mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
421 lines
No EOL
14 KiB
JSON
421 lines
No EOL
14 KiB
JSON
[
|
||
{
|
||
"id": 203542766,
|
||
"name": "CVE-2019-11510",
|
||
"full_name": "projectzeroindia\/CVE-2019-11510",
|
||
"owner": {
|
||
"login": "projectzeroindia",
|
||
"id": 54312442,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54312442?v=4",
|
||
"html_url": "https:\/\/github.com\/projectzeroindia",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/projectzeroindia\/CVE-2019-11510",
|
||
"description": "Exploit for Arbitrary File Read on Pulse Secure SSL VPN (CVE-2019-11510)",
|
||
"fork": false,
|
||
"created_at": "2019-08-21T08:40:26Z",
|
||
"updated_at": "2024-09-11T02:56:59Z",
|
||
"pushed_at": "2020-01-11T13:55:33Z",
|
||
"stargazers_count": 361,
|
||
"watchers_count": 361,
|
||
"has_discussions": false,
|
||
"forks_count": 135,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 135,
|
||
"watchers": 361,
|
||
"score": 0,
|
||
"subscribers_count": 14
|
||
},
|
||
{
|
||
"id": 203575464,
|
||
"name": "Pulse",
|
||
"full_name": "nuc13us\/Pulse",
|
||
"owner": {
|
||
"login": "nuc13us",
|
||
"id": 22916937,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22916937?v=4",
|
||
"html_url": "https:\/\/github.com\/nuc13us",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nuc13us\/Pulse",
|
||
"description": "Pulse Secure VPN CVE-2019-11510",
|
||
"fork": false,
|
||
"created_at": "2019-08-21T12:03:14Z",
|
||
"updated_at": "2020-10-19T12:40:24Z",
|
||
"pushed_at": "2019-08-21T12:03:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 203747377,
|
||
"name": "CVE-2019-11510-poc",
|
||
"full_name": "imjdl\/CVE-2019-11510-poc",
|
||
"owner": {
|
||
"login": "imjdl",
|
||
"id": 31382943,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31382943?v=4",
|
||
"html_url": "https:\/\/github.com\/imjdl",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/imjdl\/CVE-2019-11510-poc",
|
||
"description": "Pulse Secure SSL VPN pre-auth file reading",
|
||
"fork": false,
|
||
"created_at": "2019-08-22T08:18:19Z",
|
||
"updated_at": "2024-08-12T19:52:14Z",
|
||
"pushed_at": "2019-08-26T19:33:43Z",
|
||
"stargazers_count": 50,
|
||
"watchers_count": 50,
|
||
"has_discussions": false,
|
||
"forks_count": 14,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 14,
|
||
"watchers": 50,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 204579243,
|
||
"name": "CVE-2019-11510_poc",
|
||
"full_name": "es0\/CVE-2019-11510_poc",
|
||
"owner": {
|
||
"login": "es0",
|
||
"id": 10739380,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10739380?v=4",
|
||
"html_url": "https:\/\/github.com\/es0",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/es0\/CVE-2019-11510_poc",
|
||
"description": "PoC for CVE-2019-11510 | Pulse Secure 8.1R15.1\/8.2\/8.3\/9.0 SSL VPN - Arbitrary File Disclosure vulnerability",
|
||
"fork": false,
|
||
"created_at": "2019-08-26T23:30:15Z",
|
||
"updated_at": "2024-08-12T19:52:23Z",
|
||
"pushed_at": "2019-08-27T00:52:49Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 204608508,
|
||
"name": "http-pulse_ssl_vpn.nse",
|
||
"full_name": "r00tpgp\/http-pulse_ssl_vpn.nse",
|
||
"owner": {
|
||
"login": "r00tpgp",
|
||
"id": 29351179,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29351179?v=4",
|
||
"html_url": "https:\/\/github.com\/r00tpgp",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/r00tpgp\/http-pulse_ssl_vpn.nse",
|
||
"description": "Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510",
|
||
"fork": false,
|
||
"created_at": "2019-08-27T03:04:19Z",
|
||
"updated_at": "2024-08-12T19:52:23Z",
|
||
"pushed_at": "2019-08-27T07:03:26Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"has_discussions": false,
|
||
"forks_count": 9,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 9,
|
||
"watchers": 18,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 204666616,
|
||
"name": "CVE-2019-11510-1",
|
||
"full_name": "jas502n\/CVE-2019-11510-1",
|
||
"owner": {
|
||
"login": "jas502n",
|
||
"id": 16593068,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
||
"html_url": "https:\/\/github.com\/jas502n",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jas502n\/CVE-2019-11510-1",
|
||
"description": "SSL VPN Rce",
|
||
"fork": false,
|
||
"created_at": "2019-08-27T09:21:10Z",
|
||
"updated_at": "2024-09-11T15:28:24Z",
|
||
"pushed_at": "2019-08-27T09:29:05Z",
|
||
"stargazers_count": 53,
|
||
"watchers_count": 53,
|
||
"has_discussions": false,
|
||
"forks_count": 22,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 22,
|
||
"watchers": 53,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 205106127,
|
||
"name": "CVE-2019-11510",
|
||
"full_name": "jason3e7\/CVE-2019-11510",
|
||
"owner": {
|
||
"login": "jason3e7",
|
||
"id": 3059297,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3059297?v=4",
|
||
"html_url": "https:\/\/github.com\/jason3e7",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jason3e7\/CVE-2019-11510",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-08-29T07:27:57Z",
|
||
"updated_at": "2019-08-29T07:28:54Z",
|
||
"pushed_at": "2019-08-29T07:28:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 207348255,
|
||
"name": "pwn-pulse",
|
||
"full_name": "BishopFox\/pwn-pulse",
|
||
"owner": {
|
||
"login": "BishopFox",
|
||
"id": 4523757,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4523757?v=4",
|
||
"html_url": "https:\/\/github.com\/BishopFox",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/BishopFox\/pwn-pulse",
|
||
"description": "Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)",
|
||
"fork": false,
|
||
"created_at": "2019-09-09T15:58:39Z",
|
||
"updated_at": "2024-10-03T05:14:13Z",
|
||
"pushed_at": "2020-01-15T17:01:50Z",
|
||
"stargazers_count": 137,
|
||
"watchers_count": 137,
|
||
"has_discussions": false,
|
||
"forks_count": 60,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"exploit",
|
||
"infosec",
|
||
"penetration-testing",
|
||
"pentest-scripts",
|
||
"pentesting",
|
||
"red-team",
|
||
"security-tools"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 60,
|
||
"watchers": 137,
|
||
"score": 0,
|
||
"subscribers_count": 15
|
||
},
|
||
{
|
||
"id": 226548291,
|
||
"name": "pulsexploit",
|
||
"full_name": "aqhmal\/pulsexploit",
|
||
"owner": {
|
||
"login": "aqhmal",
|
||
"id": 22043590,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22043590?v=4",
|
||
"html_url": "https:\/\/github.com\/aqhmal",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aqhmal\/pulsexploit",
|
||
"description": "Automated script for Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API. You must have a Shodan account to use this script.",
|
||
"fork": false,
|
||
"created_at": "2019-12-07T17:09:24Z",
|
||
"updated_at": "2024-08-12T19:55:32Z",
|
||
"pushed_at": "2020-04-25T05:06:45Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"exploit",
|
||
"information-extraction",
|
||
"infosec",
|
||
"offset",
|
||
"pentest-script",
|
||
"python3"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 256271162,
|
||
"name": "check-your-pulse",
|
||
"full_name": "cisagov\/check-your-pulse",
|
||
"owner": {
|
||
"login": "cisagov",
|
||
"id": 18539691,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18539691?v=4",
|
||
"html_url": "https:\/\/github.com\/cisagov",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cisagov\/check-your-pulse",
|
||
"description": "This utility can help determine if indicators of compromise (IOCs) exist in the log files of a Pulse Secure VPN Appliance for CVE-2019-11510.",
|
||
"fork": false,
|
||
"created_at": "2020-04-16T16:32:47Z",
|
||
"updated_at": "2024-08-12T20:00:16Z",
|
||
"pushed_at": "2020-08-19T22:44:06Z",
|
||
"stargazers_count": 28,
|
||
"watchers_count": 28,
|
||
"has_discussions": false,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 28,
|
||
"score": 0,
|
||
"subscribers_count": 7
|
||
},
|
||
{
|
||
"id": 282932489,
|
||
"name": "pulse-exploit",
|
||
"full_name": "andripwn\/pulse-exploit",
|
||
"owner": {
|
||
"login": "andripwn",
|
||
"id": 52893492,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52893492?v=4",
|
||
"html_url": "https:\/\/github.com\/andripwn",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/andripwn\/pulse-exploit",
|
||
"description": "Pulse Secure SSL VPN exploit (CVE-2019-11510) using hosts retrieved from Shodan API.",
|
||
"fork": false,
|
||
"created_at": "2020-07-27T15:06:08Z",
|
||
"updated_at": "2020-12-13T12:56:51Z",
|
||
"pushed_at": "2020-07-27T15:07:24Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 296402155,
|
||
"name": "CVE-2019-11510-PulseVPN",
|
||
"full_name": "pwn3z\/CVE-2019-11510-PulseVPN",
|
||
"owner": {
|
||
"login": "pwn3z",
|
||
"id": 71440287,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71440287?v=4",
|
||
"html_url": "https:\/\/github.com\/pwn3z",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pwn3z\/CVE-2019-11510-PulseVPN",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-09-17T17:53:56Z",
|
||
"updated_at": "2020-11-05T21:41:20Z",
|
||
"pushed_at": "2020-11-05T21:41:18Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 577662602,
|
||
"name": "APT-Backpack",
|
||
"full_name": "34zY\/APT-Backpack",
|
||
"owner": {
|
||
"login": "34zY",
|
||
"id": 55347142,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
|
||
"html_url": "https:\/\/github.com\/34zY",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/34zY\/APT-Backpack",
|
||
"description": "cve-2019-11510, cve-2019-19781, cve-2020-5902, cve-2021-1497, cve-2021-20090, cve-2021-22006, cve-2021-22205, cve-2021-26084, cve-2021-26855, cve-2021-26857, cve-2021–26857, cve-2021–26858, cve-2021–26865",
|
||
"fork": false,
|
||
"created_at": "2022-12-13T08:41:44Z",
|
||
"updated_at": "2024-11-05T01:37:50Z",
|
||
"pushed_at": "2023-04-19T17:10:15Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |