mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
94 lines
No EOL
3.2 KiB
JSON
94 lines
No EOL
3.2 KiB
JSON
[
|
|
{
|
|
"id": 42340022,
|
|
"name": "CVE-2015-3636",
|
|
"full_name": "fi01\/CVE-2015-3636",
|
|
"owner": {
|
|
"login": "fi01",
|
|
"id": 3073214,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3073214?v=4",
|
|
"html_url": "https:\/\/github.com\/fi01"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fi01\/CVE-2015-3636",
|
|
"description": "PoC code for 32 bit Android OS",
|
|
"fork": false,
|
|
"created_at": "2015-09-12T01:31:36Z",
|
|
"updated_at": "2020-06-23T13:37:22Z",
|
|
"pushed_at": "2015-12-15T05:42:02Z",
|
|
"stargazers_count": 130,
|
|
"watchers_count": 130,
|
|
"forks_count": 96,
|
|
"forks": 96,
|
|
"watchers": 130,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 43815628,
|
|
"name": "libpingpong_exploit",
|
|
"full_name": "android-rooting-tools\/libpingpong_exploit",
|
|
"owner": {
|
|
"login": "android-rooting-tools",
|
|
"id": 4747069,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4747069?v=4",
|
|
"html_url": "https:\/\/github.com\/android-rooting-tools"
|
|
},
|
|
"html_url": "https:\/\/github.com\/android-rooting-tools\/libpingpong_exploit",
|
|
"description": "CVE-2015-3636 exploit ",
|
|
"fork": false,
|
|
"created_at": "2015-10-07T12:54:57Z",
|
|
"updated_at": "2019-04-28T15:45:57Z",
|
|
"pushed_at": "2015-11-22T06:20:42Z",
|
|
"stargazers_count": 41,
|
|
"watchers_count": 41,
|
|
"forks_count": 30,
|
|
"forks": 30,
|
|
"watchers": 41,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 63220214,
|
|
"name": "rattle_root",
|
|
"full_name": "debugfan\/rattle_root",
|
|
"owner": {
|
|
"login": "debugfan",
|
|
"id": 5540258,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5540258?v=4",
|
|
"html_url": "https:\/\/github.com\/debugfan"
|
|
},
|
|
"html_url": "https:\/\/github.com\/debugfan\/rattle_root",
|
|
"description": "root with CVE-2015-3636",
|
|
"fork": false,
|
|
"created_at": "2016-07-13T06:23:54Z",
|
|
"updated_at": "2017-06-27T13:20:08Z",
|
|
"pushed_at": "2016-07-13T06:24:19Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 77807643,
|
|
"name": "CVE-2015-3636",
|
|
"full_name": "a7vinx\/CVE-2015-3636",
|
|
"owner": {
|
|
"login": "a7vinx",
|
|
"id": 12729836,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/12729836?v=4",
|
|
"html_url": "https:\/\/github.com\/a7vinx"
|
|
},
|
|
"html_url": "https:\/\/github.com\/a7vinx\/CVE-2015-3636",
|
|
"description": "Expolit for android (goldfish kernel v3.10.0+) on arm64 with PXN&SELinux Bypassed. Based on fi01's code.",
|
|
"fork": false,
|
|
"created_at": "2017-01-02T02:59:29Z",
|
|
"updated_at": "2020-06-23T13:32:36Z",
|
|
"pushed_at": "2017-01-03T02:38:48Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 15,
|
|
"score": 0
|
|
}
|
|
] |