Skip to content

Commit

Permalink
Auto Update 2025-01-04 06:48:08+00:00
Browse files Browse the repository at this point in the history
  • Loading branch information
actions-user committed Jan 4, 2025
1 parent badb094 commit 639d821
Show file tree
Hide file tree
Showing 4 changed files with 4 additions and 4 deletions.
2 changes: 1 addition & 1 deletion 2021/CVE-2021-44228.json

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion 2024/CVE-2024-49113.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
[{"id":910842302,"node_id":"R_kgDONkpZvg","name":"CVE-2024-49113","full_name":"SafeBreach-Labs/CVE-2024-49113","private":false,"owner":{"login":"SafeBreach-Labs","id":19378730,"node_id":"MDEyOk9yZ2FuaXphdGlvbjE5Mzc4NzMw","avatar_url":"https://avatars.githubusercontent.com/u/19378730?v=4","url":"https://api.github.com/users/SafeBreach-Labs","html_url":"https://github.com/SafeBreach-Labs","type":"Organization","site_admin":false},"html_url":"https://github.com/SafeBreach-Labs/CVE-2024-49113","description":"LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113","fork":false,"url":"https://api.github.com/repos/SafeBreach-Labs/CVE-2024-49113","created_at":"2025-01-01T15:48:38Z","updated_at":"2025-01-04T01:38:15Z","pushed_at":"2025-01-02T16:07:23Z","stargazers_count":326,"watchers_count":326,"forks_count":71,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":71,"watchers":326,"default_branch":"main","score":1},{"id":911503737,"node_id":"R_kgDONlRxeQ","name":"CVE-2024-49113-Checker","full_name":"barcrange/CVE-2024-49113-Checker","private":false,"owner":{"login":"barcrange","id":83610130,"node_id":"MDQ6VXNlcjgzNjEwMTMw","avatar_url":"https://avatars.githubusercontent.com/u/83610130?v=4","url":"https://api.github.com/users/barcrange","html_url":"https://github.com/barcrange","type":"User","site_admin":false},"html_url":"https://github.com/barcrange/CVE-2024-49113-Checker","description":"","fork":false,"url":"https://api.github.com/repos/barcrange/CVE-2024-49113-Checker","created_at":"2025-01-03T07:05:33Z","updated_at":"2025-01-03T18:45:31Z","pushed_at":"2025-01-03T08:20:03Z","stargazers_count":2,"watchers_count":2,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":2,"default_branch":"main","score":1}]
[{"id":910842302,"node_id":"R_kgDONkpZvg","name":"CVE-2024-49113","full_name":"SafeBreach-Labs/CVE-2024-49113","private":false,"owner":{"login":"SafeBreach-Labs","id":19378730,"node_id":"MDEyOk9yZ2FuaXphdGlvbjE5Mzc4NzMw","avatar_url":"https://avatars.githubusercontent.com/u/19378730?v=4","url":"https://api.github.com/users/SafeBreach-Labs","html_url":"https://github.com/SafeBreach-Labs","type":"Organization","site_admin":false},"html_url":"https://github.com/SafeBreach-Labs/CVE-2024-49113","description":"LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113","fork":false,"url":"https://api.github.com/repos/SafeBreach-Labs/CVE-2024-49113","created_at":"2025-01-01T15:48:38Z","updated_at":"2025-01-04T06:42:23Z","pushed_at":"2025-01-02T16:07:23Z","stargazers_count":327,"watchers_count":327,"forks_count":71,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":71,"watchers":327,"default_branch":"main","score":1},{"id":911503737,"node_id":"R_kgDONlRxeQ","name":"CVE-2024-49113-Checker","full_name":"barcrange/CVE-2024-49113-Checker","private":false,"owner":{"login":"barcrange","id":83610130,"node_id":"MDQ6VXNlcjgzNjEwMTMw","avatar_url":"https://avatars.githubusercontent.com/u/83610130?v=4","url":"https://api.github.com/users/barcrange","html_url":"https://github.com/barcrange","type":"User","site_admin":false},"html_url":"https://github.com/barcrange/CVE-2024-49113-Checker","description":"","fork":false,"url":"https://api.github.com/repos/barcrange/CVE-2024-49113-Checker","created_at":"2025-01-03T07:05:33Z","updated_at":"2025-01-03T18:45:31Z","pushed_at":"2025-01-03T08:20:03Z","stargazers_count":2,"watchers_count":2,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":0,"watchers":2,"default_branch":"main","score":1}]
2 changes: 1 addition & 1 deletion dateLog/2025-01-04.json

Large diffs are not rendered by default.

2 changes: 1 addition & 1 deletion update.json
Original file line number Diff line number Diff line change
@@ -1 +1 @@
[{"id":910842302,"node_id":"R_kgDONkpZvg","name":"CVE-2024-49113","full_name":"SafeBreach-Labs/CVE-2024-49113","private":false,"owner":{"login":"SafeBreach-Labs","id":19378730,"node_id":"MDEyOk9yZ2FuaXphdGlvbjE5Mzc4NzMw","avatar_url":"https://avatars.githubusercontent.com/u/19378730?v=4","url":"https://api.github.com/users/SafeBreach-Labs","html_url":"https://github.com/SafeBreach-Labs","type":"Organization","site_admin":false},"html_url":"https://github.com/SafeBreach-Labs/CVE-2024-49113","description":"LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113","fork":false,"url":"https://api.github.com/repos/SafeBreach-Labs/CVE-2024-49113","created_at":"2025-01-01T15:48:38Z","updated_at":"2025-01-04T01:38:15Z","pushed_at":"2025-01-02T16:07:23Z","stargazers_count":326,"watchers_count":326,"forks_count":71,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":71,"watchers":326,"default_branch":"main","score":1}]
[{"id":910842302,"node_id":"R_kgDONkpZvg","name":"CVE-2024-49113","full_name":"SafeBreach-Labs/CVE-2024-49113","private":false,"owner":{"login":"SafeBreach-Labs","id":19378730,"node_id":"MDEyOk9yZ2FuaXphdGlvbjE5Mzc4NzMw","avatar_url":"https://avatars.githubusercontent.com/u/19378730?v=4","url":"https://api.github.com/users/SafeBreach-Labs","html_url":"https://github.com/SafeBreach-Labs","type":"Organization","site_admin":false},"html_url":"https://github.com/SafeBreach-Labs/CVE-2024-49113","description":"LdapNightmare is a PoC tool that tests a vulnerable Windows Server against CVE-2024-49113","fork":false,"url":"https://api.github.com/repos/SafeBreach-Labs/CVE-2024-49113","created_at":"2025-01-01T15:48:38Z","updated_at":"2025-01-04T06:42:23Z","pushed_at":"2025-01-02T16:07:23Z","stargazers_count":327,"watchers_count":327,"forks_count":71,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":[],"visibility":"public","forks":71,"watchers":327,"default_branch":"main","score":1},{"id":889383776,"node_id":"R_kgDONQLrYA","name":"HTA-Exploit","full_name":"Mykhis/HTA-Exploit","private":false,"owner":{"login":"Mykhis","id":188660500,"node_id":"O_kgDOCz67FA","avatar_url":"https://avatars.githubusercontent.com/u/188660500?v=4","url":"https://api.github.com/users/Mykhis","html_url":"https://github.com/Mykhis","type":"Organization","site_admin":false},"html_url":"https://github.com/Mykhis/HTA-Exploit","description":"Microsoft Windows HTA (HTML Application) - Pinnacle of Remote Code Execution","fork":false,"url":"https://api.github.com/repos/Mykhis/HTA-Exploit","created_at":"2024-11-16T08:28:52Z","updated_at":"2025-01-04T06:46:20Z","pushed_at":"2025-01-04T06:46:17Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1},{"id":889383768,"node_id":"R_kgDONQLrWA","name":"Discord-Image-Logger-Stealer","full_name":"Mykhis/Discord-Image-Logger-Stealer","private":false,"owner":{"login":"Mykhis","id":188660500,"node_id":"O_kgDOCz67FA","avatar_url":"https://avatars.githubusercontent.com/u/188660500?v=4","url":"https://api.github.com/users/Mykhis","html_url":"https://github.com/Mykhis","type":"Organization","site_admin":false},"html_url":"https://github.com/Mykhis/Discord-Image-Logger-Stealer","description":"Ephemeral discourse is embodied by the likes of Messenger Sessions, the digital portraits of Accounts, and the enigmatic Token","fork":false,"url":"https://api.github.com/repos/Mykhis/Discord-Image-Logger-Stealer","created_at":"2024-11-16T08:28:51Z","updated_at":"2025-01-04T06:44:10Z","pushed_at":"2025-01-04T06:44:06Z","stargazers_count":2,"watchers_count":2,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"visibility":"public","forks":0,"watchers":2,"default_branch":"main","score":1},{"id":889383770,"node_id":"R_kgDONQLrWg","name":"Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware","full_name":"Mykhis/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware","private":false,"owner":{"login":"Mykhis","id":188660500,"node_id":"O_kgDOCz67FA","avatar_url":"https://avatars.githubusercontent.com/u/188660500?v=4","url":"https://api.github.com/users/Mykhis","html_url":"https://github.com/Mykhis","type":"Organization","site_admin":false},"html_url":"https://github.com/Mykhis/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware","description":"In the hushed galleries of the Silent JPG Exploit, a symphony shrouded in enigma unfurls—an opus named silent-jpg-exploit-2018—a title that reverberates through the annals of intrigue.","fork":false,"url":"https://api.github.com/repos/Mykhis/Jpg-Png-Exploit-Slient-Builder-Exploit-Database-Cve-2023-Malware","created_at":"2024-11-16T08:28:51Z","updated_at":"2025-01-04T06:44:01Z","pushed_at":"2025-01-04T06:43:58Z","stargazers_count":1,"watchers_count":1,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"visibility":"public","forks":0,"watchers":1,"default_branch":"main","score":1},{"id":889383774,"node_id":"R_kgDONQLrXg","name":"PDF-FUD-Exploit","full_name":"Mykhis/PDF-FUD-Exploit","private":false,"owner":{"login":"Mykhis","id":188660500,"node_id":"O_kgDOCz67FA","avatar_url":"https://avatars.githubusercontent.com/u/188660500?v=4","url":"https://api.github.com/users/Mykhis","html_url":"https://github.com/Mykhis","type":"Organization","site_admin":false},"html_url":"https://github.com/Mykhis/PDF-FUD-Exploit","description":"A meticulous scrutiny of the Exploit PDFs innards exposes a network of malevolence, unveiling both the nefarious hyperlink and the URL that precipitates","fork":false,"url":"https://api.github.com/repos/Mykhis/PDF-FUD-Exploit","created_at":"2024-11-16T08:28:51Z","updated_at":"2025-01-04T06:43:54Z","pushed_at":"2025-01-04T06:43:50Z","stargazers_count":0,"watchers_count":0,"forks_count":1,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"visibility":"public","forks":1,"watchers":0,"default_branch":"main","score":1},{"id":889383771,"node_id":"R_kgDONQLrWw","name":"Slient-URL-Exploit","full_name":"Mykhis/Slient-URL-Exploit","private":false,"owner":{"login":"Mykhis","id":188660500,"node_id":"O_kgDOCz67FA","avatar_url":"https://avatars.githubusercontent.com/u/188660500?v=4","url":"https://api.github.com/users/Mykhis","html_url":"https://github.com/Mykhis","type":"Organization","site_admin":false},"html_url":"https://github.com/Mykhis/Slient-URL-Exploit","description":"URL Contamination Exploit Muted Java Drive-By downloads can transpire during the act of perusing a website, inaugurating an electronic mail communication.","fork":false,"url":"https://api.github.com/repos/Mykhis/Slient-URL-Exploit","created_at":"2024-11-16T08:28:51Z","updated_at":"2025-01-04T06:40:41Z","pushed_at":"2025-01-04T06:40:38Z","stargazers_count":0,"watchers_count":0,"forks_count":0,"archived":false,"disabled":false,"allow_forking":true,"is_template":false,"topics":["cve","cve-2021-44228","cve-scanning","exploit","exploit-code","exploit-database","exploit-development","exploit-exercises","exploit-kit","exploitation","exploitation-framework","slient-doc-exploit","slient-exploit","slient-exploit-builder","slient-hta-exploit","slient-jpg-exploit","slient-pdf-exploit","slient-png-exploit","slient-url-exploit"],"visibility":"public","forks":0,"watchers":0,"default_branch":"main","score":1}]

0 comments on commit 639d821

Please sign in to comment.