mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-01-23 11:54:37 +01:00
485 lines
No EOL
17 KiB
JSON
485 lines
No EOL
17 KiB
JSON
[
|
|
{
|
|
"id": 84693026,
|
|
"name": "struts-pwn",
|
|
"full_name": "mazen160\/struts-pwn",
|
|
"owner": {
|
|
"login": "mazen160",
|
|
"id": 8996052,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8996052?v=4",
|
|
"html_url": "https:\/\/github.com\/mazen160"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mazen160\/struts-pwn",
|
|
"description": "An exploit for Apache Struts CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2017-03-12T02:02:25Z",
|
|
"updated_at": "2020-04-10T17:32:10Z",
|
|
"pushed_at": "2018-05-21T18:33:26Z",
|
|
"stargazers_count": 366,
|
|
"watchers_count": 366,
|
|
"forks_count": 130,
|
|
"forks": 130,
|
|
"watchers": 366,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 85664016,
|
|
"name": "st2-046-poc",
|
|
"full_name": "jas502n\/st2-046-poc",
|
|
"owner": {
|
|
"login": "jas502n",
|
|
"id": 16593068,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/16593068?v=4",
|
|
"html_url": "https:\/\/github.com\/jas502n"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jas502n\/st2-046-poc",
|
|
"description": "st2-046-poc CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2017-03-21T05:47:49Z",
|
|
"updated_at": "2018-08-17T05:15:44Z",
|
|
"pushed_at": "2018-08-17T05:15:41Z",
|
|
"stargazers_count": 22,
|
|
"watchers_count": 22,
|
|
"forks_count": 29,
|
|
"forks": 29,
|
|
"watchers": 22,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 87695524,
|
|
"name": "strutsy",
|
|
"full_name": "tahmed11\/strutsy",
|
|
"owner": {
|
|
"login": "tahmed11",
|
|
"id": 25324534,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/25324534?v=4",
|
|
"html_url": "https:\/\/github.com\/tahmed11"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tahmed11\/strutsy",
|
|
"description": "Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability",
|
|
"fork": false,
|
|
"created_at": "2017-04-09T08:57:08Z",
|
|
"updated_at": "2020-03-22T02:37:21Z",
|
|
"pushed_at": "2018-09-01T10:15:30Z",
|
|
"stargazers_count": 11,
|
|
"watchers_count": 11,
|
|
"forks_count": 11,
|
|
"forks": 11,
|
|
"watchers": 11,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 92638419,
|
|
"name": "Stutsfi",
|
|
"full_name": "SpiderMate\/Stutsfi",
|
|
"owner": {
|
|
"login": "SpiderMate",
|
|
"id": 26036081,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/26036081?v=4",
|
|
"html_url": "https:\/\/github.com\/SpiderMate"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SpiderMate\/Stutsfi",
|
|
"description": "An exploit for CVE-2017-5638 Remote Code Execution (RCE) Vulnerability in Apache Struts 2",
|
|
"fork": false,
|
|
"created_at": "2017-05-28T03:48:10Z",
|
|
"updated_at": "2017-10-30T00:48:57Z",
|
|
"pushed_at": "2018-01-13T04:19:16Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104651307,
|
|
"name": "S2-045",
|
|
"full_name": "RealBearcat\/S2-045",
|
|
"owner": {
|
|
"login": "RealBearcat",
|
|
"id": 22558737,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/22558737?v=4",
|
|
"html_url": "https:\/\/github.com\/RealBearcat"
|
|
},
|
|
"html_url": "https:\/\/github.com\/RealBearcat\/S2-045",
|
|
"description": "CVE-2017-5638 - Exploit",
|
|
"fork": false,
|
|
"created_at": "2017-09-24T14:43:02Z",
|
|
"updated_at": "2020-04-07T05:42:20Z",
|
|
"pushed_at": "2017-10-19T07:38:58Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104686879,
|
|
"name": "strutser",
|
|
"full_name": "invisiblethreat\/strutser",
|
|
"owner": {
|
|
"login": "invisiblethreat",
|
|
"id": 2525006,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2525006?v=4",
|
|
"html_url": "https:\/\/github.com\/invisiblethreat"
|
|
},
|
|
"html_url": "https:\/\/github.com\/invisiblethreat\/strutser",
|
|
"description": "Check for Struts Vulnerability CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2017-09-25T00:40:57Z",
|
|
"updated_at": "2019-06-11T14:15:40Z",
|
|
"pushed_at": "2017-09-28T21:10:29Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 105124155,
|
|
"name": "CVE-2017-5638",
|
|
"full_name": "lizhi16\/CVE-2017-5638",
|
|
"owner": {
|
|
"login": "lizhi16",
|
|
"id": 22630810,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/22630810?v=4",
|
|
"html_url": "https:\/\/github.com\/lizhi16"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lizhi16\/CVE-2017-5638",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-28T08:43:21Z",
|
|
"updated_at": "2018-03-27T09:10:07Z",
|
|
"pushed_at": "2018-03-25T02:49:17Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 108805305,
|
|
"name": "Common-Vulnerability-and-Exploit",
|
|
"full_name": "donaldashdown\/Common-Vulnerability-and-Exploit",
|
|
"owner": {
|
|
"login": "donaldashdown",
|
|
"id": 24925373,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24925373?v=4",
|
|
"html_url": "https:\/\/github.com\/donaldashdown"
|
|
},
|
|
"html_url": "https:\/\/github.com\/donaldashdown\/Common-Vulnerability-and-Exploit",
|
|
"description": "This is the Apache Struts CVE-2017-5638 struts 2 vulnerability. The same CVE that resulted in the equifax database breach.",
|
|
"fork": false,
|
|
"created_at": "2017-10-30T05:21:53Z",
|
|
"updated_at": "2017-10-30T05:21:53Z",
|
|
"pushed_at": "2017-11-11T23:32:05Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 117999664,
|
|
"name": "cybersecurity-struts2",
|
|
"full_name": "grant100\/cybersecurity-struts2",
|
|
"owner": {
|
|
"login": "grant100",
|
|
"id": 28523112,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28523112?v=4",
|
|
"html_url": "https:\/\/github.com\/grant100"
|
|
},
|
|
"html_url": "https:\/\/github.com\/grant100\/cybersecurity-struts2",
|
|
"description": "Struts2 Application Vulnerable to CVE-2017-5638. Explains how the exploit of the vulnerability works in relation to OGNL and the JakartaMultiPart parser.",
|
|
"fork": false,
|
|
"created_at": "2018-01-18T15:19:39Z",
|
|
"updated_at": "2019-01-23T00:39:32Z",
|
|
"pushed_at": "2019-01-23T00:39:29Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 119230111,
|
|
"name": "apache-struts-v2-CVE-2017-5638",
|
|
"full_name": "cafnet\/apache-struts-v2-CVE-2017-5638",
|
|
"owner": {
|
|
"login": "cafnet",
|
|
"id": 12993208,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12993208?v=4",
|
|
"html_url": "https:\/\/github.com\/cafnet"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cafnet\/apache-struts-v2-CVE-2017-5638",
|
|
"description": "Working POC for CVE 2017-5638",
|
|
"fork": false,
|
|
"created_at": "2018-01-28T05:17:04Z",
|
|
"updated_at": "2018-01-28T05:55:11Z",
|
|
"pushed_at": "2018-01-28T05:55:09Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 121659152,
|
|
"name": "CVE-2017-5638",
|
|
"full_name": "0x00-0x00\/CVE-2017-5638",
|
|
"owner": {
|
|
"login": "0x00-0x00",
|
|
"id": 23364530,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23364530?v=4",
|
|
"html_url": "https:\/\/github.com\/0x00-0x00"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0x00-0x00\/CVE-2017-5638",
|
|
"description": "Struts02 s2-045 exploit program",
|
|
"fork": false,
|
|
"created_at": "2018-02-15T17:31:07Z",
|
|
"updated_at": "2019-03-27T18:13:56Z",
|
|
"pushed_at": "2018-02-15T17:36:07Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 123348547,
|
|
"name": "struts2_cve-2017-5638",
|
|
"full_name": "m3ssap0\/struts2_cve-2017-5638",
|
|
"owner": {
|
|
"login": "m3ssap0",
|
|
"id": 705120,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/705120?v=4",
|
|
"html_url": "https:\/\/github.com\/m3ssap0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/m3ssap0\/struts2_cve-2017-5638",
|
|
"description": "This is a sort of Java porting of the Python exploit at: https:\/\/www.exploit-db.com\/exploits\/41570\/.",
|
|
"fork": false,
|
|
"created_at": "2018-02-28T22:11:50Z",
|
|
"updated_at": "2018-03-17T10:17:06Z",
|
|
"pushed_at": "2018-03-10T11:56:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 125206287,
|
|
"name": "struts2-jakarta-inject",
|
|
"full_name": "Greynad\/struts2-jakarta-inject",
|
|
"owner": {
|
|
"login": "Greynad",
|
|
"id": 5173529,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5173529?v=4",
|
|
"html_url": "https:\/\/github.com\/Greynad"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Greynad\/struts2-jakarta-inject",
|
|
"description": "Golang exploit for CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2018-03-14T12:04:34Z",
|
|
"updated_at": "2018-03-28T19:59:04Z",
|
|
"pushed_at": "2018-03-19T17:57:29Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 126003106,
|
|
"name": "struts-rce",
|
|
"full_name": "ggolawski\/struts-rce",
|
|
"owner": {
|
|
"login": "ggolawski",
|
|
"id": 35563296,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35563296?v=4",
|
|
"html_url": "https:\/\/github.com\/ggolawski"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ggolawski\/struts-rce",
|
|
"description": "Apache Struts CVE-2017-5638 RCE exploitation",
|
|
"fork": false,
|
|
"created_at": "2018-03-20T10:51:46Z",
|
|
"updated_at": "2018-05-18T09:54:51Z",
|
|
"pushed_at": "2018-03-20T11:32:35Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 133253539,
|
|
"name": "CVE-2017-5638",
|
|
"full_name": "win3zz\/CVE-2017-5638",
|
|
"owner": {
|
|
"login": "win3zz",
|
|
"id": 12781459,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12781459?v=4",
|
|
"html_url": "https:\/\/github.com\/win3zz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/win3zz\/CVE-2017-5638",
|
|
"description": "Apache Struts 2.3.5 < 2.3.31 \/ 2.5 < 2.5.10 - Remote Code Execution - Shell Script",
|
|
"fork": false,
|
|
"created_at": "2018-05-13T16:13:26Z",
|
|
"updated_at": "2018-05-13T16:14:54Z",
|
|
"pushed_at": "2018-05-13T16:14:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 138520346,
|
|
"name": "CVE-2017-5638-Mass-Exploit",
|
|
"full_name": "leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
|
|
"owner": {
|
|
"login": "leandrocamposcardoso",
|
|
"id": 13025156,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/13025156?v=4",
|
|
"html_url": "https:\/\/github.com\/leandrocamposcardoso"
|
|
},
|
|
"html_url": "https:\/\/github.com\/leandrocamposcardoso\/CVE-2017-5638-Mass-Exploit",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-06-24T22:40:54Z",
|
|
"updated_at": "2018-06-24T22:41:48Z",
|
|
"pushed_at": "2018-06-24T22:41:47Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 138721867,
|
|
"name": "struts2-rce",
|
|
"full_name": "Iletee\/struts2-rce",
|
|
"owner": {
|
|
"login": "Iletee",
|
|
"id": 1454138,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1454138?v=4",
|
|
"html_url": "https:\/\/github.com\/Iletee"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Iletee\/struts2-rce",
|
|
"description": "Exploitable target to CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2018-06-26T10:21:50Z",
|
|
"updated_at": "2019-11-12T10:42:33Z",
|
|
"pushed_at": "2020-01-15T16:12:07Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 131,
|
|
"forks": 131,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 147389150,
|
|
"name": "check_struts",
|
|
"full_name": "andypitcher\/check_struts",
|
|
"owner": {
|
|
"login": "andypitcher",
|
|
"id": 12878731,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/12878731?v=4",
|
|
"html_url": "https:\/\/github.com\/andypitcher"
|
|
},
|
|
"html_url": "https:\/\/github.com\/andypitcher\/check_struts",
|
|
"description": "Apache Struts version analyzer (Ansible) based on CVE-2017-5638",
|
|
"fork": false,
|
|
"created_at": "2018-09-04T18:19:26Z",
|
|
"updated_at": "2020-03-05T21:25:49Z",
|
|
"pushed_at": "2018-10-29T21:49:54Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 158640611,
|
|
"name": "CVE-2017-5638",
|
|
"full_name": "un4ckn0wl3z\/CVE-2017-5638",
|
|
"owner": {
|
|
"login": "un4ckn0wl3z",
|
|
"id": 16059320,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16059320?v=4",
|
|
"html_url": "https:\/\/github.com\/un4ckn0wl3z"
|
|
},
|
|
"html_url": "https:\/\/github.com\/un4ckn0wl3z\/CVE-2017-5638",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-11-22T04:02:59Z",
|
|
"updated_at": "2018-11-22T07:57:38Z",
|
|
"pushed_at": "2018-11-22T04:08:08Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 177221305,
|
|
"name": "CVE-2017-5638",
|
|
"full_name": "colorblindpentester\/CVE-2017-5638",
|
|
"owner": {
|
|
"login": "colorblindpentester",
|
|
"id": 45195264,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/45195264?v=4",
|
|
"html_url": "https:\/\/github.com\/colorblindpentester"
|
|
},
|
|
"html_url": "https:\/\/github.com\/colorblindpentester\/CVE-2017-5638",
|
|
"description": "CVE-2017-5638 (PoC Exploits)",
|
|
"fork": false,
|
|
"created_at": "2019-03-22T23:25:49Z",
|
|
"updated_at": "2019-03-22T23:30:08Z",
|
|
"pushed_at": "2019-03-22T23:29:23Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 202619396,
|
|
"name": "cve-2017-5638",
|
|
"full_name": "injcristianrojas\/cve-2017-5638",
|
|
"owner": {
|
|
"login": "injcristianrojas",
|
|
"id": 862690,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/862690?v=4",
|
|
"html_url": "https:\/\/github.com\/injcristianrojas"
|
|
},
|
|
"html_url": "https:\/\/github.com\/injcristianrojas\/cve-2017-5638",
|
|
"description": "Demo app of THAT data broker's security breach",
|
|
"fork": false,
|
|
"created_at": "2019-08-15T22:27:23Z",
|
|
"updated_at": "2019-09-07T02:06:14Z",
|
|
"pushed_at": "2019-09-07T02:06:12Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |