mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 14:15:32 +01:00
317 lines
No EOL
11 KiB
JSON
317 lines
No EOL
11 KiB
JSON
[
|
|
{
|
|
"id": 743868830,
|
|
"name": "BlueDucky",
|
|
"full_name": "pentestfunctions\/BlueDucky",
|
|
"owner": {
|
|
"login": "pentestfunctions",
|
|
"id": 144001335,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/144001335?v=4",
|
|
"html_url": "https:\/\/github.com\/pentestfunctions",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pentestfunctions\/BlueDucky",
|
|
"description": "🚨 CVE-2023-45866 - BlueDucky Implementation (Using DuckyScript) 🔓 Unauthenticated Peering Leading to Code Execution (Using HID Keyboard)",
|
|
"fork": false,
|
|
"created_at": "2024-01-16T06:52:02Z",
|
|
"updated_at": "2025-11-30T07:14:04Z",
|
|
"pushed_at": "2025-05-06T07:35:36Z",
|
|
"stargazers_count": 1705,
|
|
"watchers_count": 1705,
|
|
"has_discussions": false,
|
|
"forks_count": 291,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 291,
|
|
"watchers": 1705,
|
|
"score": 0,
|
|
"subscribers_count": 30
|
|
},
|
|
{
|
|
"id": 743886715,
|
|
"name": "BluetoothDucky",
|
|
"full_name": "Eason-zz\/BluetoothDucky",
|
|
"owner": {
|
|
"login": "Eason-zz",
|
|
"id": 53202099,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53202099?v=4",
|
|
"html_url": "https:\/\/github.com\/Eason-zz",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Eason-zz\/BluetoothDucky",
|
|
"description": "CVE-2023-45866 - BluetoothDucky implementation (Using DuckyScript)",
|
|
"fork": false,
|
|
"created_at": "2024-01-16T07:44:35Z",
|
|
"updated_at": "2025-11-06T17:35:00Z",
|
|
"pushed_at": "2024-01-15T15:16:40Z",
|
|
"stargazers_count": 11,
|
|
"watchers_count": 11,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 11,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 747408718,
|
|
"name": "cve-2023-45866-py",
|
|
"full_name": "jjjjjjjj987\/cve-2023-45866-py",
|
|
"owner": {
|
|
"login": "jjjjjjjj987",
|
|
"id": 106833546,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106833546?v=4",
|
|
"html_url": "https:\/\/github.com\/jjjjjjjj987",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jjjjjjjj987\/cve-2023-45866-py",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-01-23T21:39:41Z",
|
|
"updated_at": "2024-01-23T21:40:35Z",
|
|
"pushed_at": "2024-01-23T21:42:08Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 821901654,
|
|
"name": "Bluepop",
|
|
"full_name": "cisnarfu\/Bluepop",
|
|
"owner": {
|
|
"login": "cisnarfu",
|
|
"id": 169081131,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/169081131?v=4",
|
|
"html_url": "https:\/\/github.com\/cisnarfu",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cisnarfu\/Bluepop",
|
|
"description": "CVE-2023-45866",
|
|
"fork": false,
|
|
"created_at": "2024-06-29T19:06:37Z",
|
|
"updated_at": "2024-06-29T19:09:57Z",
|
|
"pushed_at": "2024-06-29T19:09:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 851042332,
|
|
"name": "CVE-2023-45866_EXPLOITS",
|
|
"full_name": "AvishekDhakal\/CVE-2023-45866_EXPLOITS",
|
|
"owner": {
|
|
"login": "AvishekDhakal",
|
|
"id": 97275279,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97275279?v=4",
|
|
"html_url": "https:\/\/github.com\/AvishekDhakal",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/AvishekDhakal\/CVE-2023-45866_EXPLOITS",
|
|
"description": "Exploits Tested in Mi A2 Lite and Realme 2 pro",
|
|
"fork": false,
|
|
"created_at": "2024-09-02T10:13:27Z",
|
|
"updated_at": "2025-09-15T19:30:10Z",
|
|
"pushed_at": "2024-09-02T10:15:50Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"bluetooth",
|
|
"bluetooth-hacking",
|
|
"cve-2023-45866",
|
|
"cve-2023-45866-exploits"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 869860995,
|
|
"name": "CVE-2023-45866-POC",
|
|
"full_name": "Chedrian07\/CVE-2023-45866-POC",
|
|
"owner": {
|
|
"login": "Chedrian07",
|
|
"id": 108463785,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108463785?v=4",
|
|
"html_url": "https:\/\/github.com\/Chedrian07",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Chedrian07\/CVE-2023-45866-POC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-10-09T02:48:58Z",
|
|
"updated_at": "2024-10-11T05:34:28Z",
|
|
"pushed_at": "2024-10-11T05:34:25Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 903599533,
|
|
"name": "blueXploit",
|
|
"full_name": "Danyw24\/blueXploit",
|
|
"owner": {
|
|
"login": "Danyw24",
|
|
"id": 81335686,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81335686?v=4",
|
|
"html_url": "https:\/\/github.com\/Danyw24",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Danyw24\/blueXploit",
|
|
"description": "Exploit basado en vulnerabilidades criticas Bluetooth (CVE-2023-45866, CVE-2024-21306)",
|
|
"fork": false,
|
|
"created_at": "2024-12-15T03:00:47Z",
|
|
"updated_at": "2025-11-18T03:16:32Z",
|
|
"pushed_at": "2024-12-15T06:41:13Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 906344035,
|
|
"name": "RustyInjector",
|
|
"full_name": "xG3nesis\/RustyInjector",
|
|
"owner": {
|
|
"login": "xG3nesis",
|
|
"id": 83365854,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83365854?v=4",
|
|
"html_url": "https:\/\/github.com\/xG3nesis",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/xG3nesis\/RustyInjector",
|
|
"description": "Rust implementation of Marc Newlin's keystroke injection proof of concept (CVE-2023-45866).",
|
|
"fork": false,
|
|
"created_at": "2024-12-20T17:28:48Z",
|
|
"updated_at": "2025-11-26T19:31:49Z",
|
|
"pushed_at": "2025-01-25T13:53:55Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 955974521,
|
|
"name": "CVE-2023-45866_WIP",
|
|
"full_name": "ladyg00se\/CVE-2023-45866_WIP",
|
|
"owner": {
|
|
"login": "ladyg00se",
|
|
"id": 75663122,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75663122?v=4",
|
|
"html_url": "https:\/\/github.com\/ladyg00se",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ladyg00se\/CVE-2023-45866_WIP",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-03-27T13:54:04Z",
|
|
"updated_at": "2025-04-08T15:06:44Z",
|
|
"pushed_at": "2025-04-08T15:06:41Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1045012902,
|
|
"name": "BlueDucky",
|
|
"full_name": "Sergeb250\/BlueDucky",
|
|
"owner": {
|
|
"login": "Sergeb250",
|
|
"id": 142254236,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/142254236?v=4",
|
|
"html_url": "https:\/\/github.com\/Sergeb250",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Sergeb250\/BlueDucky",
|
|
"description": "BlueDucky exploits a Bluetooth vulnerability, specifically CVE-2023-45866, which allows an attacker to inject keystrokes into a target device. The attacker's device impersonates a Bluetooth keyboard to establish an encrypted connection without user authorization. The BlueDucky tool automates this process",
|
|
"fork": false,
|
|
"created_at": "2025-08-26T14:26:16Z",
|
|
"updated_at": "2025-08-28T19:04:54Z",
|
|
"pushed_at": "2025-08-26T14:35:43Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |