mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
58 lines
No EOL
2 KiB
JSON
58 lines
No EOL
2 KiB
JSON
[
|
|
{
|
|
"id": 57888209,
|
|
"name": "cve-2015-6639",
|
|
"full_name": "laginimaineb\/cve-2015-6639",
|
|
"owner": {
|
|
"login": "laginimaineb",
|
|
"id": 11378334,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4",
|
|
"html_url": "https:\/\/github.com\/laginimaineb"
|
|
},
|
|
"html_url": "https:\/\/github.com\/laginimaineb\/cve-2015-6639",
|
|
"description": "QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)",
|
|
"fork": false,
|
|
"created_at": "2016-05-02T12:18:57Z",
|
|
"updated_at": "2022-06-29T07:41:24Z",
|
|
"pushed_at": "2019-08-13T07:14:01Z",
|
|
"stargazers_count": 110,
|
|
"watchers_count": 110,
|
|
"forks_count": 56,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 56,
|
|
"watchers": 110,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 62306972,
|
|
"name": "ExtractKeyMaster",
|
|
"full_name": "laginimaineb\/ExtractKeyMaster",
|
|
"owner": {
|
|
"login": "laginimaineb",
|
|
"id": 11378334,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11378334?v=4",
|
|
"html_url": "https:\/\/github.com\/laginimaineb"
|
|
},
|
|
"html_url": "https:\/\/github.com\/laginimaineb\/ExtractKeyMaster",
|
|
"description": "Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431",
|
|
"fork": false,
|
|
"created_at": "2016-06-30T11:56:44Z",
|
|
"updated_at": "2022-07-09T00:25:41Z",
|
|
"pushed_at": "2016-06-30T15:32:42Z",
|
|
"stargazers_count": 319,
|
|
"watchers_count": 319,
|
|
"forks_count": 116,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 116,
|
|
"watchers": 319,
|
|
"score": 0
|
|
}
|
|
] |