PoC-in-GitHub/2025/CVE-2025-49844.json
2025-12-18 03:45:19 +09:00

231 lines
No EOL
7.6 KiB
JSON

[
{
"id": 181138897,
"name": "redis_exploit",
"full_name": "ksnnd32\/redis_exploit",
"owner": {
"login": "ksnnd32",
"id": 43755982,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43755982?v=4",
"html_url": "https:\/\/github.com\/ksnnd32",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ksnnd32\/redis_exploit",
"description": "🔍 Explore and test the CVE-2025-49844 (RediShell) vulnerability in Redis with this practical lab environment for secure education and research.",
"fork": false,
"created_at": "2019-04-13T07:51:09Z",
"updated_at": "2025-12-17T18:22:51Z",
"pushed_at": "2025-12-17T18:22:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai-security",
"cve-2025-49844",
"cve-2025-49844-poc",
"docker",
"elaina-cute",
"exploit",
"exploitation",
"exploitation-framework",
"ibm",
"keras",
"red-team",
"redis",
"redis-exploit",
"redis-exploitation",
"tensorflow",
"use-after-free",
"yuri08",
"yuri08loveelaina"
],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 478490703,
"name": "CVE-2025-49844",
"full_name": "Zain3311\/CVE-2025-49844",
"owner": {
"login": "Zain3311",
"id": 103109016,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103109016?v=4",
"html_url": "https:\/\/github.com\/Zain3311",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zain3311\/CVE-2025-49844",
"description": "🚨 Exploit the CVE-2025-49844 Redis Lua interpreter UAF vulnerability to execute arbitrary shellcode and gain persistent backdoor access.",
"fork": false,
"created_at": "2022-04-06T09:27:39Z",
"updated_at": "2025-12-17T18:23:42Z",
"pushed_at": "2025-12-17T18:23:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"ai-security",
"cve-2025",
"cve-2025-49844",
"cve-2025-49844-poc",
"docker",
"elaina-cute",
"exploit",
"exploitation",
"exploitation-framework",
"keras",
"pentest",
"red-team",
"redis",
"redis-exploit",
"redis-exploitation",
"tensorflow",
"yuri08",
"yuri08loveelaina"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1085303403,
"name": "CVE-2025-49844",
"full_name": "elyasbassir\/CVE-2025-49844",
"owner": {
"login": "elyasbassir",
"id": 75251142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75251142?v=4",
"html_url": "https:\/\/github.com\/elyasbassir",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/elyasbassir\/CVE-2025-49844",
"description": "اسکپلویت اسیب پذیری CVE-2025-49844",
"fork": false,
"created_at": "2025-10-28T21:20:19Z",
"updated_at": "2025-10-29T09:40:01Z",
"pushed_at": "2025-10-28T21:34:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1086321151,
"name": "Blackash-CVE-2025-49844",
"full_name": "Ashwesker\/Blackash-CVE-2025-49844",
"owner": {
"login": "Ashwesker",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/Ashwesker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ashwesker\/Blackash-CVE-2025-49844",
"description": "CVE-2025-49844",
"fork": false,
"created_at": "2025-10-30T09:01:20Z",
"updated_at": "2025-10-30T09:18:36Z",
"pushed_at": "2025-10-30T09:18:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1086936331,
"name": "cve-2025-49844",
"full_name": "saneki\/cve-2025-49844",
"owner": {
"login": "saneki",
"id": 4348610,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4348610?v=4",
"html_url": "https:\/\/github.com\/saneki",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/saneki\/cve-2025-49844",
"description": "Proof-of-concept for CVE-2025-49844",
"fork": false,
"created_at": "2025-10-31T05:59:25Z",
"updated_at": "2025-12-15T12:05:42Z",
"pushed_at": "2025-11-20T07:22:56Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-49844",
"lua",
"redis",
"redishell"
],
"visibility": "public",
"forks": 8,
"watchers": 22,
"score": 0,
"subscribers_count": 0
},
{
"id": 1094529015,
"name": "CVE-2025-49844-RediShell-AI-made-Revshell",
"full_name": "Network-Sec\/CVE-2025-49844-RediShell-AI-made-Revshell",
"owner": {
"login": "Network-Sec",
"id": 85315993,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85315993?v=4",
"html_url": "https:\/\/github.com\/Network-Sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Network-Sec\/CVE-2025-49844-RediShell-AI-made-Revshell",
"description": "Untested completition of the Redishell PoC made by AI",
"fork": false,
"created_at": "2025-11-11T20:40:05Z",
"updated_at": "2025-12-06T00:03:18Z",
"pushed_at": "2025-11-15T17:55:44Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
}
]