1月 8

Exploit DatabaseがGithubにホストされたようです。

edb-github-blog
Exploit掲載サイトのExploit Database(EDB)はSVN,CVSを廃止してGithubにホストされるようになったようです。また、これに伴ってリポジトリの更新間隔を毎週から毎日に変更とのこと。
便利ですね。

以下はgitで取得してきたときのログです。

root@kali:/opt# git clone https://github.com/offensive-security/exploit-database
Cloning into ‘exploit-database’…
remote: Counting objects: 28645, done.
remote: Compressing objects: 100% (26550/26550), done.
remote: Total 28645 (delta 2051), reused 28624 (delta 2030)
Receiving objects: 100% (28645/28645), 32.73 MiB | 561 KiB/s, done.
Resolving deltas: 100% (2051/2051), done.
Checking out files: 100% (27619/27619), done.
root@kali:/opt# ls exploit-database/
README.md files.csv platforms
root@kali:/opt# ls exploit-database/platforms/
aix bsd_ppc freebsd_x86 irix linux multiple osx sco tru64 win64
arm bsd_x86 freebsd_x86-64 java linux_mips netbsd_x86 osx_ppc sco_x86 ultrix windows
asp bsdi_x86 generator jsp linux_ppc netware palm_os sh4 unix
atheos cfm hardware lin_amd64 linux_sparc novell php solaris unixware
beos cgi hp-ux lin_x86 minix openbsd plan9 solaris_sparc webapps
bsd freebsd immunix lin_x86-64 mips openbsd_x86 qnx solaris_x86 win32

root@kali:/opt# head exploit-database/files.csv
id,file,description,date,author,platform,type,port
1,platforms/windows/remote/1.c,”MS Windows WebDAV (ntdll.dll) Remote Exploit”,2003-03-23,kralor,windows,remote,80
2,platforms/windows/remote/2.c,”MS Windows WebDAV Remote PoC Exploit”,2003-03-24,RoMaNSoFt,windows,remote,80
3,platforms/linux/local/3.c,”Linux Kernel 2.2.x – 2.4.x ptrace/kmod Local Root Exploit”,2003-03-30,”Wojciech Purczynski”,linux,local,0
4,platforms/solaris/local/4.c,”Sun SUNWlldap Library Hostname Buffer Overflow Exploit”,2003-04-01,Andi,solaris,local,0
5,platforms/windows/remote/5.c,”MS Windows RPC Locator Service Remote Exploit”,2003-04-03,”Marcin Wolak”,windows,remote,139
6,platforms/php/webapps/6.php,”WordPress <= 2.0.2 (cache) Remote Shell Injection Exploit",2006-05-25,rgod,php,webapps,0 7,platforms/linux/remote/7.pl,"Samba 2.2.x Remote Root Buffer Overflow Exploit",2003-04-07,"H D Moore",linux,remote,139 8,platforms/linux/remote/8.c,"SETI@home Clients Buffer Overflow Exploit",2003-04-08,zillion,linux,remote,0 9,platforms/windows/dos/9.c,"Apache HTTP Server 2.x Memory Leak Exploit",2003-04-09,"Matthew Murphy",windows,dos,0


Copyright 2021. All rights reserved.

Posted 2014年1月8日 by ntsuji in category "exploit