mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
1221 lines
No EOL
42 KiB
JSON
1221 lines
No EOL
42 KiB
JSON
[
|
||
{
|
||
"id": 84158718,
|
||
"name": "S2-045",
|
||
"full_name": "PolarisLab\/S2-045",
|
||
"owner": {
|
||
"login": "PolarisLab",
|
||
"id": 25890110,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25890110?v=4",
|
||
"html_url": "https:\/\/github.com\/PolarisLab"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
|
||
"description": "Struts2 S2-045(CVE-2017-5638)Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
|
||
"fork": false,
|
||
"created_at": "2017-03-07T05:30:30Z",
|
||
"updated_at": "2019-06-29T02:30:57Z",
|
||
"pushed_at": "2017-03-07T05:37:55Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"forks_count": 12,
|
||
"forks": 12,
|
||
"watchers": 24,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84186490,
|
||
"name": "Struts2-045-Exp",
|
||
"full_name": "Flyteas\/Struts2-045-Exp",
|
||
"owner": {
|
||
"login": "Flyteas",
|
||
"id": 15673913,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/15673913?v=4",
|
||
"html_url": "https:\/\/github.com\/Flyteas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp",
|
||
"description": "Struts2 S2-045(CVE-2017-5638)Exp with GUI",
|
||
"fork": false,
|
||
"created_at": "2017-03-07T10:30:20Z",
|
||
"updated_at": "2019-02-16T10:34:29Z",
|
||
"pushed_at": "2017-03-13T06:30:41Z",
|
||
"stargazers_count": 59,
|
||
"watchers_count": 59,
|
||
"forks_count": 28,
|
||
"forks": 28,
|
||
"watchers": 59,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84481525,
|
||
"name": "S2-045-EXP-POC-TOOLS",
|
||
"full_name": "jas502n\/S2-045-EXP-POC-TOOLS",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS",
|
||
"description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-03-09T19:40:47Z",
|
||
"updated_at": "2019-05-20T09:31:33Z",
|
||
"pushed_at": "2017-03-09T19:50:50Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 19,
|
||
"forks": 19,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84518902,
|
||
"name": "strutszeiro",
|
||
"full_name": "mthbernardes\/strutszeiro",
|
||
"owner": {
|
||
"login": "mthbernardes",
|
||
"id": 12648924,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12648924?v=4",
|
||
"html_url": "https:\/\/github.com\/mthbernardes"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro",
|
||
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
|
||
"fork": false,
|
||
"created_at": "2017-03-10T04:23:41Z",
|
||
"updated_at": "2019-12-06T03:02:52Z",
|
||
"pushed_at": "2017-03-11T04:11:39Z",
|
||
"stargazers_count": 36,
|
||
"watchers_count": 36,
|
||
"forks_count": 22,
|
||
"forks": 22,
|
||
"watchers": 36,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84581800,
|
||
"name": "cve-2017-5638",
|
||
"full_name": "xsscx\/cve-2017-5638",
|
||
"owner": {
|
||
"login": "xsscx",
|
||
"id": 10790582,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/10790582?v=4",
|
||
"html_url": "https:\/\/github.com\/xsscx"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638",
|
||
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
|
||
"fork": false,
|
||
"created_at": "2017-03-10T16:56:14Z",
|
||
"updated_at": "2019-07-07T09:31:11Z",
|
||
"pushed_at": "2017-03-12T15:43:27Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 17,
|
||
"forks": 17,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84602394,
|
||
"name": "apache-struts2-CVE-2017-5638",
|
||
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
|
||
"owner": {
|
||
"login": "immunio",
|
||
"id": 6700387,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6700387?v=4",
|
||
"html_url": "https:\/\/github.com\/immunio"
|
||
},
|
||
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
|
||
"description": "Demo Application and Exploit",
|
||
"fork": false,
|
||
"created_at": "2017-03-10T21:33:25Z",
|
||
"updated_at": "2019-11-01T08:28:27Z",
|
||
"pushed_at": "2017-03-13T15:03:32Z",
|
||
"stargazers_count": 35,
|
||
"watchers_count": 35,
|
||
"forks_count": 34,
|
||
"forks": 34,
|
||
"watchers": 35,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84620334,
|
||
"name": "OgnlContentTypeRejectorValve",
|
||
"full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve",
|
||
"owner": {
|
||
"login": "Masahiro-Yamada",
|
||
"id": 479387,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/479387?v=4",
|
||
"html_url": "https:\/\/github.com\/Masahiro-Yamada"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve",
|
||
"description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)",
|
||
"fork": false,
|
||
"created_at": "2017-03-11T03:18:12Z",
|
||
"updated_at": "2017-04-11T00:06:36Z",
|
||
"pushed_at": "2017-03-13T14:49:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84639178,
|
||
"name": "CVE-2017-5638-Apache-Struts2",
|
||
"full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2",
|
||
"owner": {
|
||
"login": "aljazceru",
|
||
"id": 4439523,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4439523?v=4",
|
||
"html_url": "https:\/\/github.com\/aljazceru"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2",
|
||
"description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ",
|
||
"fork": false,
|
||
"created_at": "2017-03-11T09:39:09Z",
|
||
"updated_at": "2019-07-15T22:02:37Z",
|
||
"pushed_at": "2017-03-11T09:41:27Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84640546,
|
||
"name": "test_struts2_vulnerability_CVE-2017-5638",
|
||
"full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638",
|
||
"owner": {
|
||
"login": "sjitech",
|
||
"id": 5180638,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5180638?v=4",
|
||
"html_url": "https:\/\/github.com\/sjitech"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638",
|
||
"description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X",
|
||
"fork": false,
|
||
"created_at": "2017-03-11T10:03:54Z",
|
||
"updated_at": "2017-03-13T11:14:00Z",
|
||
"pushed_at": "2017-03-13T07:38:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84642680,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "jrrombaldo\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "jrrombaldo",
|
||
"id": 121948,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/121948?v=4",
|
||
"html_url": "https:\/\/github.com\/jrrombaldo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-03-11T10:43:16Z",
|
||
"updated_at": "2017-03-11T13:07:57Z",
|
||
"pushed_at": "2017-03-24T19:12:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84644857,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "random-robbie\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "random-robbie",
|
||
"id": 4902869,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4902869?v=4",
|
||
"html_url": "https:\/\/github.com\/random-robbie"
|
||
},
|
||
"html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638",
|
||
"description": "CVE: 2017-5638 in different formats",
|
||
"fork": false,
|
||
"created_at": "2017-03-11T11:22:44Z",
|
||
"updated_at": "2017-03-11T11:28:58Z",
|
||
"pushed_at": "2017-03-16T11:26:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84655941,
|
||
"name": "CVE-2017-5638_struts",
|
||
"full_name": "initconf\/CVE-2017-5638_struts",
|
||
"owner": {
|
||
"login": "initconf",
|
||
"id": 4044729,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4044729?v=4",
|
||
"html_url": "https:\/\/github.com\/initconf"
|
||
},
|
||
"html_url": "https:\/\/github.com\/initconf\/CVE-2017-5638_struts",
|
||
"description": "detection for Apache Struts recon and compromise ",
|
||
"fork": false,
|
||
"created_at": "2017-03-11T14:30:02Z",
|
||
"updated_at": "2018-08-03T03:54:23Z",
|
||
"pushed_at": "2017-09-15T22:34:00Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84693026,
|
||
"name": "struts-pwn",
|
||
"full_name": "mazen160\/struts-pwn",
|
||
"owner": {
|
||
"login": "mazen160",
|
||
"id": 8996052,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
|
||
"html_url": "https:\/\/github.com\/mazen160"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn",
|
||
"description": "An exploit for Apache Struts CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-03-12T02:02:25Z",
|
||
"updated_at": "2019-11-19T02:50:42Z",
|
||
"pushed_at": "2018-05-21T18:33:26Z",
|
||
"stargazers_count": 350,
|
||
"watchers_count": 350,
|
||
"forks_count": 123,
|
||
"forks": 123,
|
||
"watchers": 350,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84705148,
|
||
"name": "Struts-Apache-ExploitPack",
|
||
"full_name": "ret2got\/Struts-Apache-ExploitPack",
|
||
"owner": {
|
||
"login": "ret2got",
|
||
"id": 20831187,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/20831187?v=4",
|
||
"html_url": "https:\/\/github.com\/ret2got"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ret2got\/Struts-Apache-ExploitPack",
|
||
"description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)",
|
||
"fork": false,
|
||
"created_at": "2017-03-12T06:28:51Z",
|
||
"updated_at": "2019-11-30T18:29:15Z",
|
||
"pushed_at": "2017-03-12T07:26:03Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 11,
|
||
"forks": 11,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84725982,
|
||
"name": "ExpStruts",
|
||
"full_name": "lolwaleet\/ExpStruts",
|
||
"owner": {
|
||
"login": "lolwaleet",
|
||
"id": 20018319,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/20018319?v=4",
|
||
"html_url": "https:\/\/github.com\/lolwaleet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts",
|
||
"description": "A php based exploiter for CVE-2017-5638.",
|
||
"fork": false,
|
||
"created_at": "2017-03-12T13:03:52Z",
|
||
"updated_at": "2017-03-12T15:29:00Z",
|
||
"pushed_at": "2017-03-12T13:04:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 84819853,
|
||
"name": "CVE-2017-5638-Apache-Struts2",
|
||
"full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2",
|
||
"owner": {
|
||
"login": "oktavianto",
|
||
"id": 8210275,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8210275?v=4",
|
||
"html_url": "https:\/\/github.com\/oktavianto"
|
||
},
|
||
"html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2",
|
||
"description": "Example PHP Exploiter for CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-03-13T11:39:55Z",
|
||
"updated_at": "2019-10-17T14:33:00Z",
|
||
"pushed_at": "2017-03-20T19:40:16Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85145901,
|
||
"name": "Strutshock",
|
||
"full_name": "opt9\/Strutshock",
|
||
"owner": {
|
||
"login": "opt9",
|
||
"id": 192655,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
|
||
"html_url": "https:\/\/github.com\/opt9"
|
||
},
|
||
"html_url": "https:\/\/github.com\/opt9\/Strutshock",
|
||
"description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script",
|
||
"fork": false,
|
||
"created_at": "2017-03-16T02:59:22Z",
|
||
"updated_at": "2017-05-04T20:58:47Z",
|
||
"pushed_at": "2017-03-16T04:02:40Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85341283,
|
||
"name": "StrutsShell",
|
||
"full_name": "falcon-lnhg\/StrutsShell",
|
||
"owner": {
|
||
"login": "falcon-lnhg",
|
||
"id": 5199658,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5199658?v=4",
|
||
"html_url": "https:\/\/github.com\/falcon-lnhg"
|
||
},
|
||
"html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell",
|
||
"description": "Apache Struts (CVE-2017-5638) Shell",
|
||
"fork": false,
|
||
"created_at": "2017-03-17T18:05:55Z",
|
||
"updated_at": "2017-08-31T21:27:12Z",
|
||
"pushed_at": "2017-04-04T16:11:25Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85390529,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "bhagdave\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "bhagdave",
|
||
"id": 3230037,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3230037?v=4",
|
||
"html_url": "https:\/\/github.com\/bhagdave"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-03-18T09:39:59Z",
|
||
"updated_at": "2017-03-19T01:25:24Z",
|
||
"pushed_at": "2017-03-21T21:53:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85664016,
|
||
"name": "st2-046-poc",
|
||
"full_name": "jas502n\/st2-046-poc",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
|
||
"description": "st2-046-poc CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-03-21T05:47:49Z",
|
||
"updated_at": "2018-08-17T05:15:44Z",
|
||
"pushed_at": "2018-08-17T05:15:41Z",
|
||
"stargazers_count": 22,
|
||
"watchers_count": 22,
|
||
"forks_count": 28,
|
||
"forks": 28,
|
||
"watchers": 22,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85733752,
|
||
"name": "S2-046_S2-045_POC",
|
||
"full_name": "KarzsGHR\/S2-046_S2-045_POC",
|
||
"owner": {
|
||
"login": "KarzsGHR",
|
||
"id": 12841587,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12841587?v=4",
|
||
"html_url": "https:\/\/github.com\/KarzsGHR"
|
||
},
|
||
"html_url": "https:\/\/github.com\/KarzsGHR\/S2-046_S2-045_POC",
|
||
"description": "S2-046|S2-045: Struts 2 Remote Code Execution vulnerability(CVE-2017-5638)",
|
||
"fork": false,
|
||
"created_at": "2017-03-21T17:36:40Z",
|
||
"updated_at": "2019-11-20T02:42:35Z",
|
||
"pushed_at": "2017-04-26T09:12:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 85926594,
|
||
"name": "S2-Reaper",
|
||
"full_name": "gsfish\/S2-Reaper",
|
||
"owner": {
|
||
"login": "gsfish",
|
||
"id": 15968154,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/15968154?v=4",
|
||
"html_url": "https:\/\/github.com\/gsfish"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gsfish\/S2-Reaper",
|
||
"description": "CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-03-23T08:44:10Z",
|
||
"updated_at": "2017-03-30T09:51:23Z",
|
||
"pushed_at": "2017-03-30T10:06:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 86415022,
|
||
"name": "Strutscli",
|
||
"full_name": "opt9\/Strutscli",
|
||
"owner": {
|
||
"login": "opt9",
|
||
"id": 192655,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/192655?v=4",
|
||
"html_url": "https:\/\/github.com\/opt9"
|
||
},
|
||
"html_url": "https:\/\/github.com\/opt9\/Strutscli",
|
||
"description": "Struts2 RCE CVE-2017-5638 CLI shell",
|
||
"fork": false,
|
||
"created_at": "2017-03-28T04:31:44Z",
|
||
"updated_at": "2017-04-14T08:03:48Z",
|
||
"pushed_at": "2017-03-28T04:36:11Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 87695524,
|
||
"name": "strutsy",
|
||
"full_name": "tahmed11\/strutsy",
|
||
"owner": {
|
||
"login": "tahmed11",
|
||
"id": 25324534,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25324534?v=4",
|
||
"html_url": "https:\/\/github.com\/tahmed11"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tahmed11\/strutsy",
|
||
"description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability",
|
||
"fork": false,
|
||
"created_at": "2017-04-09T08:57:08Z",
|
||
"updated_at": "2018-09-01T10:15:31Z",
|
||
"pushed_at": "2018-09-01T10:15:30Z",
|
||
"stargazers_count": 10,
|
||
"watchers_count": 10,
|
||
"forks_count": 10,
|
||
"forks": 10,
|
||
"watchers": 10,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 90377429,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "payatu\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "payatu",
|
||
"id": 16715624,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16715624?v=4",
|
||
"html_url": "https:\/\/github.com\/payatu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/payatu\/CVE-2017-5638",
|
||
"description": "Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header ",
|
||
"fork": false,
|
||
"created_at": "2017-05-05T13:17:37Z",
|
||
"updated_at": "2019-07-19T12:27:50Z",
|
||
"pushed_at": "2017-05-05T13:55:53Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 92562840,
|
||
"name": "Struts2-045-Exp",
|
||
"full_name": "Aasron\/Struts2-045-Exp",
|
||
"owner": {
|
||
"login": "Aasron",
|
||
"id": 17878407,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/17878407?v=4",
|
||
"html_url": "https:\/\/github.com\/Aasron"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Aasron\/Struts2-045-Exp",
|
||
"description": "CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-05-27T02:03:28Z",
|
||
"updated_at": "2017-05-27T02:33:31Z",
|
||
"pushed_at": "2017-06-01T09:53:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 92638419,
|
||
"name": "Stutsfi",
|
||
"full_name": "SpiderMate\/Stutsfi",
|
||
"owner": {
|
||
"login": "SpiderMate",
|
||
"id": 26036081,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26036081?v=4",
|
||
"html_url": "https:\/\/github.com\/SpiderMate"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SpiderMate\/Stutsfi",
|
||
"description": "An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2",
|
||
"fork": false,
|
||
"created_at": "2017-05-28T03:48:10Z",
|
||
"updated_at": "2017-10-30T00:48:57Z",
|
||
"pushed_at": "2018-01-13T04:19:16Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 92644725,
|
||
"name": "Struts2Shell",
|
||
"full_name": "jpacora\/Struts2Shell",
|
||
"owner": {
|
||
"login": "jpacora",
|
||
"id": 2137673,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2137673?v=4",
|
||
"html_url": "https:\/\/github.com\/jpacora"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jpacora\/Struts2Shell",
|
||
"description": "An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.",
|
||
"fork": false,
|
||
"created_at": "2017-05-28T06:44:13Z",
|
||
"updated_at": "2017-05-28T06:44:27Z",
|
||
"pushed_at": "2017-06-03T06:33:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 92664422,
|
||
"name": "Apache-Struts",
|
||
"full_name": "Reslient\/Apache-Struts",
|
||
"owner": {
|
||
"login": "Reslient",
|
||
"id": 28331671,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28331671?v=4",
|
||
"html_url": "https:\/\/github.com\/Reslient"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Reslient\/Apache-Struts",
|
||
"description": " An exploit for Apache Struts CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-05-28T13:56:59Z",
|
||
"updated_at": "2017-05-28T14:03:06Z",
|
||
"pushed_at": "2017-05-28T14:03:05Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 93442387,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "AndreasKl\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "AndreasKl",
|
||
"id": 1105899,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1105899?v=4",
|
||
"html_url": "https:\/\/github.com\/AndreasKl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AndreasKl\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-06-05T20:11:06Z",
|
||
"updated_at": "2017-06-05T20:22:20Z",
|
||
"pushed_at": "2017-06-05T21:43:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 93710291,
|
||
"name": "struts-rce-cve-2017-5638",
|
||
"full_name": "riyazwalikar\/struts-rce-cve-2017-5638",
|
||
"owner": {
|
||
"login": "riyazwalikar",
|
||
"id": 1900486,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1900486?v=4",
|
||
"html_url": "https:\/\/github.com\/riyazwalikar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/riyazwalikar\/struts-rce-cve-2017-5638",
|
||
"description": "Struts-RCE CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-06-08T05:22:31Z",
|
||
"updated_at": "2017-06-08T08:18:51Z",
|
||
"pushed_at": "2017-06-08T05:25:42Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 93794473,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "homjxi0e\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "homjxi0e",
|
||
"id": 25440152,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25440152?v=4",
|
||
"html_url": "https:\/\/github.com\/homjxi0e"
|
||
},
|
||
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-06-08T21:47:11Z",
|
||
"updated_at": "2017-06-08T21:47:11Z",
|
||
"pushed_at": "2017-06-08T21:48:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 94180453,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "eeehit\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "eeehit",
|
||
"id": 22052276,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22052276?v=4",
|
||
"html_url": "https:\/\/github.com\/eeehit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/eeehit\/CVE-2017-5638",
|
||
"description": "CVE-2017-5638 Test environment",
|
||
"fork": false,
|
||
"created_at": "2017-06-13T06:59:15Z",
|
||
"updated_at": "2017-06-13T07:07:06Z",
|
||
"pushed_at": "2017-06-13T07:00:00Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 95873695,
|
||
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"full_name": "r0otshell\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"owner": {
|
||
"login": "r0otshell",
|
||
"id": 24601456,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
|
||
"html_url": "https:\/\/github.com\/r0otshell"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r0otshell\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-06-30T09:40:31Z",
|
||
"updated_at": "2017-06-30T09:41:32Z",
|
||
"pushed_at": "2017-06-30T09:41:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 95874930,
|
||
"name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
|
||
"full_name": "r0otshell\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
|
||
"owner": {
|
||
"login": "r0otshell",
|
||
"id": 24601456,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
|
||
"html_url": "https:\/\/github.com\/r0otshell"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r0otshell\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-06-30T09:55:41Z",
|
||
"updated_at": "2019-10-14T18:50:05Z",
|
||
"pushed_at": "2017-06-30T09:57:01Z",
|
||
"stargazers_count": 13,
|
||
"watchers_count": 13,
|
||
"forks_count": 6,
|
||
"forks": 6,
|
||
"watchers": 13,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 98150795,
|
||
"name": "Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||
"full_name": "R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||
"owner": {
|
||
"login": "R4v3nBl4ck",
|
||
"id": 30399308,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/30399308?v=4",
|
||
"html_url": "https:\/\/github.com\/R4v3nBl4ck"
|
||
},
|
||
"html_url": "https:\/\/github.com\/R4v3nBl4ck\/Apache-Struts-2-CVE-2017-5638-Exploit-",
|
||
"description": "Exploit created by: R4v3nBl4ck end Pacman",
|
||
"fork": false,
|
||
"created_at": "2017-07-24T05:05:28Z",
|
||
"updated_at": "2019-10-15T21:37:48Z",
|
||
"pushed_at": "2017-07-24T23:55:01Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 100141854,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "Xhendos\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "Xhendos",
|
||
"id": 16403693,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16403693?v=4",
|
||
"html_url": "https:\/\/github.com\/Xhendos"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Xhendos\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-08-12T23:00:14Z",
|
||
"updated_at": "2017-08-12T23:04:13Z",
|
||
"pushed_at": "2017-08-26T17:32:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 101267457,
|
||
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"full_name": "TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"owner": {
|
||
"login": "TamiiLambrado",
|
||
"id": 23249848,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23249848?v=4",
|
||
"html_url": "https:\/\/github.com\/TamiiLambrado"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TamiiLambrado\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-08-24T07:36:14Z",
|
||
"updated_at": "2017-08-24T07:36:14Z",
|
||
"pushed_at": "2017-08-24T07:36:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 104651307,
|
||
"name": "S2-045",
|
||
"full_name": "RealBearcat\/S2-045",
|
||
"owner": {
|
||
"login": "RealBearcat",
|
||
"id": 22558737,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
||
"html_url": "https:\/\/github.com\/RealBearcat"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RealBearcat\/S2-045",
|
||
"description": "CVE-2017-5638 - Exploit",
|
||
"fork": false,
|
||
"created_at": "2017-09-24T14:43:02Z",
|
||
"updated_at": "2019-03-13T10:27:22Z",
|
||
"pushed_at": "2017-10-19T07:38:58Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 104686879,
|
||
"name": "strutser",
|
||
"full_name": "invisiblethreat\/strutser",
|
||
"owner": {
|
||
"login": "invisiblethreat",
|
||
"id": 2525006,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2525006?v=4",
|
||
"html_url": "https:\/\/github.com\/invisiblethreat"
|
||
},
|
||
"html_url": "https:\/\/github.com\/invisiblethreat\/strutser",
|
||
"description": "Check for Struts Vulnerability CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2017-09-25T00:40:57Z",
|
||
"updated_at": "2019-06-11T14:15:40Z",
|
||
"pushed_at": "2017-09-28T21:10:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 105124155,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "lizhi16\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "lizhi16",
|
||
"id": 22630810,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22630810?v=4",
|
||
"html_url": "https:\/\/github.com\/lizhi16"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2017-09-28T08:43:21Z",
|
||
"updated_at": "2018-03-27T09:10:07Z",
|
||
"pushed_at": "2018-03-25T02:49:17Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 108805305,
|
||
"name": "Common-Vulnerability-and-Exploit",
|
||
"full_name": "donaldashdown\/Common-Vulnerability-and-Exploit",
|
||
"owner": {
|
||
"login": "donaldashdown",
|
||
"id": 24925373,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24925373?v=4",
|
||
"html_url": "https:\/\/github.com\/donaldashdown"
|
||
},
|
||
"html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit",
|
||
"description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.",
|
||
"fork": false,
|
||
"created_at": "2017-10-30T05:21:53Z",
|
||
"updated_at": "2017-10-30T05:21:53Z",
|
||
"pushed_at": "2017-11-11T23:32:05Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 117999664,
|
||
"name": "cybersecurity-struts2",
|
||
"full_name": "grant100\/cybersecurity-struts2",
|
||
"owner": {
|
||
"login": "grant100",
|
||
"id": 28523112,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28523112?v=4",
|
||
"html_url": "https:\/\/github.com\/grant100"
|
||
},
|
||
"html_url": "https:\/\/github.com\/grant100\/cybersecurity-struts2",
|
||
"description": "Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.",
|
||
"fork": false,
|
||
"created_at": "2018-01-18T15:19:39Z",
|
||
"updated_at": "2019-01-23T00:39:32Z",
|
||
"pushed_at": "2019-01-23T00:39:29Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 119230111,
|
||
"name": "apache-struts-v2-CVE-2017-5638",
|
||
"full_name": "cafnet\/apache-struts-v2-CVE-2017-5638",
|
||
"owner": {
|
||
"login": "cafnet",
|
||
"id": 12993208,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12993208?v=4",
|
||
"html_url": "https:\/\/github.com\/cafnet"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638",
|
||
"description": "Working POC for CVE 2017-5638",
|
||
"fork": false,
|
||
"created_at": "2018-01-28T05:17:04Z",
|
||
"updated_at": "2018-01-28T05:55:11Z",
|
||
"pushed_at": "2018-01-28T05:55:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 121659152,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "0x00-0x00\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "0x00-0x00",
|
||
"id": 23364530,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
||
"html_url": "https:\/\/github.com\/0x00-0x00"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2017-5638",
|
||
"description": "Struts02 s2-045 exploit program",
|
||
"fork": false,
|
||
"created_at": "2018-02-15T17:31:07Z",
|
||
"updated_at": "2019-03-27T18:13:56Z",
|
||
"pushed_at": "2018-02-15T17:36:07Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 125206287,
|
||
"name": "struts2-jakarta-inject",
|
||
"full_name": "Greynad\/struts2-jakarta-inject",
|
||
"owner": {
|
||
"login": "Greynad",
|
||
"id": 5173529,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5173529?v=4",
|
||
"html_url": "https:\/\/github.com\/Greynad"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Greynad\/struts2-jakarta-inject",
|
||
"description": "Golang exploit for CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2018-03-14T12:04:34Z",
|
||
"updated_at": "2018-03-28T19:59:04Z",
|
||
"pushed_at": "2018-03-19T17:57:29Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 126003106,
|
||
"name": "struts-rce",
|
||
"full_name": "ggolawski\/struts-rce",
|
||
"owner": {
|
||
"login": "ggolawski",
|
||
"id": 35563296,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35563296?v=4",
|
||
"html_url": "https:\/\/github.com\/ggolawski"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ggolawski\/struts-rce",
|
||
"description": "Apache Struts CVE-2017-5638 RCE exploitation",
|
||
"fork": false,
|
||
"created_at": "2018-03-20T10:51:46Z",
|
||
"updated_at": "2018-05-18T09:54:51Z",
|
||
"pushed_at": "2018-03-20T11:32:35Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 133253539,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "win3zz\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "win3zz",
|
||
"id": 12781459,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12781459?v=4",
|
||
"html_url": "https:\/\/github.com\/win3zz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/win3zz\/CVE-2017-5638",
|
||
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
|
||
"fork": false,
|
||
"created_at": "2018-05-13T16:13:26Z",
|
||
"updated_at": "2018-05-13T16:14:54Z",
|
||
"pushed_at": "2018-05-13T16:14:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 138520346,
|
||
"name": "CVE-2017-5638-Mass-Exploit",
|
||
"full_name": "leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
|
||
"owner": {
|
||
"login": "leandrocamposcardoso",
|
||
"id": 13025156,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13025156?v=4",
|
||
"html_url": "https:\/\/github.com\/leandrocamposcardoso"
|
||
},
|
||
"html_url": "https:\/\/github.com\/leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-06-24T22:40:54Z",
|
||
"updated_at": "2018-06-24T22:41:48Z",
|
||
"pushed_at": "2018-06-24T22:41:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 138721867,
|
||
"name": "struts2-rce",
|
||
"full_name": "Iletee\/struts2-rce",
|
||
"owner": {
|
||
"login": "Iletee",
|
||
"id": 1454138,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1454138?v=4",
|
||
"html_url": "https:\/\/github.com\/Iletee"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Iletee\/struts2-rce",
|
||
"description": "Exploitable target to CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2018-06-26T10:21:50Z",
|
||
"updated_at": "2019-11-12T10:42:33Z",
|
||
"pushed_at": "2019-12-02T05:32:56Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"forks_count": 124,
|
||
"forks": 124,
|
||
"watchers": 8,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 147389150,
|
||
"name": "check_struts",
|
||
"full_name": "andypitcher\/check_struts",
|
||
"owner": {
|
||
"login": "andypitcher",
|
||
"id": 12878731,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12878731?v=4",
|
||
"html_url": "https:\/\/github.com\/andypitcher"
|
||
},
|
||
"html_url": "https:\/\/github.com\/andypitcher\/check_struts",
|
||
"description": "Apache Struts version analyzer (Ansible) based on CVE-2017-5638",
|
||
"fork": false,
|
||
"created_at": "2018-09-04T18:19:26Z",
|
||
"updated_at": "2019-11-17T18:39:41Z",
|
||
"pushed_at": "2018-10-29T21:49:54Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 158640611,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "un4ckn0wl3z\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "un4ckn0wl3z",
|
||
"id": 16059320,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16059320?v=4",
|
||
"html_url": "https:\/\/github.com\/un4ckn0wl3z"
|
||
},
|
||
"html_url": "https:\/\/github.com\/un4ckn0wl3z\/CVE-2017-5638",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2018-11-22T04:02:59Z",
|
||
"updated_at": "2018-11-22T07:57:38Z",
|
||
"pushed_at": "2018-11-22T04:08:08Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 177221305,
|
||
"name": "CVE-2017-5638",
|
||
"full_name": "colorblindpentester\/CVE-2017-5638",
|
||
"owner": {
|
||
"login": "colorblindpentester",
|
||
"id": 45195264,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45195264?v=4",
|
||
"html_url": "https:\/\/github.com\/colorblindpentester"
|
||
},
|
||
"html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638",
|
||
"description": "CVE-2017-5638 (PoC Exploits)",
|
||
"fork": false,
|
||
"created_at": "2019-03-22T23:25:49Z",
|
||
"updated_at": "2019-03-22T23:30:08Z",
|
||
"pushed_at": "2019-03-22T23:29:23Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |