Open source vulnerability DB and triage service.

Overview

OSV - Open Source Vulnerabilities

OSV is a vulnerability database and triage infrastructure for open source projects aimed at helping both open source maintainers and consumers of open source.

For open source maintainers, OSV's automation helps reduce the burden of triage. Each vulnerability undergoes automated bisection and impact analysis to determine precise affected commit and version ranges.

For open source consumers, OSV provides an API that lets users of these projects query whether or not their versions are impacted.

Current data sources:

This is an ongoing project. We are hoping to work with the open source community to onboard more sources of data.

Viewing the web UI

An instance of OSV's web UI is deployed at https://osv.dev.

Using the API

  curl -X POST -d \
      '{"commit": "6879efc2c1596d11a6a6ad296f80063b558d5e0f"}' \
      "https://api.osv.dev/v1/query?key=$API_KEY"

  curl -X POST -d \
      '{"version": "1.0.0", "package": {"name": "foo", "ecosystem": "bar"}}' \
      "https://api.osv.dev/v1/query?key=$API_KEY"

Detailed documentation for using the API can be found at https://osv.dev/docs/.

Architecture

You can find an overview of OSV's architecture here.

This repository

This repository contains all the code for running OSV on GCP. This consists of:

  • API server (gcp/api)
  • Web interface (gcp/appengine)
  • Workers for bisection and impact analysis (docker/worker)
  • Sample tools (tools)

You'll need to check out submodules as well for many local building steps to work:

git submodule update --init --recursive

Contributions are welcome! We also have a mailing list and a FAQ.

Comments
  • Schema issue with CAN-2022-1000071

    Schema issue with CAN-2022-1000071

    Hello, I maybe wrong where to report this issue but let me try.

    CAN-2022-1000071 in https://osv-vulnerabilities.storage.googleapis.com/GSD/all.zip violates the OSV schema.

    {
      "id": "CAN-2022-1000071",
      "summary": "Default Credentials in XB6 Fibre+ Gateway version XB6_0821",
      "details": "In Shaw Communications Inc XB6 Fibre+ Gateway version XB6_0821 a Default Credentials exists in the Router/Modem that can be attacked via local access resulting in Admin access to router",
      "modified": "2022-02-01T19:38:14.238938Z",
      "published": "2022-02-01T19:38:14.238938Z",
      "references": [
        {
          "type": "WEB",
          "url": "https://support.shaw.ca/t5/internet-articles/guide-fibre-gateway-xb6-xb7/ta-p/5114"
        },
        {
          "type": "WEB"
        }
      ],
      "affected": [
        {
          "package": {
            "name": "XB6 Fibre+ Gateway",
            "ecosystem": "GSD"
          },
          "versions": [
            "XB6_0821"
          ],
          "database_specific": {
            "source": "https://github.com/cloudsecurityalliance/gsd-database/blob/main/2022/1000xxx/GSD-2022-1000071.json"
          }
        }
      ],
      "schema_version": "1.3.0"
    }
    

    reference (in references) should have url but not. I cannot find the original data source. So maybe there is something wrong the original data side not osv.dev side.

    bug datasource 
    opened by ninoseki 20
  • Bump google-cloud-logging from 2.1.0 to 3.1.2 in /gcp/api

    Bump google-cloud-logging from 2.1.0 to 3.1.2 in /gcp/api

    Bumps google-cloud-logging from 2.1.0 to 3.1.2.

    Release notes

    Sourced from google-cloud-logging's releases.

    v3.1.2

    3.1.2 (2022-06-03)

    Bug Fixes

    Documentation

    • fix changelog header to consistent size (#562) (3f16107)
    • Update README image to absolute URL, fix PyPI rendering (#561) (76413b1)

    v3.1.1

    3.1.1 (2022-05-23)

    Documentation

    • Change button in README to .png file (#554) (e297747)

    v3.1.0

    3.1.0 (2022-05-08)

    Features

    • KMS configuration in settings (#489) (6699f8c)
    • Update Logging API with latest changes (6699f8c)

    Bug Fixes

    • deps: require google-api-core>=1.31.5, >=2.3.2 (#494) (ab14563)
    • fix system test for mtls (#485) (96bb6f7)
    • Reenable staleness bot (#535) (1595e42)
    • remove unnecessary detect_resource calls from CloudLoggingHandler (#484) (def7440)
    • resolve DuplicateCredentialArgs error when using credentials_file (265061e)

    Dependencies

    Documentation

    ... (truncated)

    Changelog

    Sourced from google-cloud-logging's changelog.

    3.1.2 (2022-06-03)

    Bug Fixes

    Documentation

    • fix changelog header to consistent size (#562) (3f16107)
    • Update README image to absolute URL, fix PyPI rendering (#561) (76413b1)

    3.1.1 (2022-05-23)

    Documentation

    • Change button in README to .png file (#554) (e297747)

    3.1.0 (2022-05-08)

    Features

    • KMS configuration in settings (#489) (6699f8c)
    • Update Logging API with latest changes (6699f8c)

    Bug Fixes

    • deps: require google-api-core>=1.31.5, >=2.3.2 (#494) (ab14563)
    • fix system test for mtls (#485) (96bb6f7)
    • Reenable staleness bot (#535) (1595e42)
    • remove unnecessary detect_resource calls from CloudLoggingHandler (#484) (def7440)
    • resolve DuplicateCredentialArgs error when using credentials_file (265061e)

    Dependencies

    Documentation

    3.0.0 (2022-01-27)

    ... (truncated)

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    dependencies python api 
    opened by dependabot[bot] 19
  • Packagist vulnerabilities are not being reported for some packages

    Packagist vulnerabilities are not being reported for some packages

    I've recently done an initial implementation for having osv-detector use the osv.dev api, but it looks like it's not 1:1 with the offline databases, at least for Packagist.

    Using this lockfile:
    {
        "_readme": [
            "This file locks the dependencies of your project to a known state",
            "Read more about it at https://getcomposer.org/doc/01-basic-usage.md#installing-dependencies",
            "This file is @generated automatically"
        ],
        "content-hash": "b63765525e5fabcf664728d548ecf8a2",
        "packages": [
            {
                "name": "enshrined/svg-sanitize",
                "version": "0.13.3",
                "source": {
                    "type": "git",
                    "url": "https://github.com/darylldoyle/svg-sanitizer.git",
                    "reference": "bc66593f255b7d2613d8f22041180036979b6403"
                },
                "dist": {
                    "type": "zip",
                    "url": "https://api.github.com/repos/darylldoyle/svg-sanitizer/zipball/bc66593f255b7d2613d8f22041180036979b6403",
                    "reference": "bc66593f255b7d2613d8f22041180036979b6403",
                    "shasum": ""
                },
                "require": {
                    "ext-dom": "*",
                    "ext-libxml": "*"
                },
                "require-dev": {
                    "codeclimate/php-test-reporter": "^0.1.2",
                    "phpunit/phpunit": "^6"
                },
                "type": "library",
                "autoload": {
                    "psr-4": {
                        "enshrined\\svgSanitize\\": "src"
                    }
                },
                "notification-url": "https://packagist.org/downloads/",
                "license": [
                    "GPL-2.0-or-later"
                ],
                "authors": [
                    {
                        "name": "Daryll Doyle",
                        "email": "[email protected]"
                    }
                ],
                "description": "An SVG sanitizer for PHP",
                "time": "2020-01-20T01:34:17+00:00"
            }
        ],
        "packages-dev": [],
        "aliases": [],
        "minimum-stability": "stable",
        "stability-flags": [],
        "prefer-stable": false,
        "prefer-lowest": false,
        "platform": [],
        "platform-dev": []
    }
    
    ❯ osv-detector-t --use-api --parse-as composer.lock /mnt/c/Users/Gareth/Downloads/safe-svg-composer.lock.txt
    /mnt/c/Users/Gareth/Downloads/safe-svg-composer.lock.txt: found 1 package
      no known vulnerabilities found
    
    ❯ osv-detector-t --use-dbs --parse-as composer.lock /mnt/c/Users/Gareth/Downloads/safe-svg-composer.lock.txt
    /mnt/c/Users/Gareth/Downloads/safe-svg-composer.lock.txt: found 1 package
      Loading OSV databases for the following ecosystems:
        Packagist (862 vulnerabilities, including withdrawn - last updated Fri, 13 May 2022 23:58:47 GMT)
    
      enshrined/[email protected] is affected by the following vulnerabilities:
        GHSA-fqx8-v33p-4qcc: Cross-site Scripting in enshrined/svg-sanitize (https://github.com/advisories/GHSA-fqx8-v33p-4qcc)
    
      1 known vulnerability found in /mnt/c/Users/Gareth/Downloads/safe-svg-composer.lock.txt
    

    The vulnerability here correctly lists says it affects versions below 0.15.0, but it's not reported even if I use the version:

    ❯ curl -X POST -d '{"commit": "bc66593f255b7d2613d8f22041180036979b6403"}' 'https://api.osv.dev/v1/query'
    {}
    ❯ curl -X POST -d '{"package": {"name": "enshrined/svg-sanitize"}, "version": "0.13.3"}' 'https://api.osv.dev/v1/query'
    {}
    ❯ curl -X POST -d '{"package": {"name": "enshrined/svg-sanitize", "ecosystem": "Packagist"}, "version": "0.13.3"}' 'https://api.osv.dev/v1/query'
    {}
    

    Going with the lowest version for this package doesn't return anything either, when it should return three vulnerabilities.

    (my current theory is that this because the advisory doesn't have any versions, and the api isn't checking against ranges?)

    opened by G-Rath 15
  • Bulk query API

    Bulk query API

    A bulk query API would allow developers to more easily query the API without hitting rate limits. It would also help with scenarios like #257, where an SBOM will contain many dependencies.

    opened by JamieMagee 12
  • Bump certifi from 2022.9.24 to 2022.12.7 in /docker/worker

    Bump certifi from 2022.9.24 to 2022.12.7 in /docker/worker

    Bumps certifi from 2022.9.24 to 2022.12.7.

    Commits

    Dependabot compatibility score

    Dependabot will resolve any conflicts with this PR as long as you don't alter it yourself. You can also trigger a rebase manually by commenting @dependabot rebase.


    Dependabot commands and options

    You can trigger Dependabot actions by commenting on this PR:

    • @dependabot rebase will rebase this PR
    • @dependabot recreate will recreate this PR, overwriting any edits that have been made to it
    • @dependabot merge will merge this PR after your CI passes on it
    • @dependabot squash and merge will squash and merge this PR after your CI passes on it
    • @dependabot cancel merge will cancel a previously requested merge and block automerging
    • @dependabot reopen will reopen this PR if it is closed
    • @dependabot close will close this PR and stop Dependabot recreating it. You can achieve the same result by closing it manually
    • @dependabot ignore this major version will close this PR and stop Dependabot creating any more for this major version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this minor version will close this PR and stop Dependabot creating any more for this minor version (unless you reopen the PR or upgrade to it yourself)
    • @dependabot ignore this dependency will close this PR and stop Dependabot creating any more for this dependency (unless you reopen the PR or upgrade to it yourself)
    • @dependabot use these labels will set the current labels as the default for future PRs for this repo and language
    • @dependabot use these reviewers will set the current reviewers as the default for future PRs for this repo and language
    • @dependabot use these assignees will set the current assignees as the default for future PRs for this repo and language
    • @dependabot use this milestone will set the current milestone as the default for future PRs for this repo and language

    You can disable automated security fix PRs for this repo from the Security Alerts page.

    dependencies python 
    opened by dependabot[bot] 10
  • JSON schema validation

    JSON schema validation

    Fixes #770 When loading a osv schema, be more strict on what is allowed by first checking the imported osv.json against the schema.

    • Do this validation when loading
    • Fix issue where EVIDENCE is not an entry in vulnerability.proto
    • Update worker and importer tests to actually test against valid osv entries
      • Add modified date to yaml test cases
        • YAML has weird importing where datetime is converted into datetime.datetime python object instead of str. Add code to account for that.
    • Add osv-schema as a submodule
    • Add symbolic link to osv validation schema
    • Manually copy over validation schema in docker container to avoid issues with symbolic links

    Before merging:

    A potentially large number of bucket entries might not be valid osv, we probably need to make a decision on how to deal with them.

    • Probably spin up the testing environment to see how many entries are actually rejected.
    • Determine behavior for what to do to handle invalid entries that's already in osv's database #771
    opened by another-rex 9
  • Configure Renovate

    Configure Renovate

    Mend Renovate

    Welcome to Renovate! This is an onboarding PR to help you understand and configure settings before regular Pull Requests begin.

    🚦 To activate Renovate, merge this Pull Request. To disable Renovate, simply close this Pull Request unmerged.


    Detected Package Files

    • cloudbuild.yaml (cloudbuild)
    • vulnfeeds/cloudbuild.yaml (cloudbuild)
    • vulnfeeds/pypi/cloudbuild.yaml (cloudbuild)
    • actions/analyze/Dockerfile (dockerfile)
    • docker/ci/Dockerfile (dockerfile)
    • docker/deployment/Dockerfile (dockerfile)
    • docker/exporter/Dockerfile (dockerfile)
    • docker/importer/Dockerfile (dockerfile)
    • docker/indexer/Dockerfile (dockerfile)
    • docker/worker/Dockerfile (dockerfile)
    • gcp/api/Dockerfile (dockerfile)
    • vulnfeeds/cmd/alpine/Dockerfile (dockerfile)
    • vulnfeeds/cmd/combine-to-osv/Dockerfile (dockerfile)
    • .github/workflows/codeql-analysis.yml (github-actions)
    • .github/workflows/lint.yaml (github-actions)
    • .github/workflows/publish-to-pypi.yaml (github-actions)
    • .github/workflows/scorecards.yml (github-actions)
    • docker/indexer/go.mod (gomod)
    • docs/go.mod (gomod)
    • tools/osv-scanner/go.mod (gomod)
    • vulnfeeds/go.mod (gomod)
    • gcp/appengine/frontend3/package.json (npm)
    • Pipfile (pipenv)
    • docker/worker/Pipfile (pipenv)
    • gcp/api/Pipfile (pipenv)
    • gcp/appengine/Pipfile (pipenv)
    • gcp/functions/pypi/Pipfile (pipenv)

    Configuration

    🔡 Renovate has detected a custom config for this PR. Feel free to ask for help if you have any doubts and would like it reviewed.

    Important: Now that this branch is edited, Renovate can't rebase it from the base branch any more. If you make changes to the base branch that could impact this onboarding PR, please merge them manually.

    What to Expect

    With your current configuration, Renovate will create 9 Pull Requests:

    Pin dependencies
    Update workflows to 2541b12
    • Schedule: ["at any time"]
    • Branch name: renovate/workflows
    • Merge into: master
    • Upgrade actions/checkout to 2541b1294d2704b0964813337f33b291d3f8596b
    • Upgrade ossf/scorecard-action to 8ee777f2fe17176c009fb17e48ad58391e6c83ff
    • Upgrade pypa/gh-action-pypi-publish to 5fb2f047e26679d7846a8370de1642ff160b9025
    Update appengine-backend
    • Schedule: ["at any time"]
    • Branch name: renovate/appengine-backend
    • Merge into: master
    • Upgrade google-cloud-secret-manager to ==1.0.2
    • Upgrade pipenv to ==2022.9.8
    Update functions
    • Schedule: ["at any time"]
    • Branch name: renovate/functions
    • Merge into: master
    • Upgrade cryptography to ==3.4.8
    • Upgrade google-cloud-secret-manager to ==2.12.4
    • Upgrade requests to ==2.28.1
    Update api
    • Schedule: ["at any time"]
    • Branch name: renovate/api
    • Merge into: master
    • Upgrade google-api-core to ==1.33.1
    • Upgrade google-cloud-logging to ==2.7.2
    • Upgrade google-cloud-pubsub to ==2.13.6
    • Upgrade grpcio to ==1.49.0
    • Upgrade grpcio-tools to ==1.49.0
    • Upgrade packageurl-python to ==0.10.3
    • Upgrade python to 3.10-slim
    • Upgrade requests to ==2.28.1
    Update docs
    Update indexer
    Update module go to 1.19
    • Schedule: ["at any time"]
    • Branch name: renovate/vulnfeeds
    • Merge into: master
    • Upgrade go to 1.19
    Update tools

    🚸 Branch creation will be limited to maximum 2 per hour, so it doesn't swamp any CI resources or spam the project. See docs for prhourlylimit for details.


    ❓ Got questions? Check out Renovate's Docs, particularly the Getting Started section. If you need any further assistance then you can also request help here.


    This PR has been generated by Mend Renovate. View repository job log here.

    opened by renovate-bot 9
  • Support for packageurl

    Support for packageurl

    Support to identify package with package url would be nice and it will be easy to integrate with other tool chain. https://github.com/package-url/purl-spec

    opened by sameer1046 8
  • Adding Betterscan CE to

    Adding Betterscan CE to "Third party tools and integrations" section

    Betterscan CE is a Code Scanning/SAST/Static Analysis/Linting using many tools/Scanners with One Report (Code, IaC). Supports major programming and Cloud stacks.

    Now with added OSV Scanner it will scan SBOM and dependencies vulnerabilities.

    Great work!

    More in the project repo and website.

    Feel free to contact me in case of any questions.

    Thanks,

    P.S Maybe you can sort the list alphabetically

    opened by marcinguy 7
  • Update workflows

    Update workflows

    Mend Renovate

    This PR contains the following updates:

    | Package | Type | Update | Change | |---|---|---|---| | actions/checkout | action | digest | a12a394 -> 1f9a0c2 | | actions/upload-artifact | action | digest | 3cea537 -> 83fd05a | | ossf/scorecard-action | action | digest | 08dd0ce -> 066a051 | | pypa/gh-action-pypi-publish | action | digest | 37f50c2 -> 5fb2f04 |


    Configuration

    📅 Schedule: Branch creation - "before 6am on monday" in timezone Australia/Sydney, Automerge - At any time (no schedule defined).

    🚦 Automerge: Disabled by config. Please merge this manually once you are satisfied.

    Rebasing: Renovate will not automatically rebase this PR, because other commits have been found.

    👻 Immortal: This PR will be recreated if closed unmerged. Get config help if that's undesired.


    • [ ] If you want to rebase/retry this PR, check this box

    This PR has been generated by Mend Renovate. View repository job log here.

    opened by renovate-bot 7
  • [PyPI] Data quality issue for `markdown2`

    [PyPI] Data quality issue for `markdown2`

    @alex reported this upstream to pip-audit:

    pip-audit -r <(echo 'markdown2==2.4.2') --no-deps
    

    Produces:

    Found 1 known vulnerability in 1 package
    Name      Version ID                  Fix Versions
    --------- ------- ------------------- ------------
    markdown2 2.4.2   GHSA-p6h9-gw49-rqm4
    

    But GHSA-p6h9-gw49-rqm4 isn't valid for 2.4.2 (it's only valid for <2.3.6): https://github.com/advisories/GHSA-p6h9-gw49-rqm4

    It looks like OSV has both GHSA-p6h9-gw49-rqm4 and its CVE alias, but with a missing "version fixed" for the GHSA version: https://osv.dev/list?ecosystem=&q=CVE-2018-5773

    cc @di as well for visibility.

    opened by woodruffw 7
  • Don't run the integration tests on every PR

    Don't run the integration tests on every PR

    The integration tests can randomly fail because they're operating on live data that can change unexpectedly. This results in tests failing on a PR through no fault of the code in the PR. We already run the integration tests on every commit, so it's just a matter of surfacing those failures to the people who can do something about them.

    opened by andrewpollock 2
  • Add public documentation for each data source

    Add public documentation for each data source

    The table of prefixes at https://ossf.github.io/osv-schema/ is the most canonical documentation we have for current sources of vulnerabilities that OSV uses.

    Expand this to include a point of contact or feedback channel in the event of receiving questionable data. One possibility is a page per source, and a link to that page from each row of this table.

    documentation enhancement datasource 
    opened by andrewpollock 0
  • Consider using the UDD instead of snapshot.debian.org for Debian next version determination

    Consider using the UDD instead of snapshot.debian.org for Debian next version determination

    We saw some brittleness with https://github.com/google/osv.dev/blob/69c1d3817f8759ff3e294d629383f5dc6fcc2dc0/osv/ecosystems.py#L559 today, which impacted tests, but the code under test is where the brittleness lay.

    Using a local replica of https://wiki.debian.org/UltimateDebianDatabase may be a more reliable solution if this continues to crop up.

    enhancement 
    opened by andrewpollock 0
  • CVE-2021-35940.json lists apr-1.6.3 and apr-1.6.5 as vulnerable, but they are not

    CVE-2021-35940.json lists apr-1.6.3 and apr-1.6.5 as vulnerable, but they are not

    The osv.dev advisory for CVE-2021-35940.json lists apr-1.6.3 and apr-1.6.5 as vulnerable, but they are not vulnerable because they were fixed by CVE-2017-12613.

    Explanation

    Based on information from this patch: https://dist.apache.org/repos/dist/release/apr/patches/apr-1.7.0-CVE-2021-35940.patch

    CVE-2021-35940 is actually the same issue as CVE-2017-12613. However, because this issue regressed in apr-1.7.0, a new CVE-ID was assigned.

    However, the above patch mentions that CVE-2017-12613 was fixed in apr-1.6.3 and later, which means that apr-1.6.3 and apr-1.6.5 are not vulnerable.

    I'm not sure what the solution to this is, but maybe it's adding a fixed attribute for 1.6.3 and an alias of CVE-2017-12613, depending on how the logic computes vulnerable versions.

    opened by ddkilzer 1
  • Create shorter redirect link format for vulnerabilities

    Create shorter redirect link format for vulnerabilities

    e.g. https://osv.dev/v/PYSEC-foo should redirect to the full https://osv.dev/vulnerability/PYSEC-foo.

    This can help with osv-scanner's human readable output, where horizontal space is a premium.

    enhancement infra 
    opened by oliverchang 3
Releases(v0.0.14)
Owner
Google
Google ❤️ Open Source
Google
Find existing email addresses by nickname using API/SMTP checking methods without user notification. Please, don't hesitate to improve cat's job! 🐱🔎 📬

mailcat The only cat who can find existing email addresses by nickname. Usage First install requirements: pip3 install -r requirements.txt Then just

282 Dec 30, 2022
Generates password lists/dictionaries based on keywords written in python3.

dicbyru Introduction Generates password lists/dictionaries based on keywords. It uses the keywords and adds capital letters, numbers and special chara

ru55o 2 Oct 31, 2022
GitLab CE/EE Preauth RCE using ExifTool

CVE-2021-22205 GitLab CE/EE Preauth RCE using ExifTool This project is for learning only, if someone's rights have been violated, please contact me to

3ND 164 Dec 10, 2022
A small utility to deal with malware embedded hashes.

Uchihash is a small utility that can save malware analysts the time of dealing with embedded hash values used for various things such as: Dyn

Abdallah Elshinbary 48 Dec 19, 2022
Tool To generate Stable Undetected Payload

windowsPayload Tool To generate Stable Undetected Payload Don t Upload to Virus Total :) Follow on Social Media Platforms ScreenShots How to install +

youhacker55 117 Dec 30, 2022
TOOLS CRACK FACEBOOK

Installation $ pkg update && pkg upgrade $ pkg install python2 $ pkg install git $ git clone https://github.com/Mark-Zuck/zafi $ cd zafi $ pip2 instal

Romi Afrizal 50 Dec 26, 2022
Small Python library that adds password hashing methods to ORM objects

Password Mixin Mixin that adds some useful methods to ORM objects Compatible with Python 3.5 = 3.9 Install pip install password-mixin Setup first cre

Joe Gasewicz 5 Nov 22, 2022
Lite version of my Gatekeeper backdoor for public use.

MayorSec Backdoor Fully functioning bind-type backdoor This backdoor is a fully functioning bind shell and lite version of my full functioning Gatekee

Joe Helle 56 Mar 25, 2022
Apache OFBiz rmi反序列化EXP(CVE-2021-26295)

Apache OFBiz rmi反序列化EXP(CVE-2021-26295) 目前仅支持nc弹shell 将ysoserial.jar放置在同目录下,py3运行,根据提示输入漏洞url,你的vps地址和端口 第二次使用建议删除exp.ot 本工具仅用于安全测试,禁止未授权非法攻击站点,否则后果自负

15 Nov 09, 2022
An experimental script to perform bulk parsing of arbitrary file features with YARA and console logging.

RonnieColemanYARAParser This script is named after Ronnie Coleman, and peforms bulk lifts on arbitary file features using YARA console logging. Requir

Steve 20 Dec 13, 2022
List of S3 Hacks

s3-leaks List of AWS S3 Leaks Feel free to send in a PR if you know of other leaks Date Description Notes Aug2020 S3 bucket mess up exposed 182GB of s

Nag 291 Dec 28, 2022
Raphael is a vulnerability scanning tool based on Python3.

Raphael Raphael是一款基于Python3开发的插件式漏洞扫描工具。 Raphael is a vulnerability scanning too

b4zinga 5 Mar 21, 2022
Ini membuat tema berbasis bendera Indonesia with Python + Linux.py

tema Ubah Tema Termux Menjadi Linux Ubah Font Termux Jadi Linux dibuat oleh wahyudioputra INSTALL pkg update && pkg upgrade pkg install python pkg ins

wahyudioputra 2 Nov 30, 2021
Facebook account cloning/hacking advanced tool + dictionary attack added | Facebook automation tool

loggef Facebook automation tool, Facebook account hacking and cloning advanced tool + dictionary attack added Warning Use this tool for educational pu

Md Josif Khan 149 Aug 10, 2022
Evil-stalker - A simple tool written in python, it is so simple that it is based on google dorks

evil-stalker How to run First of all, you must install the necessary libraries.

rock3d 6 Nov 16, 2022
Some Attacks of Exchange SSRF ProxyLogon&ProxyShell

Some Attacks of Exchange SSRF This project is heavily replicated in ProxyShell, NtlmRelayToEWS https://mp.weixin.qq.com/s/GFcEKA48bPWsezNdVcrWag Get 1

Jumbo 129 Dec 30, 2022
A honeypot for the Log4Shell vulnerability (CVE-2021-44228)

Log4Pot A honeypot for the Log4Shell vulnerability (CVE-2021-44228). License: GPLv3.0 Features Listen on various ports for Log4Shell exploitation. Det

Thomas Patzke 79 Dec 27, 2022
Having a weak password is not good for a system that demands high confidentiality and security of user credentials

Having a weak password is not good for a system that demands high confidentiality and security of user credentials. It turns out that people find it difficult to make up a strong password that is str

PyLaboratory 0 Feb 07, 2022
Cve-2021-22005-exp

cve-2021-22005-exp 0x01 漏洞简介 2021年9月21日,VMware发布安全公告,公开披露了vCenter Server中的19个安全漏洞,这些漏洞的CVSSv3评分范围为4.3-9.8。 其中,最为严重的漏洞为vCenter Server 中的任意文件上传漏洞(CVE-20

Jing Ling 146 Dec 31, 2022
AIL LeakFeeder: A Module for AIL Framework that automate the process to feed leaked files automatically to AIL

AIL LeakFeeder: A Module for AIL Framework that automates the process to feed leaked files automatically to AIL, So basically this feeder will help you ingest AIL with your leaked files automatically

ail project 8 May 03, 2022