PoC-in-GitHub/2015/CVE-2015-9235.json
2025-03-16 03:31:56 +09:00

107 lines
No EOL
3.7 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 447779613,
"name": "jwt-key-confusion-poc",
"full_name": "aalex954\/jwt-key-confusion-poc",
"owner": {
"login": "aalex954",
"id": 6628565,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6628565?v=4",
"html_url": "https:\/\/github.com\/aalex954",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/aalex954\/jwt-key-confusion-poc",
"description": "JWT Key Confusion PoC (CVE-2015-9235) Written for the Hack the Box challenge - Under Construction",
"fork": false,
"created_at": "2022-01-13T23:09:13Z",
"updated_at": "2023-07-30T01:17:32Z",
"pushed_at": "2022-02-13T22:42:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ctf",
"ctf-challenges",
"cve-2015-9235",
"exploit",
"htb-machine",
"jwt",
"payload-generator",
"penetration-testing",
"pentesting",
"poc",
"python"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 689612786,
"name": "CVE-2015-9235_JWT_key_confusion",
"full_name": "WinDyAlphA\/CVE-2015-9235_JWT_key_confusion",
"owner": {
"login": "WinDyAlphA",
"id": 40216866,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40216866?v=4",
"html_url": "https:\/\/github.com\/WinDyAlphA",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WinDyAlphA\/CVE-2015-9235_JWT_key_confusion",
"description": null,
"fork": false,
"created_at": "2023-09-10T11:27:23Z",
"updated_at": "2023-10-19T09:16:27Z",
"pushed_at": "2023-09-18T07:50:03Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 923029536,
"name": "Venom-JWT",
"full_name": "z-bool\/Venom-JWT",
"owner": {
"login": "z-bool",
"id": 111605994,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/111605994?v=4",
"html_url": "https:\/\/github.com\/z-bool",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/z-bool\/Venom-JWT",
"description": "针对JWT渗透开发的漏洞验证\/密钥爆破工具针对CVE-2015-9235\/空白密钥\/未验证签名攻击\/CVE-2016-10555\/CVE-2018-0114\/CVE-2020-28042的结果生成用于FUZZ也可使用字典\/字符枚举(包括JJWT)的方式进行爆破(JWT Crack)",
"fork": false,
"created_at": "2025-01-27T14:23:31Z",
"updated_at": "2025-03-15T14:38:07Z",
"pushed_at": "2025-03-12T05:25:11Z",
"stargazers_count": 182,
"watchers_count": 182,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 182,
"score": 0,
"subscribers_count": 4
}
]