PoC-in-GitHub/2014/CVE-2014-3153.json
2023-07-28 22:45:05 +09:00

282 lines
No EOL
9.3 KiB
JSON

[
{
"id": 22213799,
"name": "CVE-2014-3153",
"full_name": "timwr\/CVE-2014-3153",
"owner": {
"login": "timwr",
"id": 684924,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/684924?v=4",
"html_url": "https:\/\/github.com\/timwr"
},
"html_url": "https:\/\/github.com\/timwr\/CVE-2014-3153",
"description": "CVE-2014-3153 aka towelroot",
"fork": false,
"created_at": "2014-07-24T13:28:00Z",
"updated_at": "2023-06-04T00:33:15Z",
"pushed_at": "2017-04-25T07:24:08Z",
"stargazers_count": 123,
"watchers_count": 123,
"has_discussions": false,
"forks_count": 79,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 79,
"watchers": 123,
"score": 0,
"subscribers_count": 19
},
{
"id": 23988028,
"name": "libfutex_exploit",
"full_name": "android-rooting-tools\/libfutex_exploit",
"owner": {
"login": "android-rooting-tools",
"id": 4747069,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4747069?v=4",
"html_url": "https:\/\/github.com\/android-rooting-tools"
},
"html_url": "https:\/\/github.com\/android-rooting-tools\/libfutex_exploit",
"description": "CVE-2014-3153 exploit",
"fork": false,
"created_at": "2014-09-13T06:54:07Z",
"updated_at": "2019-03-17T17:41:06Z",
"pushed_at": "2015-10-07T13:20:33Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 17,
"score": 0,
"subscribers_count": 10
},
{
"id": 24257744,
"name": "towelroot",
"full_name": "geekben\/towelroot",
"owner": {
"login": "geekben",
"id": 6094550,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6094550?v=4",
"html_url": "https:\/\/github.com\/geekben"
},
"html_url": "https:\/\/github.com\/geekben\/towelroot",
"description": "Research of CVE-2014-3153 and its famous exploit towelroot on x86",
"fork": false,
"created_at": "2014-09-20T08:24:15Z",
"updated_at": "2022-07-28T07:00:45Z",
"pushed_at": "2014-10-25T10:45:32Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 22,
"watchers": 43,
"score": 0,
"subscribers_count": 5
},
{
"id": 29145880,
"name": "CVE-2014-3153",
"full_name": "lieanu\/CVE-2014-3153",
"owner": {
"login": "lieanu",
"id": 3104641,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3104641?v=4",
"html_url": "https:\/\/github.com\/lieanu"
},
"html_url": "https:\/\/github.com\/lieanu\/CVE-2014-3153",
"description": "cve2014-3153 exploit for ubuntu x86",
"fork": false,
"created_at": "2015-01-12T16:53:09Z",
"updated_at": "2022-04-03T15:04:51Z",
"pushed_at": "2015-01-24T02:19:25Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 17,
"score": 0,
"subscribers_count": 3
},
{
"id": 45774638,
"name": "CVE-2014-3153-exploit",
"full_name": "zerodavinci\/CVE-2014-3153-exploit",
"owner": {
"login": "zerodavinci",
"id": 4964771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4964771?v=4",
"html_url": "https:\/\/github.com\/zerodavinci"
},
"html_url": "https:\/\/github.com\/zerodavinci\/CVE-2014-3153-exploit",
"description": "My exploit for kernel exploitation",
"fork": false,
"created_at": "2015-11-08T09:40:59Z",
"updated_at": "2020-04-07T07:04:40Z",
"pushed_at": "2016-03-08T09:07:54Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 59958299,
"name": "CVE-2014-3153",
"full_name": "c3c\/CVE-2014-3153",
"owner": {
"login": "c3c",
"id": 2326945,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2326945?v=4",
"html_url": "https:\/\/github.com\/c3c"
},
"html_url": "https:\/\/github.com\/c3c\/CVE-2014-3153",
"description": "towelroot",
"fork": false,
"created_at": "2016-05-29T18:39:15Z",
"updated_at": "2017-06-05T08:17:34Z",
"pushed_at": "2015-09-04T15:54:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 150522303,
"name": "TowelRoot",
"full_name": "dangtunguyen\/TowelRoot",
"owner": {
"login": "dangtunguyen",
"id": 25807559,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25807559?v=4",
"html_url": "https:\/\/github.com\/dangtunguyen"
},
"html_url": "https:\/\/github.com\/dangtunguyen\/TowelRoot",
"description": "Gain root privilege by exploiting CVE-2014-3153 vulnerability",
"fork": false,
"created_at": "2018-09-27T03:16:15Z",
"updated_at": "2023-01-10T02:01:07Z",
"pushed_at": "2018-09-27T03:31:02Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"operating-system",
"security"
],
"visibility": "public",
"forks": 2,
"watchers": 10,
"score": 0,
"subscribers_count": 3
},
{
"id": 308868141,
"name": "CVE-2014-3153",
"full_name": "elongl\/CVE-2014-3153",
"owner": {
"login": "elongl",
"id": 30181361,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30181361?v=4",
"html_url": "https:\/\/github.com\/elongl"
},
"html_url": "https:\/\/github.com\/elongl\/CVE-2014-3153",
"description": "Exploiting CVE-2014-3153, AKA Towelroot.",
"fork": false,
"created_at": "2020-10-31T11:39:11Z",
"updated_at": "2022-12-03T22:17:48Z",
"pushed_at": "2021-01-16T17:37:12Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2014-3153",
"exploitation",
"kernel",
"linux",
"linux-kernel",
"towelroot"
],
"visibility": "public",
"forks": 3,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 454334262,
"name": "Linux-kernel-code-injection_CVE-2014-3153",
"full_name": "c4mx\/Linux-kernel-code-injection_CVE-2014-3153",
"owner": {
"login": "c4mx",
"id": 16646683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16646683?v=4",
"html_url": "https:\/\/github.com\/c4mx"
},
"html_url": "https:\/\/github.com\/c4mx\/Linux-kernel-code-injection_CVE-2014-3153",
"description": "Study on Linux kernel code injection via CVE-2014-3153 (Towelroot)",
"fork": false,
"created_at": "2022-02-01T09:54:52Z",
"updated_at": "2022-02-01T10:36:25Z",
"pushed_at": "2022-02-01T10:36:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]