-07-30T21:06:19Z",
"updated_at": "2021-04-30T12:44:56Z",
"pushed_at": "2021-04-30T12:44:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 303310240,
"name": "Blue-Borne",
"full_name": "CrackSoft900\/Blue-Borne",
"owner": {
"login": "CrackSoft900",
"id": 69074572,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69074572?v=4",
"html_url": "https:\/\/github.com\/CrackSoft900"
},
"html_url": "https:\/\/github.com\/CrackSoft900\/Blue-Borne",
"description": "BlueBorne Exploits & Framework This repository contains a PoC code of various exploits for the BlueBorne vulnerabilities. Under 'android' exploits for the Android RCE vulnerability (CVE-2017-0781), and the SDP Information leak vulnerability (CVE-2017-0785) can be found. Under 'linux-bluez' exploits for the Linux-RCE vulnerability (CVE-2017-1000251) can be found (for Amazon Echo, and Samsung Gear S3). Under 'l2cap_infra' a general testing framework to send and receive raw l2cap messages (using scapy) can be found. Under 'nRF24_BDADDR_Sniffer' a tool to capture bluetooth mac addresses (BDADDR) over the air, using a nRF24L01 chip For more details on BlueBorne, you may read the full technical white paper available here: https:\/\/www.armis.com\/blueborne\/ In addition a several detailed blog posts on the exploitation of these vulnerability can be found here: https:\/\/www.armis.com\/blog\/ =============== Dependencies:",
"fork": false,
"created_at": "2020-10-12T07:21:08Z",
"updated_at": "2021-05-28T08:19:58Z",
"pushed_at": "2020-11-04T16:49:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]