mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-25 05:35:33 +01:00
379 lines
No EOL
13 KiB
JSON
379 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 391818469,
|
|
"name": "CVE-2021-31630-OpenPLC_RCE",
|
|
"full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
|
|
"owner": {
|
|
"login": "hev0x",
|
|
"id": 6265911,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
|
|
"html_url": "https:\/\/github.com\/hev0x",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
|
|
"description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
|
|
"fork": false,
|
|
"created_at": "2021-08-02T04:48:24Z",
|
|
"updated_at": "2024-08-12T20:15:12Z",
|
|
"pushed_at": "2021-08-02T04:48:25Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 775165945,
|
|
"name": "CVE-2021-31630-HTB",
|
|
"full_name": "Hunt3r0x\/CVE-2021-31630-HTB",
|
|
"owner": {
|
|
"login": "Hunt3r0x",
|
|
"id": 106396603,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4",
|
|
"html_url": "https:\/\/github.com\/Hunt3r0x",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB",
|
|
"description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
|
|
"fork": false,
|
|
"created_at": "2024-03-20T22:02:53Z",
|
|
"updated_at": "2025-09-17T20:38:02Z",
|
|
"pushed_at": "2024-03-21T15:50:45Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 779013491,
|
|
"name": "cve-2021-31630",
|
|
"full_name": "thewhiteh4t\/cve-2021-31630",
|
|
"owner": {
|
|
"login": "thewhiteh4t",
|
|
"id": 36354846,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630",
|
|
"description": "Python script for exploiting command injection in Open PLC Webserver v3",
|
|
"fork": false,
|
|
"created_at": "2024-03-28T21:31:45Z",
|
|
"updated_at": "2025-10-20T09:47:31Z",
|
|
"pushed_at": "2024-07-12T00:16:13Z",
|
|
"stargazers_count": 19,
|
|
"watchers_count": 19,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"exploit",
|
|
"openplc",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 19,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 782064396,
|
|
"name": "htb-wifinetictwo-exploit",
|
|
"full_name": "behindsecurity\/htb-wifinetictwo-exploit",
|
|
"owner": {
|
|
"login": "behindsecurity",
|
|
"id": 32421959,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32421959?v=4",
|
|
"html_url": "https:\/\/github.com\/behindsecurity",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/behindsecurity\/htb-wifinetictwo-exploit",
|
|
"description": "A simple python script to exploit CVE-2021-31630 on HTB WifineticTwo CTF",
|
|
"fork": false,
|
|
"created_at": "2024-04-04T15:12:57Z",
|
|
"updated_at": "2024-09-18T21:06:48Z",
|
|
"pushed_at": "2024-04-04T16:29:35Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 786978803,
|
|
"name": "CVE-2021-31630-OpenPLC-3-Authenticated-RCE",
|
|
"full_name": "mind2hex\/CVE-2021-31630-OpenPLC-3-Authenticated-RCE",
|
|
"owner": {
|
|
"login": "mind2hex",
|
|
"id": 51345640,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
|
|
"html_url": "https:\/\/github.com\/mind2hex",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mind2hex\/CVE-2021-31630-OpenPLC-3-Authenticated-RCE",
|
|
"description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
|
|
"fork": false,
|
|
"created_at": "2024-04-15T16:55:30Z",
|
|
"updated_at": "2025-07-04T03:00:37Z",
|
|
"pushed_at": "2024-04-15T17:07:01Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 810053844,
|
|
"name": "CVE-2021-31630",
|
|
"full_name": "junnythemarksman\/CVE-2021-31630",
|
|
"owner": {
|
|
"login": "junnythemarksman",
|
|
"id": 20056452,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4",
|
|
"html_url": "https:\/\/github.com\/junnythemarksman",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2021-31630",
|
|
"description": "Modified the PoC CVE-2021-31630 script by Fellipe Oliveira for HTB ",
|
|
"fork": false,
|
|
"created_at": "2024-06-04T00:44:47Z",
|
|
"updated_at": "2024-06-04T00:46:34Z",
|
|
"pushed_at": "2024-06-04T00:46:31Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 818448931,
|
|
"name": "cve-2021-31630",
|
|
"full_name": "adibna\/cve-2021-31630",
|
|
"owner": {
|
|
"login": "adibna",
|
|
"id": 76139191,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4",
|
|
"html_url": "https:\/\/github.com\/adibna",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/adibna\/cve-2021-31630",
|
|
"description": "This is a automation of cve-2021-31630 exploitation",
|
|
"fork": false,
|
|
"created_at": "2024-06-21T22:10:49Z",
|
|
"updated_at": "2025-11-12T22:13:42Z",
|
|
"pushed_at": "2024-06-29T17:40:46Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 833217533,
|
|
"name": "CVE-2021-31630",
|
|
"full_name": "manuelsantosiglesias\/CVE-2021-31630",
|
|
"owner": {
|
|
"login": "manuelsantosiglesias",
|
|
"id": 29311335,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29311335?v=4",
|
|
"html_url": "https:\/\/github.com\/manuelsantosiglesias",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/manuelsantosiglesias\/CVE-2021-31630",
|
|
"description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
|
|
"fork": false,
|
|
"created_at": "2024-07-24T15:28:47Z",
|
|
"updated_at": "2024-07-24T16:22:41Z",
|
|
"pushed_at": "2024-07-24T16:22:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 834167517,
|
|
"name": "CVE-2021-31630",
|
|
"full_name": "FlojBoj\/CVE-2021-31630",
|
|
"owner": {
|
|
"login": "FlojBoj",
|
|
"id": 170850781,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170850781?v=4",
|
|
"html_url": "https:\/\/github.com\/FlojBoj",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/FlojBoj\/CVE-2021-31630",
|
|
"description": "POC Exploit for CVE-2021-31630 written in Python3 and using C reverse shell with non-blocking mode",
|
|
"fork": false,
|
|
"created_at": "2024-07-26T15:06:44Z",
|
|
"updated_at": "2024-07-27T14:33:18Z",
|
|
"pushed_at": "2024-07-27T14:33:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1007360823,
|
|
"name": "OpenPLC-CVE-2021-31630-RCE",
|
|
"full_name": "machevalia\/OpenPLC-CVE-2021-31630-RCE",
|
|
"owner": {
|
|
"login": "machevalia",
|
|
"id": 36945847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36945847?v=4",
|
|
"html_url": "https:\/\/github.com\/machevalia",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/machevalia\/OpenPLC-CVE-2021-31630-RCE",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-06-23T21:54:55Z",
|
|
"updated_at": "2025-09-14T02:15:24Z",
|
|
"pushed_at": "2025-06-25T00:23:09Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1070707593,
|
|
"name": "CVE-2021-31630",
|
|
"full_name": "UserB1ank\/CVE-2021-31630",
|
|
"owner": {
|
|
"login": "UserB1ank",
|
|
"id": 105202277,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105202277?v=4",
|
|
"html_url": "https:\/\/github.com\/UserB1ank",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/UserB1ank\/CVE-2021-31630",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2025-10-06T10:29:30Z",
|
|
"updated_at": "2025-10-06T10:30:18Z",
|
|
"pushed_at": "2025-10-06T10:30:15Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 1084008894,
|
|
"name": "OpenPLC_v3",
|
|
"full_name": "tranquac\/OpenPLC_v3",
|
|
"owner": {
|
|
"login": "tranquac",
|
|
"id": 51528368,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51528368?v=4",
|
|
"html_url": "https:\/\/github.com\/tranquac",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tranquac\/OpenPLC_v3",
|
|
"description": "To reproduce CVE-2021-31630",
|
|
"fork": false,
|
|
"created_at": "2025-10-27T04:54:33Z",
|
|
"updated_at": "2025-11-06T07:46:08Z",
|
|
"pushed_at": "2025-10-28T04:41:05Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |