mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
169 lines
No EOL
5.6 KiB
JSON
169 lines
No EOL
5.6 KiB
JSON
[
|
|
{
|
|
"id": 356390440,
|
|
"name": "vsftpd2.3.4PyExploit",
|
|
"full_name": "HerculesRD\/vsftpd2.3.4PyExploit",
|
|
"owner": {
|
|
"login": "HerculesRD",
|
|
"id": 73125772,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
|
|
"html_url": "https:\/\/github.com\/HerculesRD"
|
|
},
|
|
"html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit",
|
|
"description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python",
|
|
"fork": false,
|
|
"created_at": "2021-04-09T20:26:01Z",
|
|
"updated_at": "2021-04-12T17:16:08Z",
|
|
"pushed_at": "2021-04-12T17:16:06Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 363437748,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "nobodyatall648\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "nobodyatall648",
|
|
"id": 35725871,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
|
|
"html_url": "https:\/\/github.com\/nobodyatall648"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523",
|
|
"description": "vsftpd 2.3.4 Backdoor Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-05-01T15:03:55Z",
|
|
"updated_at": "2021-10-29T18:25:03Z",
|
|
"pushed_at": "2021-06-25T19:05:49Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 401789640,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "Gr4ykt\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "Gr4ykt",
|
|
"id": 78503985,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4",
|
|
"html_url": "https:\/\/github.com\/Gr4ykt"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523",
|
|
"description": "https:\/\/www.exploit-db.com\/exploits\/49757",
|
|
"fork": false,
|
|
"created_at": "2021-08-31T17:31:30Z",
|
|
"updated_at": "2021-08-31T17:34:41Z",
|
|
"pushed_at": "2021-08-31T17:34:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 425428807,
|
|
"name": "CVE-2011-2523",
|
|
"full_name": "padsalatushal\/CVE-2011-2523",
|
|
"owner": {
|
|
"login": "padsalatushal",
|
|
"id": 57517785,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
|
|
"html_url": "https:\/\/github.com\/padsalatushal"
|
|
},
|
|
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
|
|
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
|
|
"fork": false,
|
|
"created_at": "2021-11-07T06:20:27Z",
|
|
"updated_at": "2021-11-07T10:53:35Z",
|
|
"pushed_at": "2021-11-07T10:16:27Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 440981441,
|
|
"name": "vsFTPd-2.3.4-exploit",
|
|
"full_name": "whoamins\/vsFTPd-2.3.4-exploit",
|
|
"owner": {
|
|
"login": "whoamins",
|
|
"id": 66217512,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66217512?v=4",
|
|
"html_url": "https:\/\/github.com\/whoamins"
|
|
},
|
|
"html_url": "https:\/\/github.com\/whoamins\/vsFTPd-2.3.4-exploit",
|
|
"description": "vsFTPd 2.3.4 Backdoor Exploit CVE-2011-2523",
|
|
"fork": false,
|
|
"created_at": "2021-12-22T20:51:35Z",
|
|
"updated_at": "2021-12-26T13:32:33Z",
|
|
"pushed_at": "2021-12-26T13:32:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"exploit",
|
|
"pwn",
|
|
"pwntools",
|
|
"python3"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 470176260,
|
|
"name": "vsftpd-2.3.4",
|
|
"full_name": "Prestaa\/vsftpd-2.3.4",
|
|
"owner": {
|
|
"login": "Prestaa",
|
|
"id": 95232318,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/95232318?v=4",
|
|
"html_url": "https:\/\/github.com\/Prestaa"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Prestaa\/vsftpd-2.3.4",
|
|
"description": "Simple python script to exploit VsFTPd 2.3.4 Backdoor Command Execution (CVE-2011-2523)",
|
|
"fork": false,
|
|
"created_at": "2022-03-15T13:39:19Z",
|
|
"updated_at": "2022-04-01T11:25:38Z",
|
|
"pushed_at": "2022-03-30T18:46:09Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
}
|
|
] |