PoC-in-GitHub/2011/CVE-2011-2523.json
2025-11-21 09:43:02 +09:00

980 lines
No EOL
34 KiB
JSON

[
{
"id": 356390440,
"name": "vsftpd2.3.4PyExploit",
"full_name": "HerculesRD\/vsftpd2.3.4PyExploit",
"owner": {
"login": "HerculesRD",
"id": 73125772,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73125772?v=4",
"html_url": "https:\/\/github.com\/HerculesRD",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HerculesRD\/vsftpd2.3.4PyExploit",
"description": "An exploit to get root in vsftpd 2.3.4 (CVE-2011-2523) written in python",
"fork": false,
"created_at": "2021-04-09T20:26:01Z",
"updated_at": "2021-04-12T17:16:08Z",
"pushed_at": "2021-04-12T17:16:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 363437748,
"name": "CVE-2011-2523",
"full_name": "nobodyatall648\/CVE-2011-2523",
"owner": {
"login": "nobodyatall648",
"id": 35725871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35725871?v=4",
"html_url": "https:\/\/github.com\/nobodyatall648",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/nobodyatall648\/CVE-2011-2523",
"description": "vsftpd 2.3.4 Backdoor Exploit",
"fork": false,
"created_at": "2021-05-01T15:03:55Z",
"updated_at": "2025-07-15T19:08:13Z",
"pushed_at": "2021-06-25T19:05:49Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 401789640,
"name": "CVE-2011-2523",
"full_name": "Gr4ykt\/CVE-2011-2523",
"owner": {
"login": "Gr4ykt",
"id": 78503985,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/78503985?v=4",
"html_url": "https:\/\/github.com\/Gr4ykt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gr4ykt\/CVE-2011-2523",
"description": "https:\/\/www.exploit-db.com\/exploits\/49757",
"fork": false,
"created_at": "2021-08-31T17:31:30Z",
"updated_at": "2021-08-31T17:34:41Z",
"pushed_at": "2021-08-31T17:34:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 425428807,
"name": "CVE-2011-2523",
"full_name": "padsalatushal\/CVE-2011-2523",
"owner": {
"login": "padsalatushal",
"id": 57517785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57517785?v=4",
"html_url": "https:\/\/github.com\/padsalatushal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/padsalatushal\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2021-11-07T06:20:27Z",
"updated_at": "2025-11-15T16:35:48Z",
"pushed_at": "2023-01-08T17:46:12Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 3,
"watchers": 15,
"score": 0,
"subscribers_count": 1
},
{
"id": 497133986,
"name": "OffensivePascal-CVE-2011-2523",
"full_name": "MFernstrom\/OffensivePascal-CVE-2011-2523",
"owner": {
"login": "MFernstrom",
"id": 9220603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
"html_url": "https:\/\/github.com\/MFernstrom",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2011-2523",
"description": "FreePascal implementation of the vsFTPD 2.3.4 CVE-2011-2523",
"fork": false,
"created_at": "2022-05-27T20:47:01Z",
"updated_at": "2022-05-29T18:03:07Z",
"pushed_at": "2022-05-28T00:24:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 501728395,
"name": "-CVE-2011-2523",
"full_name": "0xSojalSec\/-CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSojalSec\/-CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:25:25Z",
"updated_at": "2024-08-12T20:23:59Z",
"pushed_at": "2022-06-09T16:31:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 501728828,
"name": "CVE-2011-2523",
"full_name": "0xSojalSec\/CVE-2011-2523",
"owner": {
"login": "0xSojalSec",
"id": 92203029,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92203029?v=4",
"html_url": "https:\/\/github.com\/0xSojalSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xSojalSec\/CVE-2011-2523",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2022-06-09T16:26:43Z",
"updated_at": "2023-02-16T21:08:24Z",
"pushed_at": "2022-06-04T17:26:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 573823365,
"name": "CTF---CVE-2011-2523",
"full_name": "XiangSi-Howard\/CTF---CVE-2011-2523",
"owner": {
"login": "XiangSi-Howard",
"id": 54540850,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54540850?v=4",
"html_url": "https:\/\/github.com\/XiangSi-Howard",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/XiangSi-Howard\/CTF---CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2022-12-03T14:47:52Z",
"updated_at": "2022-12-03T14:47:52Z",
"pushed_at": "2022-12-04T15:22:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 597877966,
"name": "CVE-2011-2523",
"full_name": "cowsecurity\/CVE-2011-2523",
"owner": {
"login": "cowsecurity",
"id": 74612612,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74612612?v=4",
"html_url": "https:\/\/github.com\/cowsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cowsecurity\/CVE-2011-2523",
"description": "CVE-2011-2523 exploit",
"fork": false,
"created_at": "2023-02-05T22:17:34Z",
"updated_at": "2023-04-01T15:46:38Z",
"pushed_at": "2023-02-05T22:19:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 638624173,
"name": "CVE-2011-2523",
"full_name": "Lynk4\/CVE-2011-2523",
"owner": {
"login": "Lynk4",
"id": 44930131,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44930131?v=4",
"html_url": "https:\/\/github.com\/Lynk4",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lynk4\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2023-05-09T18:44:05Z",
"updated_at": "2025-10-17T04:26:58Z",
"pushed_at": "2023-05-09T19:14:25Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"metasploitable",
"metasploitable-2",
"metasploitable-3",
"python",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 705865634,
"name": "CVE-2011-2523",
"full_name": "vaishnavucv\/CVE-2011-2523",
"owner": {
"login": "vaishnavucv",
"id": 76824366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76824366?v=4",
"html_url": "https:\/\/github.com\/vaishnavucv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vaishnavucv\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ",
"fork": false,
"created_at": "2023-10-16T21:00:27Z",
"updated_at": "2024-10-22T16:11:18Z",
"pushed_at": "2024-10-22T16:11:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 724568768,
"name": "CVE-2011-2523-poc",
"full_name": "4m3rr0r\/CVE-2011-2523-poc",
"owner": {
"login": "4m3rr0r",
"id": 90191914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90191914?v=4",
"html_url": "https:\/\/github.com\/4m3rr0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4m3rr0r\/CVE-2011-2523-poc",
"description": "Python exploit for CVE-2011-2523 (VSFTPD 2.3.4 Backdoor Command Execution)",
"fork": false,
"created_at": "2023-11-28T10:52:33Z",
"updated_at": "2025-09-21T16:48:30Z",
"pushed_at": "2023-11-28T13:36:42Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 767459057,
"name": "Exploit-CVE-2011-2523",
"full_name": "Shubham-2k1\/Exploit-CVE-2011-2523",
"owner": {
"login": "Shubham-2k1",
"id": 71768868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71768868?v=4",
"html_url": "https:\/\/github.com\/Shubham-2k1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Shubham-2k1\/Exploit-CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2024-03-05T10:31:42Z",
"updated_at": "2024-03-05T10:32:04Z",
"pushed_at": "2024-03-05T10:35:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 790562403,
"name": "SmileySploit",
"full_name": "Tenor-Z\/SmileySploit",
"owner": {
"login": "Tenor-Z",
"id": 55516164,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55516164?v=4",
"html_url": "https:\/\/github.com\/Tenor-Z",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Tenor-Z\/SmileySploit",
"description": "A basic script that exploits CVE-2011-2523",
"fork": false,
"created_at": "2024-04-23T05:33:39Z",
"updated_at": "2024-04-23T05:36:57Z",
"pushed_at": "2024-04-23T05:36:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 806726183,
"name": "CVE-2011-2523-PoC",
"full_name": "0xB0y426\/CVE-2011-2523-PoC",
"owner": {
"login": "0xB0y426",
"id": 132174647,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/132174647?v=4",
"html_url": "https:\/\/github.com\/0xB0y426",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xB0y426\/CVE-2011-2523-PoC",
"description": "PoC CVE-2011-2523 ",
"fork": false,
"created_at": "2024-05-27T19:13:59Z",
"updated_at": "2024-09-15T18:39:16Z",
"pushed_at": "2024-05-27T19:16:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823495260,
"name": "CVE-Research",
"full_name": "AnugiArrawwala\/CVE-Research",
"owner": {
"login": "AnugiArrawwala",
"id": 141626082,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141626082?v=4",
"html_url": "https:\/\/github.com\/AnugiArrawwala",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AnugiArrawwala\/CVE-Research",
"description": "CVE-2017-0144 (Eternal Blue) | CVE-2023-3881 | CVE-2011-2523",
"fork": false,
"created_at": "2024-07-03T06:30:54Z",
"updated_at": "2024-07-03T06:52:39Z",
"pushed_at": "2024-07-03T06:52:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 837704091,
"name": "vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"full_name": "Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"owner": {
"login": "Gill-Singh-A",
"id": 123238182,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/123238182?v=4",
"html_url": "https:\/\/github.com\/Gill-Singh-A",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gill-Singh-A\/vsFTP-2.3.4-Remote-Root-Shell-Exploit",
"description": "A Simple Python Program that uses gets a Remote Root Shell on the Target Device by exploiting a Vulnerability (CVE-2011-2523) present in vsFTP 2.3.4",
"fork": false,
"created_at": "2024-08-03T19:06:59Z",
"updated_at": "2025-03-18T17:59:29Z",
"pushed_at": "2024-08-03T19:07:19Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"exploit",
"ftp",
"python3",
"remote-exploit",
"ssh",
"vsftp"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 908317555,
"name": "CVE-2011-2523",
"full_name": "NullBrunk\/CVE-2011-2523",
"owner": {
"login": "NullBrunk",
"id": 125673909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/125673909?v=4",
"html_url": "https:\/\/github.com\/NullBrunk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NullBrunk\/CVE-2011-2523",
"description": "VsFTPd 2.3.4 Backdoor Command Execution",
"fork": false,
"created_at": "2024-12-25T18:04:10Z",
"updated_at": "2025-02-25T15:53:38Z",
"pushed_at": "2024-12-26T13:05:41Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 935734747,
"name": "vsftpd-backdoor",
"full_name": "Lychi3\/vsftpd-backdoor",
"owner": {
"login": "Lychi3",
"id": 79777140,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79777140?v=4",
"html_url": "https:\/\/github.com\/Lychi3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lychi3\/vsftpd-backdoor",
"description": "Exploit hecho en python para vsftpd 2.3.4 | CVE-2011-2523 ",
"fork": false,
"created_at": "2025-02-19T23:45:12Z",
"updated_at": "2025-02-20T00:25:05Z",
"pushed_at": "2025-02-20T00:25:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 960851303,
"name": "vsftpd-234-vuln-report",
"full_name": "vedpakhare\/vsftpd-234-vuln-report",
"owner": {
"login": "vedpakhare",
"id": 206309256,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/206309256?v=4",
"html_url": "https:\/\/github.com\/vedpakhare",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vedpakhare\/vsftpd-234-vuln-report",
"description": "Vulnerability assessment and exploitation of vsftpd 2.3.4 (CVE-2011-2523) using Metasploit. Full report and proof of root access included.",
"fork": false,
"created_at": "2025-04-05T07:39:13Z",
"updated_at": "2025-04-05T07:59:38Z",
"pushed_at": "2025-04-05T07:55:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cybersecurity",
"exploit",
"ftp",
"metasploit",
"report",
"root-access",
"vapt",
"vsftpd"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 961357666,
"name": "CVE-2011-2523",
"full_name": "cybermads\/CVE-2011-2523",
"owner": {
"login": "cybermads",
"id": 171419864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171419864?v=4",
"html_url": "https:\/\/github.com\/cybermads",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cybermads\/CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2025-04-06T10:52:47Z",
"updated_at": "2025-08-14T14:11:08Z",
"pushed_at": "2025-04-06T11:34:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 965106284,
"name": "CVE-2011-2523",
"full_name": "sug4r-wr41th\/CVE-2011-2523",
"owner": {
"login": "sug4r-wr41th",
"id": 136193030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/136193030?v=4",
"html_url": "https:\/\/github.com\/sug4r-wr41th",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sug4r-wr41th\/CVE-2011-2523",
"description": "vsFTPd 2.3.4 CVE-2011-2523 PoC",
"fork": false,
"created_at": "2025-04-12T12:29:18Z",
"updated_at": "2025-04-12T12:29:44Z",
"pushed_at": "2025-04-12T12:29:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 966267366,
"name": "explotacion-vsftpd-nmap_Laboratorio_1",
"full_name": "JohanMV\/explotacion-vsftpd-nmap_Laboratorio_1",
"owner": {
"login": "JohanMV",
"id": 89036307,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89036307?v=4",
"html_url": "https:\/\/github.com\/JohanMV",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JohanMV\/explotacion-vsftpd-nmap_Laboratorio_1",
"description": "Laboratorio técnico de ciberseguridad donde se realiza reconocimiento de red con Nmap y explotación de la vulnerabilidad CVE-2011-2523 (vsftpd 2.3.4) mediante Metasploit Framework. Proyecto académico orientado a demostrar habilidades en análisis de vulnerabilidades, uso de herramientas de pentesting y reporte técnico. ",
"fork": false,
"created_at": "2025-04-14T16:55:28Z",
"updated_at": "2025-04-14T16:57:39Z",
"pushed_at": "2025-04-14T16:57:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1005074425,
"name": "vsftpd234-exploit",
"full_name": "lghost256\/vsftpd234-exploit",
"owner": {
"login": "lghost256",
"id": 86013812,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86013812?v=4",
"html_url": "https:\/\/github.com\/lghost256",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lghost256\/vsftpd234-exploit",
"description": "Exploit for CVE-2011-2523.",
"fork": false,
"created_at": "2025-06-19T16:14:21Z",
"updated_at": "2025-06-19T16:18:38Z",
"pushed_at": "2025-06-19T16:18:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1014643997,
"name": "CVE-2011-2523",
"full_name": "hklabCR\/CVE-2011-2523",
"owner": {
"login": "hklabCR",
"id": 184572426,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/184572426?v=4",
"html_url": "https:\/\/github.com\/hklabCR",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hklabCR\/CVE-2011-2523",
"description": null,
"fork": false,
"created_at": "2025-07-06T05:57:51Z",
"updated_at": "2025-07-06T06:03:25Z",
"pushed_at": "2025-07-06T06:03:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1018406103,
"name": "CVE-2011-2523",
"full_name": "krill-x7\/CVE-2011-2523",
"owner": {
"login": "krill-x7",
"id": 72803175,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72803175?v=4",
"html_url": "https:\/\/github.com\/krill-x7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/krill-x7\/CVE-2011-2523",
"description": " Python exploit for vsftpd 2.3.4 - Backdoor Command Execution ",
"fork": false,
"created_at": "2025-07-12T07:31:48Z",
"updated_at": "2025-07-16T03:13:53Z",
"pushed_at": "2025-07-15T19:21:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1035795722,
"name": "CVE-2011-2523",
"full_name": "BolivarJ\/CVE-2011-2523",
"owner": {
"login": "BolivarJ",
"id": 90159954,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90159954?v=4",
"html_url": "https:\/\/github.com\/BolivarJ",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BolivarJ\/CVE-2011-2523",
"description": "Python exploit for vsftpd 2.3.4 - Backdoor Command Execution",
"fork": false,
"created_at": "2025-08-11T05:26:27Z",
"updated_at": "2025-11-04T20:51:08Z",
"pushed_at": "2025-08-11T05:55:06Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2011-2523",
"exploit",
"python",
"security",
"vsftpd",
"vsftpd-exploit"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 0
},
{
"id": 1041313298,
"name": "vsftpd-exploit",
"full_name": "seerat-fatima21\/vsftpd-exploit",
"owner": {
"login": "seerat-fatima21",
"id": 221690824,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/221690824?v=4",
"html_url": "https:\/\/github.com\/seerat-fatima21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/seerat-fatima21\/vsftpd-exploit",
"description": "A step-by-step walkthrough of exploiting the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) in a controlled lab environment, demonstrating reconnaissance, exploitation with Metasploit, and establishing a reverse shell.",
"fork": false,
"created_at": "2025-08-20T09:54:51Z",
"updated_at": "2025-08-20T10:27:30Z",
"pushed_at": "2025-08-20T10:27:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1043978123,
"name": "Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit",
"full_name": "hajisthabegum\/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit",
"owner": {
"login": "hajisthabegum",
"id": 152469774,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/152469774?v=4",
"html_url": "https:\/\/github.com\/hajisthabegum",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hajisthabegum\/Exploiting-vsFTPd-2.3.4-Backdoor-Vulnerability-Ethical-Hacking-Lab-with-Metasploitable-2-Metasploit",
"description": "his project demonstrates the exploitation of the vsFTPd 2.3.4 backdoor vulnerability (CVE-2011-2523) using Metasploitable 2 and Kali Linux with Metasploit. It includes reconnaissance, exploitation, and defensive measures, with a detailed report and lab setup for learning ethical hacking and security best practices.",
"fork": false,
"created_at": "2025-08-25T02:13:28Z",
"updated_at": "2025-08-25T02:13:29Z",
"pushed_at": "2025-08-25T02:13:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1097840259,
"name": "CVE-2011-2523",
"full_name": "avivyap\/CVE-2011-2523",
"owner": {
"login": "avivyap",
"id": 141031195,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/141031195?v=4",
"html_url": "https:\/\/github.com\/avivyap",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/avivyap\/CVE-2011-2523",
"description": "Explotacion de la version 2.3.4 de vsftpd automatizada ",
"fork": false,
"created_at": "2025-11-16T22:55:07Z",
"updated_at": "2025-11-16T23:05:31Z",
"pushed_at": "2025-11-16T23:05:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]