{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"go-exploit","owner":"vulncheck-oss","isFork":false,"description":"A Go-based Exploit Framework","allTopics":["exploitation-framework","exploit-development","go-exploit"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":2,"issueCount":4,"starsCount":233,"forksCount":29,"license":"Apache License 2.0","participation":[3,0,7,0,10,3,22,11,14,5,11,2,0,5,2,0,1,8,0,1,5,0,2,0,0,2,2,0,0,0,1,9,12,8,2,2,2,0,13,5,3,9,13,8,3,8,4,32,0,5,3,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-08T13:00:06.214Z"}},{"type":"Public","name":"action","owner":"vulncheck-oss","isFork":false,"description":"The VulnCheck Github Action","allTopics":[],"primaryLanguage":{"name":"TypeScript","color":"#3178c6"},"pullRequestCount":2,"issueCount":1,"starsCount":2,"forksCount":0,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,51,84,62,46,0,12,0,0,3,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-08T11:07:26.177Z"}},{"type":"Public","name":"sdk","owner":"vulncheck-oss","isFork":false,"description":"Bring the VulnCheck API to your Go applications.","allTopics":["api","golang","sdk","vulncheck"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":0,"starsCount":6,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-08T01:43:00.578Z"}},{"type":"Public","name":"cli","owner":"vulncheck-oss","isFork":false,"description":"VulnCheck's official command line tool","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":6,"issueCount":7,"starsCount":101,"forksCount":5,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,12,10,7,20,17,18,1,7,12,8,29,13,8,11,6,0,1,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-05T17:59:41.144Z"}},{"type":"Public","name":"cve-2023-22527","owner":"vulncheck-oss","isFork":false,"description":"Three go-exploits exploiting CVE-2023-22527 to execute arbitrary code in memory","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,1,1,1,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T13:54:41.187Z"}},{"type":"Public","name":"cve-2023-25194","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit for Apache Druid CVE-2023-25194","allTopics":["cve-2023-25194","go-exploit"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T13:51:29.247Z"}},{"type":"Public","name":"cve-2023-46604","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit for Apache ActiveMQ CVE-2023-46604","allTopics":["go-exploit","cve-2023-46604"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T13:27:12.807Z"}},{"type":"Public","name":"cisco-ios-xe-implant-scanner","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit to scan for implanted Cisco IOS XE Systems","allTopics":["go-exploit","cve-2023-20198"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":37,"forksCount":5,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,2,4,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T09:25:31.029Z"}},{"type":"Public","name":"fetch-broker-conf","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit for fetching the RocketMQ broker configuration in order to discover indicators of compromise for CVE-2023-33246","allTopics":["cve-2023-33246","go-exploit"],"primaryLanguage":{"name":"Makefile","color":"#427819"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,2,1,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T09:24:38.390Z"}},{"type":"Public","name":"cve-2023-51467","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit for Apache OFBiz CVE-2023-51467","allTopics":["cve-2023-51467","go-expliot"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,1,0,0,0,0,0,0,2,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T09:23:04.432Z"}},{"type":"Public","name":"cve-2023-36845-scanner","owner":"vulncheck-oss","isFork":false,"description":"A go-exploit to scan for Juniper firewalls vulnerable to CVE-2023-36845","allTopics":["cve-2023-36845","go-exploit"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":59,"forksCount":7,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-10T09:21:21.016Z"}}],"repositoryCount":11,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"vulncheck-oss repositories"}