mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 21:32:21 +01:00
347 lines
No EOL
13 KiB
JSON
347 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 212541592,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "dorkerdevil\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "dorkerdevil",
|
|
"id": 15796745,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15796745?v=4",
|
|
"html_url": "https:\/\/github.com\/dorkerdevil"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dorkerdevil\/CVE-2019-11932",
|
|
"description": " double-free bug in WhatsApp exploit poc",
|
|
"fork": false,
|
|
"created_at": "2019-10-03T09:26:24Z",
|
|
"updated_at": "2021-02-26T21:51:56Z",
|
|
"pushed_at": "2019-10-03T09:43:55Z",
|
|
"stargazers_count": 243,
|
|
"watchers_count": 243,
|
|
"forks_count": 76,
|
|
"forks": 76,
|
|
"watchers": 243,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 212824676,
|
|
"name": "WhatsRCE",
|
|
"full_name": "KeepWannabe\/WhatsRCE",
|
|
"owner": {
|
|
"login": "KeepWannabe",
|
|
"id": 31374361,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31374361?v=4",
|
|
"html_url": "https:\/\/github.com\/KeepWannabe"
|
|
},
|
|
"html_url": "https:\/\/github.com\/KeepWannabe\/WhatsRCE",
|
|
"description": "This is a Automated Generate Payload for CVE-2019-11932 (WhatsApp Remote Code Execution)",
|
|
"fork": false,
|
|
"created_at": "2019-10-04T13:45:44Z",
|
|
"updated_at": "2020-11-17T15:51:23Z",
|
|
"pushed_at": "2020-10-01T08:43:36Z",
|
|
"stargazers_count": 70,
|
|
"watchers_count": 70,
|
|
"forks_count": 33,
|
|
"forks": 33,
|
|
"watchers": 70,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 212837105,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "awakened1712\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "awakened1712",
|
|
"id": 628212,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628212?v=4",
|
|
"html_url": "https:\/\/github.com\/awakened1712"
|
|
},
|
|
"html_url": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"description": "Simple POC for exploiting WhatsApp double-free bug in DDGifSlurp in decoding.c in libpl_droidsonroids_gif",
|
|
"fork": false,
|
|
"created_at": "2019-10-04T14:43:57Z",
|
|
"updated_at": "2021-03-12T16:33:07Z",
|
|
"pushed_at": "2019-11-30T10:28:01Z",
|
|
"stargazers_count": 145,
|
|
"watchers_count": 145,
|
|
"forks_count": 81,
|
|
"forks": 81,
|
|
"watchers": 145,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 212954402,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "TulungagungCyberLink\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "TulungagungCyberLink",
|
|
"id": 46483873,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46483873?v=4",
|
|
"html_url": "https:\/\/github.com\/TulungagungCyberLink"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TulungagungCyberLink\/CVE-2019-11932",
|
|
"description": "Double-Free BUG in WhatsApp exploit poc.",
|
|
"fork": false,
|
|
"created_at": "2019-10-05T06:24:08Z",
|
|
"updated_at": "2019-11-03T03:01:39Z",
|
|
"pushed_at": "2019-10-08T06:17:40Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 213187543,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "infiniteLoopers\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "infiniteLoopers",
|
|
"id": 27885817,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27885817?v=4",
|
|
"html_url": "https:\/\/github.com\/infiniteLoopers"
|
|
},
|
|
"html_url": "https:\/\/github.com\/infiniteLoopers\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-10-06T14:54:35Z",
|
|
"updated_at": "2019-10-18T20:41:54Z",
|
|
"pushed_at": "2019-10-06T15:34:22Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 213971107,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "alexanderstonec\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "alexanderstonec",
|
|
"id": 52692998,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52692998?v=4",
|
|
"html_url": "https:\/\/github.com\/alexanderstonec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/alexanderstonec\/CVE-2019-11932",
|
|
"description": "The exploit works well until WhatsApp version 2.19.230. The vulnerability is official patched in WhatsApp version 2.19.244",
|
|
"fork": false,
|
|
"created_at": "2019-10-09T16:41:38Z",
|
|
"updated_at": "2020-03-19T03:06:30Z",
|
|
"pushed_at": "2019-10-09T17:00:02Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 215516489,
|
|
"name": "CVE-2019-11932-SupportApp",
|
|
"full_name": "valbrux\/CVE-2019-11932-SupportApp",
|
|
"owner": {
|
|
"login": "valbrux",
|
|
"id": 20357515,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20357515?v=4",
|
|
"html_url": "https:\/\/github.com\/valbrux"
|
|
},
|
|
"html_url": "https:\/\/github.com\/valbrux\/CVE-2019-11932-SupportApp",
|
|
"description": "This native code file aims to be complementary to the published Whatsapp GIF RCE exploit by Awakened , by calculating the system() function address and ROP gadget address for different types of devices, which then can be used to successfully exploit the vulnerability. ",
|
|
"fork": false,
|
|
"created_at": "2019-10-16T10:04:30Z",
|
|
"updated_at": "2020-07-16T04:23:00Z",
|
|
"pushed_at": "2019-10-16T12:20:53Z",
|
|
"stargazers_count": 22,
|
|
"watchers_count": 22,
|
|
"forks_count": 13,
|
|
"forks": 13,
|
|
"watchers": 22,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 215635890,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "fastmo\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "fastmo",
|
|
"id": 53575270,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53575270?v=4",
|
|
"html_url": "https:\/\/github.com\/fastmo"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fastmo\/CVE-2019-11932",
|
|
"description": "Programa para hackear Whatsapp Mediante Gif ,asiendo un exploit con el puerto.",
|
|
"fork": false,
|
|
"created_at": "2019-10-16T20:13:23Z",
|
|
"updated_at": "2020-03-30T02:16:58Z",
|
|
"pushed_at": "2019-10-16T20:24:56Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 217001772,
|
|
"name": "CVE-2019-11932-whatsApp-exploit",
|
|
"full_name": "mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
|
"owner": {
|
|
"login": "mRanonyMousTZ",
|
|
"id": 38766899,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38766899?v=4",
|
|
"html_url": "https:\/\/github.com\/mRanonyMousTZ"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mRanonyMousTZ\/CVE-2019-11932-whatsApp-exploit",
|
|
"description": "Double-free vulnerability in DDGifSlurp in decoding.c in libpl_droidsonroids_gif can read more https:\/\/awakened1712.github.io\/hacking\/hacking-whatsapp-gif-rce\/",
|
|
"fork": false,
|
|
"created_at": "2019-10-23T08:02:15Z",
|
|
"updated_at": "2020-12-27T09:47:19Z",
|
|
"pushed_at": "2019-10-23T08:25:48Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 9,
|
|
"forks": 9,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 228222453,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "SmoZy92\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "SmoZy92",
|
|
"id": 58377338,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58377338?v=4",
|
|
"html_url": "https:\/\/github.com\/SmoZy92"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SmoZy92\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2019-12-15T17:21:26Z",
|
|
"updated_at": "2020-09-02T11:23:41Z",
|
|
"pushed_at": "2019-12-15T17:40:15Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 239654888,
|
|
"name": "https-github.com-awakened171",
|
|
"full_name": "dashtic172\/https-github.com-awakened171",
|
|
"owner": {
|
|
"login": "dashtic172",
|
|
"id": 60906735,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60906735?v=4",
|
|
"html_url": "https:\/\/github.com\/dashtic172"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dashtic172\/https-github.com-awakened171",
|
|
"description": "https:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"fork": false,
|
|
"created_at": "2020-02-11T02:00:14Z",
|
|
"updated_at": "2020-02-11T02:00:14Z",
|
|
"pushed_at": "2020-02-11T02:00:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 258020988,
|
|
"name": "WhatsPayloadRCE",
|
|
"full_name": "Err0r-ICA\/WhatsPayloadRCE",
|
|
"owner": {
|
|
"login": "Err0r-ICA",
|
|
"id": 59941931,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59941931?v=4",
|
|
"html_url": "https:\/\/github.com\/Err0r-ICA"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Err0r-ICA\/WhatsPayloadRCE",
|
|
"description": "Whatsapp Automatic Payload Generator [CVE-2019-11932]",
|
|
"fork": false,
|
|
"created_at": "2020-04-22T21:11:27Z",
|
|
"updated_at": "2020-12-09T01:00:27Z",
|
|
"pushed_at": "2020-04-28T04:25:33Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 288889170,
|
|
"name": "CVE-2019-11932-SupportApp",
|
|
"full_name": "starling021\/CVE-2019-11932-SupportApp",
|
|
"owner": {
|
|
"login": "starling021",
|
|
"id": 69880426,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69880426?v=4",
|
|
"html_url": "https:\/\/github.com\/starling021"
|
|
},
|
|
"html_url": "https:\/\/github.com\/starling021\/CVE-2019-11932-SupportApp",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-08-20T02:45:40Z",
|
|
"updated_at": "2020-08-20T02:45:54Z",
|
|
"pushed_at": "2020-08-20T02:45:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 294892081,
|
|
"name": "CVE-2019-11932",
|
|
"full_name": "Hacker-Yadav\/CVE-2019-11932",
|
|
"owner": {
|
|
"login": "Hacker-Yadav",
|
|
"id": 64252861,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64252861?v=4",
|
|
"html_url": "https:\/\/github.com\/Hacker-Yadav"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Hacker-Yadav\/CVE-2019-11932",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-12T07:18:57Z",
|
|
"updated_at": "2020-09-12T07:19:57Z",
|
|
"pushed_at": "2020-09-12T07:19:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 323076010,
|
|
"name": "hello",
|
|
"full_name": "BadAssAiras\/hello",
|
|
"owner": {
|
|
"login": "BadAssAiras",
|
|
"id": 76394667,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76394667?v=4",
|
|
"html_url": "https:\/\/github.com\/BadAssAiras"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BadAssAiras\/hello",
|
|
"description": "https:\/\/github.com\/awakened1712\/CVE-2019-11932:\/\/github.com\/awakened1712\/CVE-2019-11932",
|
|
"fork": false,
|
|
"created_at": "2020-12-20T13:17:19Z",
|
|
"updated_at": "2020-12-20T13:17:19Z",
|
|
"pushed_at": "2020-12-20T13:17:21Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |