| gquere/pwn_jenkins |
1,693 |
|
0 |
0 |
over 2 years ago |
0 |
|
0 |
|
Python |
| Notes about attacking Jenkins servers |
| orangetw/awesome-jenkins-rce-2019 |
430 |
|
0 |
0 |
almost 7 years ago |
0 |
|
3 |
|
Python |
| There is no pre-auth RCE in Jenkins since May 2017, but this is the one! |
| adamyordan/cve-2019-1003000-jenkins-rce-poc |
254 |
|
0 |
0 |
about 7 years ago |
1 |
November 26, 2022 |
3 |
mit |
JavaScript |
| Jenkins RCE Proof-of-Concept: SECURITY-1266 / CVE-2019-1003000 (Script Security), CVE-2019-1003001 (Pipeline: Groovy), CVE-2019-1003002 (Pipeline: Declarative) |
| jiangsir404/POC-S |
104 |
|
0 |
0 |
about 6 years ago |
6 |
March 01, 2020 |
1 |
|
Python |
| POC-T强化版本 POC-S , 用于红蓝对抗中快速验证Web应用漏洞, 对功能进行强化以及脚本进行分类添加,自带dnslog等, 平台补充来自vulhub靶机及其他开源项目的高可用POC |
| jpiechowka/jenkins-cve-2016-0792 |
42 |
|
0 |
0 |
over 8 years ago |
0 |
|
1 |
mit |
Python |
| Exploit for Jenkins serialization vulnerability - CVE-2016-0792 |
| triologygmbh/dependency-check |
17 |
|
0 |
0 |
over 8 years ago |
0 |
|
0 |
mit |
Java |
| An example on how to use the OWASP Dependency-Check maven plugin (including Jenkins) |
| vesche/CVE-2019-10475 |
14 |
|
0 |
0 |
about 4 years ago |
0 |
|
0 |
unlicense |
Python |
| EdoardoVignati/java-deserialization-of-untrusted-data-poc |
5 |
|
0 |
0 |
almost 5 years ago |
0 |
|
0 |
other |
FreeMarker |
| Some PoC (Proof-of-Concept) about vulnerability of java deserialization of untrusted data |