PoC-in-GitHub/2022/CVE-2022-1388.json
2022-07-10 15:15:45 +09:00

1595 lines
No EOL
54 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 488929451,
"name": "CVE-2022-1388",
"full_name": "numanturle\/CVE-2022-1388",
"owner": {
"login": "numanturle",
"id": 7007951,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7007951?v=4",
"html_url": "https:\/\/github.com\/numanturle"
},
"html_url": "https:\/\/github.com\/numanturle\/CVE-2022-1388",
"description": "K23605346: BIG-IP iControl REST vulnerability CVE-2022-1388",
"fork": false,
"created_at": "2022-05-05T10:35:35Z",
"updated_at": "2022-06-15T19:59:21Z",
"pushed_at": "2022-05-09T21:09:45Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 51,
"score": 0
},
{
"id": 489026843,
"name": "CVE-2022-1388-checker",
"full_name": "jheeree\/CVE-2022-1388-checker",
"owner": {
"login": "jheeree",
"id": 19227591,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19227591?v=4",
"html_url": "https:\/\/github.com\/jheeree"
},
"html_url": "https:\/\/github.com\/jheeree\/CVE-2022-1388-checker",
"description": "Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)",
"fork": false,
"created_at": "2022-05-05T15:25:53Z",
"updated_at": "2022-05-24T05:24:31Z",
"pushed_at": "2022-05-05T22:49:40Z",
"stargazers_count": 26,
"watchers_count": 26,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 26,
"score": 0
},
{
"id": 489745068,
"name": "CVE-2022-1388-EXP",
"full_name": "bytecaps\/CVE-2022-1388-EXP",
"owner": {
"login": "bytecaps",
"id": 52679771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
"html_url": "https:\/\/github.com\/bytecaps"
},
"html_url": "https:\/\/github.com\/bytecaps\/CVE-2022-1388-EXP",
"description": "CVE-2022-1388 F5 BIG-IP RCE 批量检测",
"fork": false,
"created_at": "2022-05-07T17:54:08Z",
"updated_at": "2022-07-10T01:42:57Z",
"pushed_at": "2022-05-09T11:15:27Z",
"stargazers_count": 77,
"watchers_count": 77,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 77,
"score": 0
},
{
"id": 489899447,
"name": "CVE-2022-1388-RCE-checker-and-POC-Exploit",
"full_name": "blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit",
"owner": {
"login": "blind-intruder",
"id": 41877347,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41877347?v=4",
"html_url": "https:\/\/github.com\/blind-intruder"
},
"html_url": "https:\/\/github.com\/blind-intruder\/CVE-2022-1388-RCE-checker-and-POC-Exploit",
"description": null,
"fork": false,
"created_at": "2022-05-08T09:28:19Z",
"updated_at": "2022-05-10T12:40:23Z",
"pushed_at": "2022-05-12T11:46:56Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 4,
"score": 0
},
{
"id": 490120378,
"name": "CVE-2022-1388",
"full_name": "Hudi233\/CVE-2022-1388",
"owner": {
"login": "Hudi233",
"id": 20939673,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20939673?v=4",
"html_url": "https:\/\/github.com\/Hudi233"
},
"html_url": "https:\/\/github.com\/Hudi233\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-09T03:20:46Z",
"updated_at": "2022-05-09T03:30:48Z",
"pushed_at": "2022-05-09T03:35:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 490182003,
"name": "CVE-2022-1388-Exploit-POC",
"full_name": "sherlocksecurity\/CVE-2022-1388-Exploit-POC",
"owner": {
"login": "sherlocksecurity",
"id": 52328067,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4",
"html_url": "https:\/\/github.com\/sherlocksecurity"
},
"html_url": "https:\/\/github.com\/sherlocksecurity\/CVE-2022-1388-Exploit-POC",
"description": "PoC for CVE-2022-1388_F5_BIG-IP",
"fork": false,
"created_at": "2022-05-09T07:39:55Z",
"updated_at": "2022-06-07T00:54:41Z",
"pushed_at": "2022-05-15T02:30:40Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 57,
"score": 0
},
{
"id": 490229104,
"name": "CVE-2022-1388",
"full_name": "yukar1z0e\/CVE-2022-1388",
"owner": {
"login": "yukar1z0e",
"id": 44317939,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
"html_url": "https:\/\/github.com\/yukar1z0e"
},
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2022-1388",
"description": "batch scan CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T10:06:11Z",
"updated_at": "2022-06-21T09:37:19Z",
"pushed_at": "2022-05-09T10:07:45Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 490234251,
"name": "CVE-2022-1388",
"full_name": "0xf4n9x\/CVE-2022-1388",
"owner": {
"login": "0xf4n9x",
"id": 40891670,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40891670?v=4",
"html_url": "https:\/\/github.com\/0xf4n9x"
},
"html_url": "https:\/\/github.com\/0xf4n9x\/CVE-2022-1388",
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE",
"fork": false,
"created_at": "2022-05-09T10:22:31Z",
"updated_at": "2022-07-05T07:31:32Z",
"pushed_at": "2022-06-28T18:14:40Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 30,
"watchers": 72,
"score": 0
},
{
"id": 490237968,
"name": "CVE-2022-1388_PoC",
"full_name": "alt3kx\/CVE-2022-1388_PoC",
"owner": {
"login": "alt3kx",
"id": 3140111,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
"html_url": "https:\/\/github.com\/alt3kx"
},
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2022-1388_PoC",
"description": "F5 BIG-IP RCE exploitation (CVE-2022-1388)",
"fork": false,
"created_at": "2022-05-09T10:34:38Z",
"updated_at": "2022-07-02T06:29:28Z",
"pushed_at": "2022-05-16T12:40:51Z",
"stargazers_count": 65,
"watchers_count": 65,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 65,
"score": 0
},
{
"id": 490241404,
"name": "F5-Big-IP-CVE-2022-1388",
"full_name": "Vulnmachines\/F5-Big-IP-CVE-2022-1388",
"owner": {
"login": "Vulnmachines",
"id": 79006904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79006904?v=4",
"html_url": "https:\/\/github.com\/Vulnmachines"
},
"html_url": "https:\/\/github.com\/Vulnmachines\/F5-Big-IP-CVE-2022-1388",
"description": "CVE-2022-1388 F5 Big IP unauth remote code execution",
"fork": false,
"created_at": "2022-05-09T10:46:19Z",
"updated_at": "2022-05-10T09:13:25Z",
"pushed_at": "2022-05-09T11:04:58Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 3,
"score": 0
},
{
"id": 490254474,
"name": "F5-CVE-2022-1388-Exploit",
"full_name": "ZephrFish\/F5-CVE-2022-1388-Exploit",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/F5-CVE-2022-1388-Exploit",
"description": "Exploit and Check Script for CVE 2022-1388",
"fork": false,
"created_at": "2022-05-09T11:30:09Z",
"updated_at": "2022-07-02T06:38:04Z",
"pushed_at": "2022-05-26T23:51:01Z",
"stargazers_count": 45,
"watchers_count": 45,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 45,
"score": 0
},
{
"id": 490259731,
"name": "CVE-2022-1388",
"full_name": "horizon3ai\/CVE-2022-1388",
"owner": {
"login": "horizon3ai",
"id": 79593994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4",
"html_url": "https:\/\/github.com\/horizon3ai"
},
"html_url": "https:\/\/github.com\/horizon3ai\/CVE-2022-1388",
"description": "POC for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T11:46:45Z",
"updated_at": "2022-07-06T03:19:47Z",
"pushed_at": "2022-05-09T20:52:07Z",
"stargazers_count": 212,
"watchers_count": 212,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 212,
"score": 0
},
{
"id": 490307613,
"name": "CVE-2022-1388",
"full_name": "Al1ex\/CVE-2022-1388",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-1388",
"description": "CVE-2022-1388 F5 BIG-IP iControl REST RCE",
"fork": false,
"created_at": "2022-05-09T14:01:38Z",
"updated_at": "2022-06-09T10:44:05Z",
"pushed_at": "2022-05-09T14:20:40Z",
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce"
],
"visibility": "public",
"forks": 8,
"watchers": 22,
"score": 0
},
{
"id": 490307975,
"name": "CVE-2022-1388",
"full_name": "Henry4E36\/CVE-2022-1388",
"owner": {
"login": "Henry4E36",
"id": 41940481,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41940481?v=4",
"html_url": "https:\/\/github.com\/Henry4E36"
},
"html_url": "https:\/\/github.com\/Henry4E36\/CVE-2022-1388",
"description": "F5 BIG-IP iControl REST身份验证绕过漏洞",
"fork": false,
"created_at": "2022-05-09T14:02:34Z",
"updated_at": "2022-05-15T13:30:09Z",
"pushed_at": "2022-05-13T12:06:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0
},
{
"id": 490321219,
"name": "CVE-2022-1388",
"full_name": "savior-only\/CVE-2022-1388",
"owner": {
"login": "savior-only",
"id": 69495405,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69495405?v=4",
"html_url": "https:\/\/github.com\/savior-only"
},
"html_url": "https:\/\/github.com\/savior-only\/CVE-2022-1388",
"description": "CVE-2022-1388 F5 BIG-IP iControl REST身份验证绕过漏洞",
"fork": false,
"created_at": "2022-05-09T14:37:04Z",
"updated_at": "2022-05-09T14:39:16Z",
"pushed_at": "2022-05-13T18:18:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 490339060,
"name": "CVE-2022-1388",
"full_name": "saucer-man\/CVE-2022-1388",
"owner": {
"login": "saucer-man",
"id": 32133080,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32133080?v=4",
"html_url": "https:\/\/github.com\/saucer-man"
},
"html_url": "https:\/\/github.com\/saucer-man\/CVE-2022-1388",
"description": "CVE-2022-1388",
"fork": false,
"created_at": "2022-05-09T15:24:27Z",
"updated_at": "2022-07-01T17:11:51Z",
"pushed_at": "2022-05-09T16:14:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 490345813,
"name": "CVE-2022-1388",
"full_name": "superzerosec\/CVE-2022-1388",
"owner": {
"login": "superzerosec",
"id": 57648217,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
"html_url": "https:\/\/github.com\/superzerosec"
},
"html_url": "https:\/\/github.com\/superzerosec\/CVE-2022-1388",
"description": "CVE-2022-1388 POC exploit",
"fork": false,
"created_at": "2022-05-09T15:42:55Z",
"updated_at": "2022-05-10T21:07:51Z",
"pushed_at": "2022-05-10T04:53:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 490383212,
"name": "CVE-2022-1388-RCE-checker",
"full_name": "trhacknon\/CVE-2022-1388-RCE-checker",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-RCE-checker",
"description": null,
"fork": false,
"created_at": "2022-05-09T17:34:28Z",
"updated_at": "2022-05-09T17:34:39Z",
"pushed_at": "2022-05-09T17:34:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 490521216,
"name": "Exploit-F5-CVE-2022-1388",
"full_name": "Stonzyy\/Exploit-F5-CVE-2022-1388",
"owner": {
"login": "Stonzyy",
"id": 33039121,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33039121?v=4",
"html_url": "https:\/\/github.com\/Stonzyy"
},
"html_url": "https:\/\/github.com\/Stonzyy\/Exploit-F5-CVE-2022-1388",
"description": "PoC For F5 BIG-IP - bash script Exploit one Liner",
"fork": false,
"created_at": "2022-05-10T02:57:31Z",
"updated_at": "2022-07-05T08:55:52Z",
"pushed_at": "2022-05-10T08:38:58Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 9,
"score": 0
},
{
"id": 490537604,
"name": "Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
"full_name": "MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
"owner": {
"login": "MrCl0wnLab",
"id": 17049332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17049332?v=4",
"html_url": "https:\/\/github.com\/MrCl0wnLab"
},
"html_url": "https:\/\/github.com\/MrCl0wnLab\/Nuclei-Template-Exploit-F5-BIG-IP-iControl-REST-Auth-Bypass-RCE-Command-Parameter",
"description": "CVE-2022-1388 is an authentication bypass vulnerability in the REST component of BIG-IPs iControl API that was assigned a CVSSv3 score of 9.8. The iControl REST API is used for the management and configuration of BIG-IP devices. CVE-2022-1388 could be exploited by an unauthenticated attacker with network access to the management port or self IP addresses of devices that use BIG-IP. Exploitation would allow the attacker to execute arbitrary system commands, create and delete files and disable services.",
"fork": false,
"created_at": "2022-05-10T04:10:46Z",
"updated_at": "2022-05-12T17:04:20Z",
"pushed_at": "2022-05-12T17:06:29Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bigip",
"bigip-rest-api",
"cve-2022-1388",
"exploit",
"f5-bigip",
"nuclei",
"nuclei-templates"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 490544324,
"name": "F5-BigIP-CVE-2022-1388",
"full_name": "qusaialhaddad\/F5-BigIP-CVE-2022-1388",
"owner": {
"login": "qusaialhaddad",
"id": 9527146,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9527146?v=4",
"html_url": "https:\/\/github.com\/qusaialhaddad"
},
"html_url": "https:\/\/github.com\/qusaialhaddad\/F5-BigIP-CVE-2022-1388",
"description": "Reverse Shell for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-10T04:44:05Z",
"updated_at": "2022-05-15T02:58:27Z",
"pushed_at": "2022-05-10T05:00:43Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0
},
{
"id": 490545813,
"name": "CVE-2022-1388",
"full_name": "chesterblue\/CVE-2022-1388",
"owner": {
"login": "chesterblue",
"id": 38368702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38368702?v=4",
"html_url": "https:\/\/github.com\/chesterblue"
},
"html_url": "https:\/\/github.com\/chesterblue\/CVE-2022-1388",
"description": "POC of CVE-2022-1388",
"fork": false,
"created_at": "2022-05-10T04:51:06Z",
"updated_at": "2022-05-10T05:01:29Z",
"pushed_at": "2022-05-10T04:58:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 490554565,
"name": "F5-BIG-IP-RCE-CVE-2022-1388",
"full_name": "Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
"owner": {
"login": "Angus-Team",
"id": 103045627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103045627?v=4",
"html_url": "https:\/\/github.com\/Angus-Team"
},
"html_url": "https:\/\/github.com\/Angus-Team\/F5-BIG-IP-RCE-CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-10T05:30:11Z",
"updated_at": "2022-06-16T05:09:43Z",
"pushed_at": "2022-05-10T05:35:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 490586814,
"name": "CVE-2022-1388",
"full_name": "hou5\/CVE-2022-1388",
"owner": {
"login": "hou5",
"id": 49178491,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49178491?v=4",
"html_url": "https:\/\/github.com\/hou5"
},
"html_url": "https:\/\/github.com\/hou5\/CVE-2022-1388",
"description": "CVE-2022-1388_goby_pocsuite3",
"fork": false,
"created_at": "2022-05-10T07:24:33Z",
"updated_at": "2022-05-25T11:40:03Z",
"pushed_at": "2022-05-16T01:04:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 490601730,
"name": "CVE-2022-1388-EXP",
"full_name": "LinJacck\/CVE-2022-1388-EXP",
"owner": {
"login": "LinJacck",
"id": 57176639,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57176639?v=4",
"html_url": "https:\/\/github.com\/LinJacck"
},
"html_url": "https:\/\/github.com\/LinJacck\/CVE-2022-1388-EXP",
"description": "CVE-2022-1388-EXP可批量实现攻击",
"fork": false,
"created_at": "2022-05-10T08:09:30Z",
"updated_at": "2022-05-10T13:06:26Z",
"pushed_at": "2022-05-10T08:14:49Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 490606277,
"name": "cve-2022-1388-1veresk",
"full_name": "iveresk\/cve-2022-1388-1veresk",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-1veresk",
"description": "Simple shell script for the exploit",
"fork": false,
"created_at": "2022-05-10T08:22:46Z",
"updated_at": "2022-05-10T08:31:03Z",
"pushed_at": "2022-05-24T12:39:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 490613608,
"name": "CVE-2022-1388",
"full_name": "shamo0\/CVE-2022-1388",
"owner": {
"login": "shamo0",
"id": 48299520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
"html_url": "https:\/\/github.com\/shamo0"
},
"html_url": "https:\/\/github.com\/shamo0\/CVE-2022-1388",
"description": "BIG-IP iControl REST vulnerability CVE-2022-1388 PoC",
"fork": false,
"created_at": "2022-05-10T08:44:24Z",
"updated_at": "2022-05-10T10:15:46Z",
"pushed_at": "2022-05-10T09:09:23Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"1388",
"2022",
"bash",
"bigip",
"cve",
"cve-2022-1388",
"exploit",
"f5",
"icontrol",
"python",
"rest",
"script",
"shell",
"vulnerabilit"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 490623250,
"name": "CVE-2022-1388-F5-BIG-IP",
"full_name": "vesperp\/CVE-2022-1388-F5-BIG-IP",
"owner": {
"login": "vesperp",
"id": 28191544,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28191544?v=4",
"html_url": "https:\/\/github.com\/vesperp"
},
"html_url": "https:\/\/github.com\/vesperp\/CVE-2022-1388-F5-BIG-IP",
"description": null,
"fork": false,
"created_at": "2022-05-10T09:12:22Z",
"updated_at": "2022-05-18T08:46:17Z",
"pushed_at": "2022-05-18T08:32:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 490752282,
"name": "CVE-2022-1388-Exploit",
"full_name": "thatonesecguy\/CVE-2022-1388-Exploit",
"owner": {
"login": "thatonesecguy",
"id": 34110198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4",
"html_url": "https:\/\/github.com\/thatonesecguy"
},
"html_url": "https:\/\/github.com\/thatonesecguy\/CVE-2022-1388-Exploit",
"description": "Test and Exploit Scripts for CVE 2022-1388 (F5 Big-IP)",
"fork": false,
"created_at": "2022-05-10T15:16:12Z",
"updated_at": "2022-06-14T13:15:36Z",
"pushed_at": "2022-05-10T15:28:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 490758825,
"name": "CVE2022-1388_TestAPI",
"full_name": "bandit92\/CVE2022-1388_TestAPI",
"owner": {
"login": "bandit92",
"id": 11216382,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11216382?v=4",
"html_url": "https:\/\/github.com\/bandit92"
},
"html_url": "https:\/\/github.com\/bandit92\/CVE2022-1388_TestAPI",
"description": "A Test API for testing the POC against CVE-2022-1388",
"fork": false,
"created_at": "2022-05-10T15:34:14Z",
"updated_at": "2022-05-26T21:22:13Z",
"pushed_at": "2022-05-10T15:37:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 490762622,
"name": "CVE-2022-1388-PocExp",
"full_name": "aodsec\/CVE-2022-1388-PocExp",
"owner": {
"login": "aodsec",
"id": 96908273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96908273?v=4",
"html_url": "https:\/\/github.com\/aodsec"
},
"html_url": "https:\/\/github.com\/aodsec\/CVE-2022-1388-PocExp",
"description": "CVE-2022-1388-PocExp,新增了多线程,F5 BIG-IP RCE exploitation",
"fork": false,
"created_at": "2022-05-10T15:44:50Z",
"updated_at": "2022-06-11T08:36:43Z",
"pushed_at": "2022-05-16T14:02:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0
},
{
"id": 490856318,
"name": "CVE-2022-1388",
"full_name": "0xAgun\/CVE-2022-1388",
"owner": {
"login": "0xAgun",
"id": 78228966,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78228966?v=4",
"html_url": "https:\/\/github.com\/0xAgun"
},
"html_url": "https:\/\/github.com\/0xAgun\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-10T20:49:12Z",
"updated_at": "2022-05-10T20:50:02Z",
"pushed_at": "2022-05-14T15:01:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491215019,
"name": "CVE-2022-1388-Scanner",
"full_name": "AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner",
"owner": {
"login": "AmirHoseinTangsiriNET",
"id": 64230943,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64230943?v=4",
"html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET"
},
"html_url": "https:\/\/github.com\/AmirHoseinTangsiriNET\/CVE-2022-1388-Scanner",
"description": null,
"fork": false,
"created_at": "2022-05-11T17:43:44Z",
"updated_at": "2022-05-23T01:22:04Z",
"pushed_at": "2022-05-27T11:27:32Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0
},
{
"id": 491248239,
"name": "CVE-2022-1388",
"full_name": "EvilLizard666\/CVE-2022-1388",
"owner": {
"login": "EvilLizard666",
"id": 46286364,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46286364?v=4",
"html_url": "https:\/\/github.com\/EvilLizard666"
},
"html_url": "https:\/\/github.com\/EvilLizard666\/CVE-2022-1388",
"description": "CVE-2022-1388 Scanner",
"fork": false,
"created_at": "2022-05-11T19:33:37Z",
"updated_at": "2022-07-04T19:06:44Z",
"pushed_at": "2022-07-06T00:56:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491258779,
"name": "CVE-2022-1388",
"full_name": "mr-vill4in\/CVE-2022-1388",
"owner": {
"login": "mr-vill4in",
"id": 51061936,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51061936?v=4",
"html_url": "https:\/\/github.com\/mr-vill4in"
},
"html_url": "https:\/\/github.com\/mr-vill4in\/CVE-2022-1388",
"description": "CVE-2022-1388",
"fork": false,
"created_at": "2022-05-11T20:13:09Z",
"updated_at": "2022-05-15T06:59:51Z",
"pushed_at": "2022-05-11T20:15:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 491262541,
"name": "CVE-2022-1388",
"full_name": "omnigodz\/CVE-2022-1388",
"owner": {
"login": "omnigodz",
"id": 20488509,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20488509?v=4",
"html_url": "https:\/\/github.com\/omnigodz"
},
"html_url": "https:\/\/github.com\/omnigodz\/CVE-2022-1388",
"description": "This repository consists of the python exploit for CVE-2022-1388 (F5's BIG-IP Authentication Bypass to RCE) ",
"fork": false,
"created_at": "2022-05-11T20:27:36Z",
"updated_at": "2022-05-11T20:27:59Z",
"pushed_at": "2022-06-08T13:57:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 491283164,
"name": "CVE-2022-1388",
"full_name": "pauloink\/CVE-2022-1388",
"owner": {
"login": "pauloink",
"id": 64289774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64289774?v=4",
"html_url": "https:\/\/github.com\/pauloink"
},
"html_url": "https:\/\/github.com\/pauloink\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-11T21:55:43Z",
"updated_at": "2022-05-11T22:00:15Z",
"pushed_at": "2022-05-11T22:00:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 491500644,
"name": "CVE-2022-1388",
"full_name": "SecTheBit\/CVE-2022-1388",
"owner": {
"login": "SecTheBit",
"id": 46895441,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46895441?v=4",
"html_url": "https:\/\/github.com\/SecTheBit"
},
"html_url": "https:\/\/github.com\/SecTheBit\/CVE-2022-1388",
"description": "Nuclei Template for CVE-2022-1388",
"fork": false,
"created_at": "2022-05-12T12:17:11Z",
"updated_at": "2022-05-13T06:43:45Z",
"pushed_at": "2022-05-12T12:32:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 491598048,
"name": "CVE-2022-1388",
"full_name": "Zeyad-Azima\/CVE-2022-1388",
"owner": {
"login": "Zeyad-Azima",
"id": 62406753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62406753?v=4",
"html_url": "https:\/\/github.com\/Zeyad-Azima"
},
"html_url": "https:\/\/github.com\/Zeyad-Azima\/CVE-2022-1388",
"description": "F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB",
"fork": false,
"created_at": "2022-05-12T16:54:52Z",
"updated_at": "2022-06-17T02:58:31Z",
"pushed_at": "2022-06-07T02:52:17Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2022-1388",
"exploit",
"f5",
"f5-bigip",
"icontrol",
"rest-api"
],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0
},
{
"id": 491851727,
"name": "CVE-2022-1388",
"full_name": "justakazh\/CVE-2022-1388",
"owner": {
"login": "justakazh",
"id": 36891477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36891477?v=4",
"html_url": "https:\/\/github.com\/justakazh"
},
"html_url": "https:\/\/github.com\/justakazh\/CVE-2022-1388",
"description": "Tool for CVE-2022-1388 ",
"fork": false,
"created_at": "2022-05-13T10:18:29Z",
"updated_at": "2022-07-02T06:36:37Z",
"pushed_at": "2022-05-13T10:22:08Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 13,
"score": 0
},
{
"id": 492382276,
"name": "CVE-2022-1388-POC",
"full_name": "PsychoSec2\/CVE-2022-1388-POC",
"owner": {
"login": "PsychoSec2",
"id": 102695468,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102695468?v=4",
"html_url": "https:\/\/github.com\/PsychoSec2"
},
"html_url": "https:\/\/github.com\/PsychoSec2\/CVE-2022-1388-POC",
"description": "An Improved Proof of Concept for CVE-2022-1388 w\/ an Interactive Shell",
"fork": false,
"created_at": "2022-05-15T03:58:21Z",
"updated_at": "2022-07-01T15:40:37Z",
"pushed_at": "2022-05-15T16:34:54Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0
},
{
"id": 492435532,
"name": "cve-2022-1388-iveresk-command-shell",
"full_name": "iveresk\/cve-2022-1388-iveresk-command-shell",
"owner": {
"login": "iveresk",
"id": 28754633,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28754633?v=4",
"html_url": "https:\/\/github.com\/iveresk"
},
"html_url": "https:\/\/github.com\/iveresk\/cve-2022-1388-iveresk-command-shell",
"description": "Improved POC for CVE-2022-1388 that affects multiple F5 products.",
"fork": false,
"created_at": "2022-05-15T08:58:22Z",
"updated_at": "2022-05-18T05:53:50Z",
"pushed_at": "2022-05-24T12:39:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 492651669,
"name": "CVE-2022-1388",
"full_name": "Wrin9\/CVE-2022-1388",
"owner": {
"login": "Wrin9",
"id": 54984589,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54984589?v=4",
"html_url": "https:\/\/github.com\/Wrin9"
},
"html_url": "https:\/\/github.com\/Wrin9\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-16T01:49:44Z",
"updated_at": "2022-06-06T08:02:31Z",
"pushed_at": "2022-05-16T01:52:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 493080053,
"name": "F5-BIG-IP-exploit",
"full_name": "getdrive\/F5-BIG-IP-exploit",
"owner": {
"login": "getdrive",
"id": 20697688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4",
"html_url": "https:\/\/github.com\/getdrive"
},
"html_url": "https:\/\/github.com\/getdrive\/F5-BIG-IP-exploit",
"description": "CVE-2022-1388",
"fork": false,
"created_at": "2022-05-17T03:23:39Z",
"updated_at": "2022-07-02T18:51:04Z",
"pushed_at": "2022-07-02T20:08:48Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"exploit",
"rce"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 493209789,
"name": "CVE-2022-1388-rs",
"full_name": "aancw\/CVE-2022-1388-rs",
"owner": {
"login": "aancw",
"id": 6284204,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6284204?v=4",
"html_url": "https:\/\/github.com\/aancw"
},
"html_url": "https:\/\/github.com\/aancw\/CVE-2022-1388-rs",
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust",
"fork": false,
"created_at": "2022-05-17T10:51:39Z",
"updated_at": "2022-07-04T19:12:27Z",
"pushed_at": "2022-06-01T09:09:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 495067625,
"name": "CVE-2022-1388",
"full_name": "XmasSnowISBACK\/CVE-2022-1388",
"owner": {
"login": "XmasSnowISBACK",
"id": 105931778,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4",
"html_url": "https:\/\/github.com\/XmasSnowISBACK"
},
"html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-1388",
"description": "CVE-2022-1388 F5 BIG-IP iControl REST Auth Bypass RCE written in Rust ",
"fork": false,
"created_at": "2022-05-22T13:27:33Z",
"updated_at": "2022-05-26T19:00:44Z",
"pushed_at": "2022-05-22T13:46:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 497313238,
"name": "CVE-2022-1388",
"full_name": "trhacknon\/CVE-2022-1388",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-28T12:35:59Z",
"updated_at": "2022-05-28T12:36:10Z",
"pushed_at": "2022-05-28T12:36:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 497314363,
"name": "F5-CVE-2022-1388-Exploit",
"full_name": "trhacknon\/F5-CVE-2022-1388-Exploit",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/F5-CVE-2022-1388-Exploit",
"description": null,
"fork": false,
"created_at": "2022-05-28T12:40:56Z",
"updated_at": "2022-05-28T12:41:07Z",
"pushed_at": "2022-05-28T12:41:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 497314878,
"name": "Exploit-F5-CVE-2022-1388",
"full_name": "trhacknon\/Exploit-F5-CVE-2022-1388",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/Exploit-F5-CVE-2022-1388",
"description": null,
"fork": false,
"created_at": "2022-05-28T12:43:18Z",
"updated_at": "2022-05-28T12:43:29Z",
"pushed_at": "2022-05-28T12:43:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 497315561,
"name": "CVE-2022-1388-PocExp",
"full_name": "trhacknon\/CVE-2022-1388-PocExp",
"owner": {
"login": "trhacknon",
"id": 98242014,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98242014?v=4",
"html_url": "https:\/\/github.com\/trhacknon"
},
"html_url": "https:\/\/github.com\/trhacknon\/CVE-2022-1388-PocExp",
"description": null,
"fork": false,
"created_at": "2022-05-28T12:46:08Z",
"updated_at": "2022-05-28T12:46:19Z",
"pushed_at": "2022-05-28T12:46:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 497326298,
"name": "F5-BIG-IP-POC",
"full_name": "west9b\/F5-BIG-IP-POC",
"owner": {
"login": "west9b",
"id": 103512651,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103512651?v=4",
"html_url": "https:\/\/github.com\/west9b"
},
"html_url": "https:\/\/github.com\/west9b\/F5-BIG-IP-POC",
"description": "CVE-2020-5902 CVE-2021-22986 CVE-2022-1388 POC集合",
"fork": false,
"created_at": "2022-05-28T13:30:22Z",
"updated_at": "2022-06-10T08:35:57Z",
"pushed_at": "2022-05-28T14:25:22Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 505264102,
"name": "CVE-2022-1388",
"full_name": "Chocapikk\/CVE-2022-1388",
"owner": {
"login": "Chocapikk",
"id": 88535377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88535377?v=4",
"html_url": "https:\/\/github.com\/Chocapikk"
},
"html_url": "https:\/\/github.com\/Chocapikk\/CVE-2022-1388",
"description": "CVE-2022-1388 | F5 - Big IP Pre Auth RCE via '\/mgmt\/tm\/util\/bash' endpoint",
"fork": false,
"created_at": "2022-06-20T01:58:40Z",
"updated_at": "2022-06-20T05:14:08Z",
"pushed_at": "2022-06-20T02:00:06Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 506835397,
"name": "Mass-CVE-2022-1388",
"full_name": "electr0lulz\/Mass-CVE-2022-1388",
"owner": {
"login": "electr0lulz",
"id": 106660834,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106660834?v=4",
"html_url": "https:\/\/github.com\/electr0lulz"
},
"html_url": "https:\/\/github.com\/electr0lulz\/Mass-CVE-2022-1388",
"description": "Mass-Exploit-CVE-2022-1388",
"fork": false,
"created_at": "2022-06-24T00:58:37Z",
"updated_at": "2022-06-26T02:08:51Z",
"pushed_at": "2022-06-24T01:30:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"1388",
"bash",
"big-ip",
"cve",
"cve-2022-1388",
"f5",
"f5-bigip",
"f5networks",
"python",
"shodan"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 509548569,
"name": "CVE-2022-1388_refresh",
"full_name": "Luchoane\/CVE-2022-1388_refresh",
"owner": {
"login": "Luchoane",
"id": 40374879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40374879?v=4",
"html_url": "https:\/\/github.com\/Luchoane"
},
"html_url": "https:\/\/github.com\/Luchoane\/CVE-2022-1388_refresh",
"description": "PoC for exploiting CVE-2022-1388 on BIG IP F5",
"fork": false,
"created_at": "2022-07-01T18:08:50Z",
"updated_at": "2022-07-07T19:22:09Z",
"pushed_at": "2022-07-01T20:04:27Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 510239425,
"name": "CVE-2022-1388",
"full_name": "jbharucha05\/CVE-2022-1388",
"owner": {
"login": "jbharucha05",
"id": 13020621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13020621?v=4",
"html_url": "https:\/\/github.com\/jbharucha05"
},
"html_url": "https:\/\/github.com\/jbharucha05\/CVE-2022-1388",
"description": "CVE-2022-1388, bypassing iControl REST authentication",
"fork": false,
"created_at": "2022-07-04T06:31:56Z",
"updated_at": "2022-07-04T07:08:22Z",
"pushed_at": "2022-07-04T10:37:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-1388",
"f5-big-ip-icontrol-rest-rce",
"f5-bigip"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]