mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
186 lines
No EOL
6.6 KiB
JSON
186 lines
No EOL
6.6 KiB
JSON
[
|
||
{
|
||
"id": 148616806,
|
||
"name": "javaserializetools",
|
||
"full_name": "shack2\/javaserializetools",
|
||
"owner": {
|
||
"login": "shack2",
|
||
"id": 26374431,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26374431?v=4",
|
||
"html_url": "https:\/\/github.com\/shack2"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shack2\/javaserializetools",
|
||
"description": "Java反序列化漏洞利用工具V1.0 Java反序列化相关漏洞的检查工具,采用JDK 1.8+NetBeans8.2开发,软件运行必须安装JDK 1.8或者以上版本。 支持:weblogic xml反序列化漏洞 CVE-2017-10271\/CNVD-C-2019-48814\/CVE-2019-2725检查。",
|
||
"fork": false,
|
||
"created_at": "2018-09-13T09:44:18Z",
|
||
"updated_at": "2021-01-08T08:14:06Z",
|
||
"pushed_at": "2020-10-01T20:20:41Z",
|
||
"stargazers_count": 256,
|
||
"watchers_count": 256,
|
||
"forks_count": 93,
|
||
"forks": 93,
|
||
"watchers": 256,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 189132043,
|
||
"name": "CVE-2019-2725",
|
||
"full_name": "lufeirider\/CVE-2019-2725",
|
||
"owner": {
|
||
"login": "lufeirider",
|
||
"id": 13599188,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13599188?v=4",
|
||
"html_url": "https:\/\/github.com\/lufeirider"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lufeirider\/CVE-2019-2725",
|
||
"description": "CVE-2019-2725 命令回显",
|
||
"fork": false,
|
||
"created_at": "2019-05-29T01:57:05Z",
|
||
"updated_at": "2021-01-07T06:56:57Z",
|
||
"pushed_at": "2019-08-08T09:48:20Z",
|
||
"stargazers_count": 375,
|
||
"watchers_count": 375,
|
||
"forks_count": 153,
|
||
"forks": 153,
|
||
"watchers": 375,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 193466146,
|
||
"name": "Weblogic",
|
||
"full_name": "black-mirror\/Weblogic",
|
||
"owner": {
|
||
"login": "black-mirror",
|
||
"id": 42571043,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/42571043?v=4",
|
||
"html_url": "https:\/\/github.com\/black-mirror"
|
||
},
|
||
"html_url": "https:\/\/github.com\/black-mirror\/Weblogic",
|
||
"description": "Weblogic CVE-2019-2725 CVE-2019-2729 Getshell 命令执行 ",
|
||
"fork": false,
|
||
"created_at": "2019-06-24T08:33:07Z",
|
||
"updated_at": "2020-09-27T00:38:51Z",
|
||
"pushed_at": "2019-07-15T06:03:15Z",
|
||
"stargazers_count": 61,
|
||
"watchers_count": 61,
|
||
"forks_count": 22,
|
||
"forks": 22,
|
||
"watchers": 61,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 203902761,
|
||
"name": "CVE-2019-2725",
|
||
"full_name": "pimps\/CVE-2019-2725",
|
||
"owner": {
|
||
"login": "pimps",
|
||
"id": 11393266,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11393266?v=4",
|
||
"html_url": "https:\/\/github.com\/pimps"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pimps\/CVE-2019-2725",
|
||
"description": "WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit ",
|
||
"fork": false,
|
||
"created_at": "2019-08-23T01:42:57Z",
|
||
"updated_at": "2020-12-23T02:40:05Z",
|
||
"pushed_at": "2019-09-26T05:46:14Z",
|
||
"stargazers_count": 39,
|
||
"watchers_count": 39,
|
||
"forks_count": 10,
|
||
"forks": 10,
|
||
"watchers": 39,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 219766632,
|
||
"name": "CVE-2019-2725",
|
||
"full_name": "ianxtianxt\/CVE-2019-2725",
|
||
"owner": {
|
||
"login": "ianxtianxt",
|
||
"id": 45796484,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/45796484?v=4",
|
||
"html_url": "https:\/\/github.com\/ianxtianxt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ianxtianxt\/CVE-2019-2725",
|
||
"description": "CVE-2019-2725",
|
||
"fork": false,
|
||
"created_at": "2019-11-05T14:35:16Z",
|
||
"updated_at": "2020-10-13T07:27:48Z",
|
||
"pushed_at": "2019-11-05T14:35:53Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 227509207,
|
||
"name": "CVE-2019-2725-POC",
|
||
"full_name": "N0b1e6\/CVE-2019-2725-POC",
|
||
"owner": {
|
||
"login": "N0b1e6",
|
||
"id": 46476997,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/46476997?v=4",
|
||
"html_url": "https:\/\/github.com\/N0b1e6"
|
||
},
|
||
"html_url": "https:\/\/github.com\/N0b1e6\/CVE-2019-2725-POC",
|
||
"description": "CVE-2019-2725-POC",
|
||
"fork": false,
|
||
"created_at": "2019-12-12T03:09:23Z",
|
||
"updated_at": "2019-12-12T03:11:14Z",
|
||
"pushed_at": "2019-12-12T03:11:12Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 232495610,
|
||
"name": "weblogic_2019_2725_wls_batch",
|
||
"full_name": "GGyao\/weblogic_2019_2725_wls_batch",
|
||
"owner": {
|
||
"login": "GGyao",
|
||
"id": 38530938,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38530938?v=4",
|
||
"html_url": "https:\/\/github.com\/GGyao"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GGyao\/weblogic_2019_2725_wls_batch",
|
||
"description": "weblogic CVE-2019-2725利用exp。",
|
||
"fork": false,
|
||
"created_at": "2020-01-08T06:35:28Z",
|
||
"updated_at": "2020-01-08T06:43:35Z",
|
||
"pushed_at": "2020-01-08T06:42:30Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 291732668,
|
||
"name": "Oracle-WLS-Weblogic-RCE",
|
||
"full_name": "ludy-dev\/Oracle-WLS-Weblogic-RCE",
|
||
"owner": {
|
||
"login": "ludy-dev",
|
||
"id": 70466565,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/70466565?v=4",
|
||
"html_url": "https:\/\/github.com\/ludy-dev"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ludy-dev\/Oracle-WLS-Weblogic-RCE",
|
||
"description": "(CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript",
|
||
"fork": false,
|
||
"created_at": "2020-08-31T14:09:09Z",
|
||
"updated_at": "2020-11-07T13:04:21Z",
|
||
"pushed_at": "2020-11-07T13:04:19Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
}
|
||
] |