PoC-in-GitHub/2017/CVE-2017-5638.json
2021-04-12 06:12:55 +09:00

968 lines
No EOL
33 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 84158718,
"name": "S2-045",
"full_name": "PolarisLab\/S2-045",
"owner": {
"login": "PolarisLab",
"id": 25890110,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25890110?v=4",
"html_url": "https:\/\/github.com\/PolarisLab"
},
"html_url": "https:\/\/github.com\/PolarisLab\/S2-045",
"description": "Struts2 S2-045CVE-2017-5638Vulnerability environment - http:\/\/www.mottoin.com\/97954.html",
"fork": false,
"created_at": "2017-03-07T05:30:30Z",
"updated_at": "2020-09-22T06:33:06Z",
"pushed_at": "2017-03-07T05:37:55Z",
"stargazers_count": 23,
"watchers_count": 23,
"forks_count": 12,
"forks": 12,
"watchers": 23,
"score": 0
},
{
"id": 84186490,
"name": "Struts2-045-Exp",
"full_name": "Flyteas\/Struts2-045-Exp",
"owner": {
"login": "Flyteas",
"id": 15673913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15673913?v=4",
"html_url": "https:\/\/github.com\/Flyteas"
},
"html_url": "https:\/\/github.com\/Flyteas\/Struts2-045-Exp",
"description": "Struts2 S2-045CVE-2017-5638Exp with GUI",
"fork": false,
"created_at": "2017-03-07T10:30:20Z",
"updated_at": "2021-01-20T03:26:24Z",
"pushed_at": "2017-03-13T06:30:41Z",
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 29,
"forks": 29,
"watchers": 61,
"score": 0
},
{
"id": 84277596,
"name": "cve-2017-5638",
"full_name": "bongbongco\/cve-2017-5638",
"owner": {
"login": "bongbongco",
"id": 3170006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3170006?v=4",
"html_url": "https:\/\/github.com\/bongbongco"
},
"html_url": "https:\/\/github.com\/bongbongco\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-08T04:17:33Z",
"updated_at": "2017-03-08T04:31:28Z",
"pushed_at": "2017-03-08T04:31:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84481525,
"name": "S2-045-EXP-POC-TOOLS",
"full_name": "jas502n\/S2-045-EXP-POC-TOOLS",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/S2-045-EXP-POC-TOOLS",
"description": "S2-045 漏洞 POC-TOOLS CVE-2017-5638",
"fork": false,
"created_at": "2017-03-09T19:40:47Z",
"updated_at": "2020-10-24T13:59:45Z",
"pushed_at": "2017-03-09T19:50:50Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 20,
"forks": 20,
"watchers": 21,
"score": 0
},
{
"id": 84518902,
"name": "strutszeiro",
"full_name": "mthbernardes\/strutszeiro",
"owner": {
"login": "mthbernardes",
"id": 12648924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12648924?v=4",
"html_url": "https:\/\/github.com\/mthbernardes"
},
"html_url": "https:\/\/github.com\/mthbernardes\/strutszeiro",
"description": "Telegram Bot to manage botnets created with struts vulnerability(CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-10T04:23:41Z",
"updated_at": "2020-05-11T01:31:47Z",
"pushed_at": "2020-12-15T17:20:02Z",
"stargazers_count": 38,
"watchers_count": 38,
"forks_count": 26,
"forks": 26,
"watchers": 38,
"score": 0
},
{
"id": 84581800,
"name": "cve-2017-5638",
"full_name": "xsscx\/cve-2017-5638",
"owner": {
"login": "xsscx",
"id": 10790582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10790582?v=4",
"html_url": "https:\/\/github.com\/xsscx"
},
"html_url": "https:\/\/github.com\/xsscx\/cve-2017-5638",
"description": "Example PoC Code for CVE-2017-5638 | Apache Struts Exploit ",
"fork": false,
"created_at": "2017-03-10T16:56:14Z",
"updated_at": "2021-01-28T06:57:20Z",
"pushed_at": "2017-03-12T15:43:27Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 21,
"forks": 21,
"watchers": 14,
"score": 0
},
{
"id": 84602394,
"name": "apache-struts2-CVE-2017-5638",
"full_name": "immunio\/apache-struts2-CVE-2017-5638",
"owner": {
"login": "immunio",
"id": 6700387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6700387?v=4",
"html_url": "https:\/\/github.com\/immunio"
},
"html_url": "https:\/\/github.com\/immunio\/apache-struts2-CVE-2017-5638",
"description": "Demo Application and Exploit",
"fork": false,
"created_at": "2017-03-10T21:33:25Z",
"updated_at": "2020-11-24T15:40:19Z",
"pushed_at": "2017-03-13T15:03:32Z",
"stargazers_count": 36,
"watchers_count": 36,
"forks_count": 35,
"forks": 35,
"watchers": 36,
"score": 0
},
{
"id": 84620334,
"name": "OgnlContentTypeRejectorValve",
"full_name": "Masahiro-Yamada\/OgnlContentTypeRejectorValve",
"owner": {
"login": "Masahiro-Yamada",
"id": 479387,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479387?v=4",
"html_url": "https:\/\/github.com\/Masahiro-Yamada"
},
"html_url": "https:\/\/github.com\/Masahiro-Yamada\/OgnlContentTypeRejectorValve",
"description": "This is Valve for Tomcat7 to block Struts 2 Remote Code Execution vulnerability (CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-11T03:18:12Z",
"updated_at": "2017-04-11T00:06:36Z",
"pushed_at": "2017-03-13T14:49:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 84639178,
"name": "CVE-2017-5638-Apache-Struts2",
"full_name": "aljazceru\/CVE-2017-5638-Apache-Struts2",
"owner": {
"login": "aljazceru",
"id": 4439523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4439523?v=4",
"html_url": "https:\/\/github.com\/aljazceru"
},
"html_url": "https:\/\/github.com\/aljazceru\/CVE-2017-5638-Apache-Struts2",
"description": "Tweaking original PoC (https:\/\/github.com\/rapid7\/metasploit-framework\/issues\/8064) to work on self-signed certificates ",
"fork": false,
"created_at": "2017-03-11T09:39:09Z",
"updated_at": "2019-07-15T22:02:37Z",
"pushed_at": "2017-03-11T09:41:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 84640546,
"name": "test_struts2_vulnerability_CVE-2017-5638",
"full_name": "sjitech\/test_struts2_vulnerability_CVE-2017-5638",
"owner": {
"login": "sjitech",
"id": 5180638,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5180638?v=4",
"html_url": "https:\/\/github.com\/sjitech"
},
"html_url": "https:\/\/github.com\/sjitech\/test_struts2_vulnerability_CVE-2017-5638",
"description": "test struts2 vulnerability CVE-2017-5638 in Mac OS X",
"fork": false,
"created_at": "2017-03-11T10:03:54Z",
"updated_at": "2017-03-13T11:14:00Z",
"pushed_at": "2017-03-13T07:38:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 84642680,
"name": "CVE-2017-5638",
"full_name": "jrrombaldo\/CVE-2017-5638",
"owner": {
"login": "jrrombaldo",
"id": 121948,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121948?v=4",
"html_url": "https:\/\/github.com\/jrrombaldo"
},
"html_url": "https:\/\/github.com\/jrrombaldo\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-11T10:43:16Z",
"updated_at": "2017-03-11T13:07:57Z",
"pushed_at": "2017-03-24T19:12:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84644857,
"name": "CVE-2017-5638",
"full_name": "random-robbie\/CVE-2017-5638",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/CVE-2017-5638",
"description": "CVE: 2017-5638 in different formats",
"fork": false,
"created_at": "2017-03-11T11:22:44Z",
"updated_at": "2017-03-11T11:28:58Z",
"pushed_at": "2017-03-16T11:26:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 84655941,
"name": "CVE-2017-5638_struts",
"full_name": "initconf\/CVE-2017-5638_struts",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2017-5638_struts",
"description": "detection for Apache Struts recon and compromise ",
"fork": false,
"created_at": "2017-03-11T14:30:02Z",
"updated_at": "2020-04-13T02:20:20Z",
"pushed_at": "2017-09-15T22:34:00Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 84693026,
"name": "struts-pwn",
"full_name": "mazen160\/struts-pwn",
"owner": {
"login": "mazen160",
"id": 8996052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8996052?v=4",
"html_url": "https:\/\/github.com\/mazen160"
},
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn",
"description": "An exploit for Apache Struts CVE-2017-5638",
"fork": false,
"created_at": "2017-03-12T02:02:25Z",
"updated_at": "2021-04-08T15:01:27Z",
"pushed_at": "2018-05-21T18:33:26Z",
"stargazers_count": 391,
"watchers_count": 391,
"forks_count": 141,
"forks": 141,
"watchers": 391,
"score": 0
},
{
"id": 84705148,
"name": "Struts-Apache-ExploitPack",
"full_name": "ret2jazzy\/Struts-Apache-ExploitPack",
"owner": {
"login": "ret2jazzy",
"id": 20831187,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20831187?v=4",
"html_url": "https:\/\/github.com\/ret2jazzy"
},
"html_url": "https:\/\/github.com\/ret2jazzy\/Struts-Apache-ExploitPack",
"description": "These are just some script which you can use to detect and exploit the Apache Struts Vulnerability (CVE-2017-5638)",
"fork": false,
"created_at": "2017-03-12T06:28:51Z",
"updated_at": "2021-04-09T16:59:35Z",
"pushed_at": "2017-03-12T07:26:03Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 13,
"forks": 13,
"watchers": 16,
"score": 0
},
{
"id": 84725982,
"name": "ExpStruts",
"full_name": "lolwaleet\/ExpStruts",
"owner": {
"login": "lolwaleet",
"id": 20018319,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20018319?v=4",
"html_url": "https:\/\/github.com\/lolwaleet"
},
"html_url": "https:\/\/github.com\/lolwaleet\/ExpStruts",
"description": "A php based exploiter for CVE-2017-5638.",
"fork": false,
"created_at": "2017-03-12T13:03:52Z",
"updated_at": "2020-03-15T16:58:21Z",
"pushed_at": "2017-03-12T13:04:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 84819853,
"name": "CVE-2017-5638-Apache-Struts2",
"full_name": "oktavianto\/CVE-2017-5638-Apache-Struts2",
"owner": {
"login": "oktavianto",
"id": 8210275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8210275?v=4",
"html_url": "https:\/\/github.com\/oktavianto"
},
"html_url": "https:\/\/github.com\/oktavianto\/CVE-2017-5638-Apache-Struts2",
"description": "Example PHP Exploiter for CVE-2017-5638",
"fork": false,
"created_at": "2017-03-13T11:39:55Z",
"updated_at": "2020-04-07T06:38:46Z",
"pushed_at": "2017-03-20T19:40:16Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 4,
"forks": 4,
"watchers": 2,
"score": 0
},
{
"id": 85010282,
"name": "cve-2017-5638",
"full_name": "jrrdev\/cve-2017-5638",
"owner": {
"login": "jrrdev",
"id": 17674081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17674081?v=4",
"html_url": "https:\/\/github.com\/jrrdev"
},
"html_url": "https:\/\/github.com\/jrrdev\/cve-2017-5638",
"description": "cve-2017-5638 Vulnerable site sample",
"fork": false,
"created_at": "2017-03-15T00:19:33Z",
"updated_at": "2021-02-25T02:07:48Z",
"pushed_at": "2017-04-04T19:57:38Z",
"stargazers_count": 13,
"watchers_count": 13,
"forks_count": 11,
"forks": 11,
"watchers": 13,
"score": 0
},
{
"id": 85145901,
"name": "Strutshock",
"full_name": "opt9\/Strutshock",
"owner": {
"login": "opt9",
"id": 192655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192655?v=4",
"html_url": "https:\/\/github.com\/opt9"
},
"html_url": "https:\/\/github.com\/opt9\/Strutshock",
"description": "Struts2 RCE CVE-2017-5638 non-intrusive check shell script",
"fork": false,
"created_at": "2017-03-16T02:59:22Z",
"updated_at": "2017-05-04T20:58:47Z",
"pushed_at": "2017-03-16T04:02:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 85341283,
"name": "StrutsShell",
"full_name": "falcon-lnhg\/StrutsShell",
"owner": {
"login": "falcon-lnhg",
"id": 5199658,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5199658?v=4",
"html_url": "https:\/\/github.com\/falcon-lnhg"
},
"html_url": "https:\/\/github.com\/falcon-lnhg\/StrutsShell",
"description": "Apache Struts (CVE-2017-5638) Shell",
"fork": false,
"created_at": "2017-03-17T18:05:55Z",
"updated_at": "2017-08-31T21:27:12Z",
"pushed_at": "2017-04-04T16:11:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 85390529,
"name": "CVE-2017-5638",
"full_name": "bhagdave\/CVE-2017-5638",
"owner": {
"login": "bhagdave",
"id": 3230037,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3230037?v=4",
"html_url": "https:\/\/github.com\/bhagdave"
},
"html_url": "https:\/\/github.com\/bhagdave\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-18T09:39:59Z",
"updated_at": "2017-03-19T01:25:24Z",
"pushed_at": "2017-03-21T21:53:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 85664016,
"name": "st2-046-poc",
"full_name": "jas502n\/st2-046-poc",
"owner": {
"login": "jas502n",
"id": 16593068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
"html_url": "https:\/\/github.com\/jas502n"
},
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
"description": "st2-046-poc CVE-2017-5638",
"fork": false,
"created_at": "2017-03-21T05:47:49Z",
"updated_at": "2020-05-21T14:53:21Z",
"pushed_at": "2018-08-17T05:15:41Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 29,
"forks": 29,
"watchers": 21,
"score": 0
},
{
"id": 85733752,
"name": "S2-046_S2-045_POC",
"full_name": "KarzsGHR\/S2-046_S2-045_POC",
"owner": {
"login": "KarzsGHR",
"id": 12841587,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12841587?v=4",
"html_url": "https:\/\/github.com\/KarzsGHR"
},
"html_url": "https:\/\/github.com\/KarzsGHR\/S2-046_S2-045_POC",
"description": "S2-046|S2-045: Struts 2 Remote Code Execution vulnerabilityCVE-2017-5638",
"fork": false,
"created_at": "2017-03-21T17:36:40Z",
"updated_at": "2019-11-20T02:42:35Z",
"pushed_at": "2017-04-26T09:12:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 85926594,
"name": "S2-Reaper",
"full_name": "gsfish\/S2-Reaper",
"owner": {
"login": "gsfish",
"id": 15968154,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15968154?v=4",
"html_url": "https:\/\/github.com\/gsfish"
},
"html_url": "https:\/\/github.com\/gsfish\/S2-Reaper",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2017-03-23T08:44:10Z",
"updated_at": "2017-03-30T09:51:23Z",
"pushed_at": "2017-03-30T10:06:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 86200933,
"name": "cve-2017-5638",
"full_name": "mcassano\/cve-2017-5638",
"owner": {
"login": "mcassano",
"id": 2073030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2073030?v=4",
"html_url": "https:\/\/github.com\/mcassano"
},
"html_url": "https:\/\/github.com\/mcassano\/cve-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-03-26T01:58:52Z",
"updated_at": "2017-03-26T02:00:58Z",
"pushed_at": "2017-04-01T04:20:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 86415022,
"name": "Strutscli",
"full_name": "opt9\/Strutscli",
"owner": {
"login": "opt9",
"id": 192655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/192655?v=4",
"html_url": "https:\/\/github.com\/opt9"
},
"html_url": "https:\/\/github.com\/opt9\/Strutscli",
"description": "Struts2 RCE CVE-2017-5638 CLI shell",
"fork": false,
"created_at": "2017-03-28T04:31:44Z",
"updated_at": "2017-04-14T08:03:48Z",
"pushed_at": "2017-03-28T04:36:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 87695524,
"name": "strutsy",
"full_name": "tahmed11\/strutsy",
"owner": {
"login": "tahmed11",
"id": 25324534,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25324534?v=4",
"html_url": "https:\/\/github.com\/tahmed11"
},
"html_url": "https:\/\/github.com\/tahmed11\/strutsy",
"description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability",
"fork": false,
"created_at": "2017-04-09T08:57:08Z",
"updated_at": "2020-05-18T10:42:03Z",
"pushed_at": "2018-09-01T10:15:30Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 12,
"forks": 12,
"watchers": 11,
"score": 0
},
{
"id": 90377429,
"name": "CVE-2017-5638",
"full_name": "payatu\/CVE-2017-5638",
"owner": {
"login": "payatu",
"id": 16715624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16715624?v=4",
"html_url": "https:\/\/github.com\/payatu"
},
"html_url": "https:\/\/github.com\/payatu\/CVE-2017-5638",
"description": "Apache Struts 2.0 RCE vulnerability - Allows an attacker to inject OS commands into a web application through the content-type header ",
"fork": false,
"created_at": "2017-05-05T13:17:37Z",
"updated_at": "2020-03-27T02:45:32Z",
"pushed_at": "2017-05-05T13:55:53Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 4,
"forks": 4,
"watchers": 7,
"score": 0
},
{
"id": 92562840,
"name": "Struts2-045-Exp",
"full_name": "Aasron\/Struts2-045-Exp",
"owner": {
"login": "Aasron",
"id": 17878407,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17878407?v=4",
"html_url": "https:\/\/github.com\/Aasron"
},
"html_url": "https:\/\/github.com\/Aasron\/Struts2-045-Exp",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2017-05-27T02:03:28Z",
"updated_at": "2017-05-27T02:33:31Z",
"pushed_at": "2017-06-01T09:53:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 92638419,
"name": "Stutsfi",
"full_name": "SpiderMate\/Stutsfi",
"owner": {
"login": "SpiderMate",
"id": 26036081,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26036081?v=4",
"html_url": "https:\/\/github.com\/SpiderMate"
},
"html_url": "https:\/\/github.com\/SpiderMate\/Stutsfi",
"description": "An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2",
"fork": false,
"created_at": "2017-05-28T03:48:10Z",
"updated_at": "2020-08-10T00:48:43Z",
"pushed_at": "2018-01-13T04:19:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 92644725,
"name": "Struts2Shell",
"full_name": "jpacora\/Struts2Shell",
"owner": {
"login": "jpacora",
"id": 2137673,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2137673?v=4",
"html_url": "https:\/\/github.com\/jpacora"
},
"html_url": "https:\/\/github.com\/jpacora\/Struts2Shell",
"description": "An exploit (and library) for CVE-2017-5638 - Apache Struts2 S2-045 bug.",
"fork": false,
"created_at": "2017-05-28T06:44:13Z",
"updated_at": "2017-05-28T06:44:27Z",
"pushed_at": "2017-06-03T06:33:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 93442387,
"name": "CVE-2017-5638",
"full_name": "AndreasKl\/CVE-2017-5638",
"owner": {
"login": "AndreasKl",
"id": 1105899,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1105899?v=4",
"html_url": "https:\/\/github.com\/AndreasKl"
},
"html_url": "https:\/\/github.com\/AndreasKl\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-05T20:11:06Z",
"updated_at": "2020-10-14T14:40:32Z",
"pushed_at": "2017-06-05T21:43:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 93710291,
"name": "struts-rce-cve-2017-5638",
"full_name": "riyazwalikar\/struts-rce-cve-2017-5638",
"owner": {
"login": "riyazwalikar",
"id": 1900486,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1900486?v=4",
"html_url": "https:\/\/github.com\/riyazwalikar"
},
"html_url": "https:\/\/github.com\/riyazwalikar\/struts-rce-cve-2017-5638",
"description": "Struts-RCE CVE-2017-5638",
"fork": false,
"created_at": "2017-06-08T05:22:31Z",
"updated_at": "2017-06-08T08:18:51Z",
"pushed_at": "2017-06-08T05:25:42Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 93794473,
"name": "CVE-2017-5638",
"full_name": "homjxi0e\/CVE-2017-5638",
"owner": {
"login": "homjxi0e",
"id": 25440152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
"html_url": "https:\/\/github.com\/homjxi0e"
},
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-08T21:47:11Z",
"updated_at": "2017-06-08T21:47:11Z",
"pushed_at": "2017-06-08T21:48:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 94180453,
"name": "CVE-2017-5638",
"full_name": "eeehit\/CVE-2017-5638",
"owner": {
"login": "eeehit",
"id": 22052276,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22052276?v=4",
"html_url": "https:\/\/github.com\/eeehit"
},
"html_url": "https:\/\/github.com\/eeehit\/CVE-2017-5638",
"description": "CVE-2017-5638 Test environment",
"fork": false,
"created_at": "2017-06-13T06:59:15Z",
"updated_at": "2017-06-13T07:07:06Z",
"pushed_at": "2017-06-13T07:00:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 95873695,
"name": "Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"full_name": "sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts-CVE-2017-5638-RCE-Mass-Scanner",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:40:31Z",
"updated_at": "2020-03-26T07:50:37Z",
"pushed_at": "2017-06-30T09:41:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 95874930,
"name": "Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"full_name": "sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"owner": {
"login": "sUbc0ol",
"id": 24601456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4",
"html_url": "https:\/\/github.com\/sUbc0ol"
},
"html_url": "https:\/\/github.com\/sUbc0ol\/Apache-Struts2-RCE-Exploit-v2-CVE-2017-5638",
"description": null,
"fork": false,
"created_at": "2017-06-30T09:55:41Z",
"updated_at": "2020-03-26T07:49:41Z",
"pushed_at": "2017-06-30T09:57:01Z",
"stargazers_count": 14,
"watchers_count": 14,
"forks_count": 8,
"forks": 8,
"watchers": 14,
"score": 0
},
{
"id": 138721867,
"name": "struts2-rce",
"full_name": "Iletee\/struts2-rce",
"owner": {
"login": "Iletee",
"id": 1454138,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1454138?v=4",
"html_url": "https:\/\/github.com\/Iletee"
},
"html_url": "https:\/\/github.com\/Iletee\/struts2-rce",
"description": "Exploitable target to CVE-2017-5638",
"fork": false,
"created_at": "2018-06-26T10:21:50Z",
"updated_at": "2019-11-12T10:42:33Z",
"pushed_at": "2020-12-07T05:28:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 148,
"forks": 148,
"watchers": 8,
"score": 0
},
{
"id": 263394878,
"name": "Aspire",
"full_name": "pasannirmana\/Aspire",
"owner": {
"login": "pasannirmana",
"id": 62306147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62306147?v=4",
"html_url": "https:\/\/github.com\/pasannirmana"
},
"html_url": "https:\/\/github.com\/pasannirmana\/Aspire",
"description": "CVE-2017-5638",
"fork": false,
"created_at": "2020-05-12T16:42:51Z",
"updated_at": "2020-05-12T16:50:44Z",
"pushed_at": "2020-05-12T16:50:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 291728915,
"name": "XworkStruts-RCE",
"full_name": "ludy-dev\/XworkStruts-RCE",
"owner": {
"login": "ludy-dev",
"id": 70466565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70466565?v=4",
"html_url": "https:\/\/github.com\/ludy-dev"
},
"html_url": "https:\/\/github.com\/ludy-dev\/XworkStruts-RCE",
"description": "(CVE-2017-5638) XworkStruts RCE Vuln test script",
"fork": false,
"created_at": "2020-08-31T13:53:37Z",
"updated_at": "2020-11-07T10:14:21Z",
"pushed_at": "2020-11-07T10:14:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 319075797,
"name": "CVE-2017-5638",
"full_name": "jongmartinez\/CVE-2017-5638",
"owner": {
"login": "jongmartinez",
"id": 11743460,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11743460?v=4",
"html_url": "https:\/\/github.com\/jongmartinez"
},
"html_url": "https:\/\/github.com\/jongmartinez\/CVE-2017-5638",
"description": "PoC for CVE: 2017-5638 - Apache Struts2 S2-045",
"fork": false,
"created_at": "2020-12-06T16:16:43Z",
"updated_at": "2020-12-06T16:39:19Z",
"pushed_at": "2020-12-06T16:39:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 346005954,
"name": "Apache-Struts-2-CVE-2017-5638-Exploit",
"full_name": "dock0d1\/Apache-Struts-2-CVE-2017-5638-Exploit",
"owner": {
"login": "dock0d1",
"id": 43358190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43358190?v=4",
"html_url": "https:\/\/github.com\/dock0d1"
},
"html_url": "https:\/\/github.com\/dock0d1\/Apache-Struts-2-CVE-2017-5638-Exploit",
"description": null,
"fork": false,
"created_at": "2021-03-09T12:56:08Z",
"updated_at": "2021-04-04T16:57:46Z",
"pushed_at": "2021-04-03T14:42:10Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
}
]