mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 02:54:10 +01:00
140 lines
No EOL
5 KiB
JSON
140 lines
No EOL
5 KiB
JSON
[
|
|
{
|
|
"id": 203542766,
|
|
"name": "CVE-2019-11510",
|
|
"full_name": "projectzeroindia\/CVE-2019-11510",
|
|
"owner": {
|
|
"login": "projectzeroindia",
|
|
"id": 54312442,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/54312442?v=4",
|
|
"html_url": "https:\/\/github.com\/projectzeroindia"
|
|
},
|
|
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
|
|
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
|
"fork": false,
|
|
"created_at": "2019-08-21T08:40:26Z",
|
|
"updated_at": "2020-07-04T15:43:00Z",
|
|
"pushed_at": "2020-01-11T13:55:33Z",
|
|
"stargazers_count": 318,
|
|
"watchers_count": 318,
|
|
"forks_count": 128,
|
|
"forks": 128,
|
|
"watchers": 318,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 203567273,
|
|
"name": "Pulse",
|
|
"full_name": "ladyleet1337\/Pulse",
|
|
"owner": {
|
|
"login": "ladyleet1337",
|
|
"id": 26109832,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26109832?v=4",
|
|
"html_url": "https:\/\/github.com\/ladyleet1337"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ladyleet1337\/Pulse",
|
|
"description": "Pulse Secure VPN CVE-2019-11510",
|
|
"fork": false,
|
|
"created_at": "2019-08-21T11:08:48Z",
|
|
"updated_at": "2020-07-13T08:26:29Z",
|
|
"pushed_at": "2020-07-13T08:26:27Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 207348255,
|
|
"name": "pwn-pulse",
|
|
"full_name": "BishopFox\/pwn-pulse",
|
|
"owner": {
|
|
"login": "BishopFox",
|
|
"id": 4523757,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4523757?v=4",
|
|
"html_url": "https:\/\/github.com\/BishopFox"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
|
|
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
|
"fork": false,
|
|
"created_at": "2019-09-09T15:58:39Z",
|
|
"updated_at": "2020-07-08T14:09:16Z",
|
|
"pushed_at": "2020-01-15T17:01:50Z",
|
|
"stargazers_count": 79,
|
|
"watchers_count": 79,
|
|
"forks_count": 39,
|
|
"forks": 39,
|
|
"watchers": 79,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 226548291,
|
|
"name": "pulsexploit",
|
|
"full_name": "aqhmal\/pulsexploit",
|
|
"owner": {
|
|
"login": "aqhmal",
|
|
"id": 22043590,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22043590?v=4",
|
|
"html_url": "https:\/\/github.com\/aqhmal"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
|
|
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
|
"fork": false,
|
|
"created_at": "2019-12-07T17:09:24Z",
|
|
"updated_at": "2020-04-25T05:06:47Z",
|
|
"pushed_at": "2020-04-25T05:06:45Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 256271162,
|
|
"name": "check-your-pulse",
|
|
"full_name": "cisagov\/check-your-pulse",
|
|
"owner": {
|
|
"login": "cisagov",
|
|
"id": 18539691,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/18539691?v=4",
|
|
"html_url": "https:\/\/github.com\/cisagov"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
|
|
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
|
|
"fork": false,
|
|
"created_at": "2020-04-16T16:32:47Z",
|
|
"updated_at": "2020-06-20T18:21:10Z",
|
|
"pushed_at": "2020-04-24T14:06:16Z",
|
|
"stargazers_count": 16,
|
|
"watchers_count": 16,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 16,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 282932489,
|
|
"name": "pulse-exploit",
|
|
"full_name": "andripwn\/pulse-exploit",
|
|
"owner": {
|
|
"login": "andripwn",
|
|
"id": 52893492,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52893492?v=4",
|
|
"html_url": "https:\/\/github.com\/andripwn"
|
|
},
|
|
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
|
|
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
|
|
"fork": false,
|
|
"created_at": "2020-07-27T15:06:08Z",
|
|
"updated_at": "2020-07-27T15:07:27Z",
|
|
"pushed_at": "2020-07-27T15:07:24Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |