├── ADSelfService_Plus_RCE_CVE_2021_40539.json ├── Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json ├── Apache_Airflow_Unauthorized.json ├── Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json ├── Apache_Druid_Log4shell_CVE_2021_44228.json ├── Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json ├── Apache_HTTP_Server_SSRF_CVE_2021_40438.json ├── Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json ├── Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json ├── Apache_OFBiz_Log4shell_CVE_2021_44228.json ├── Apache_SkyWalking_Log4shell_CVE_2021_44228.json ├── Aspcms_Backend_Leak.json ├── Cacti_Weathermap_File_Write.json ├── Citrix_Unauthorized_CVE_2020_8193.json ├── ClickHouse_SQLI.json ├── Coldfusion_LFI_CVE_2010_2861.json ├── Confluence_RCE_CVE_2021_26084.json ├── Consul_Rexec_RCE.json ├── Couch_CMS_Infoleak_CVE_2018_7662.json ├── Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json ├── Couchdb_Unauth.json ├── CraftCMS_Seomatic_RCE_CVE_2020_9597.json ├── Datang_AC_Default_Password.json ├── DedeCMS_Carbuyaction_FileInclude.json ├── DedeCMS_InfoLeak_CVE_2018_6910.json ├── Discuz_ML_3.x_RCE__CNVD_2019_22239.json ├── Discuz_RCE_WOOYUN_2010_080723.json ├── Discuz_Wechat_Plugins_Unauth.json ├── Discuz_v72_SQLI.json ├── Dlink_850L_Info_Leak.json ├── Dlink_Info_Leak_CVE_2019_17506.json ├── Dlink_RCE_CVE_2019_16920.json ├── Docker_Registry_API_Unauth.json ├── Dubbo_Admin_Default_Password.json ├── Fastmeeting_Arbitrary_File_Read.json ├── FineReport_v9_Arbitrary_File_Overwrite.json ├── Gitlab_RCE_CVE_2021_22205.json ├── Grafana_Plugins_Arbitrary_File_Read.json ├── Hikvision_RCE_CVE_2021_36260.json ├── Jellyfin_SSRF_CVE_2021_29490.json ├── Konga_Default_JWT_KEY.json ├── Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json ├── MobileIron_Log4shell_CVE_2021_44228.json ├── Node_RED_ui_base_Arbitrary_File_Read.json ├── README.md ├── Security_Devices_Hardcoded_Password.json ├── SonarQube_unauth_CVE_2020_27986.json ├── Struts2_Log4Shell_CVE_2021_44228_1.json ├── Struts2_Log4Shell_CVE_2021_44228_2.json ├── Struts2_Log4Shell_CVE_2021_44228_3.json ├── UniFi_Network_Log4shell_CVE_2021_44228.json ├── VENGD_Arbitrary_File_Upload.json ├── VMWare_Horizon_Log4shell_CVE_2021_44228.json ├── VMware_NSX_Log4shell_CVE_2021_44228.json ├── VMware_vCenter_Log4shell_CVE_2021_44228_1.json ├── VMware_vCenter_v7.0.2_Arbitrary_File_Read.json ├── Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json ├── YAPI_RCE.json └── alibaba_canal_default_password.json /ADSelfService_Plus_RCE_CVE_2021_40539.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/ADSelfService_Plus_RCE_CVE_2021_40539.json -------------------------------------------------------------------------------- /Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_APISIX_Dashboard_RCE_CVE_2021_45232.json -------------------------------------------------------------------------------- /Apache_Airflow_Unauthorized.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_Airflow_Unauthorized.json -------------------------------------------------------------------------------- /Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_Druid_Abritrary_File_Read_CVE_2021_36749.json -------------------------------------------------------------------------------- /Apache_Druid_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_Druid_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_HTTP_Server_Arbitrary_File_Read_CVE_2021_41773.json -------------------------------------------------------------------------------- /Apache_HTTP_Server_SSRF_CVE_2021_40438.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_HTTP_Server_SSRF_CVE_2021_40438.json -------------------------------------------------------------------------------- /Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_JSPWiki_Log4shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_JSPWiki_Log4shell_CVE_2021_44228_2.json -------------------------------------------------------------------------------- /Apache_OFBiz_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_OFBiz_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /Apache_SkyWalking_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Apache_SkyWalking_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /Aspcms_Backend_Leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Aspcms_Backend_Leak.json -------------------------------------------------------------------------------- /Cacti_Weathermap_File_Write.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Cacti_Weathermap_File_Write.json -------------------------------------------------------------------------------- /Citrix_Unauthorized_CVE_2020_8193.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Citrix_Unauthorized_CVE_2020_8193.json -------------------------------------------------------------------------------- /ClickHouse_SQLI.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/ClickHouse_SQLI.json -------------------------------------------------------------------------------- /Coldfusion_LFI_CVE_2010_2861.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Coldfusion_LFI_CVE_2010_2861.json -------------------------------------------------------------------------------- /Confluence_RCE_CVE_2021_26084.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Confluence_RCE_CVE_2021_26084.json -------------------------------------------------------------------------------- /Consul_Rexec_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Consul_Rexec_RCE.json -------------------------------------------------------------------------------- /Couch_CMS_Infoleak_CVE_2018_7662.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Couch_CMS_Infoleak_CVE_2018_7662.json -------------------------------------------------------------------------------- /Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Couchdb_Add_User_Not_Authorized_CVE_2017_12635.json -------------------------------------------------------------------------------- /Couchdb_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Couchdb_Unauth.json -------------------------------------------------------------------------------- /CraftCMS_Seomatic_RCE_CVE_2020_9597.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/CraftCMS_Seomatic_RCE_CVE_2020_9597.json -------------------------------------------------------------------------------- /Datang_AC_Default_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Datang_AC_Default_Password.json -------------------------------------------------------------------------------- /DedeCMS_Carbuyaction_FileInclude.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/DedeCMS_Carbuyaction_FileInclude.json -------------------------------------------------------------------------------- /DedeCMS_InfoLeak_CVE_2018_6910.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/DedeCMS_InfoLeak_CVE_2018_6910.json -------------------------------------------------------------------------------- /Discuz_ML_3.x_RCE__CNVD_2019_22239.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Discuz_ML_3.x_RCE__CNVD_2019_22239.json -------------------------------------------------------------------------------- /Discuz_RCE_WOOYUN_2010_080723.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Discuz_RCE_WOOYUN_2010_080723.json -------------------------------------------------------------------------------- /Discuz_Wechat_Plugins_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Discuz_Wechat_Plugins_Unauth.json -------------------------------------------------------------------------------- /Discuz_v72_SQLI.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Discuz_v72_SQLI.json -------------------------------------------------------------------------------- /Dlink_850L_Info_Leak.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Dlink_850L_Info_Leak.json -------------------------------------------------------------------------------- /Dlink_Info_Leak_CVE_2019_17506.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Dlink_Info_Leak_CVE_2019_17506.json -------------------------------------------------------------------------------- /Dlink_RCE_CVE_2019_16920.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Dlink_RCE_CVE_2019_16920.json -------------------------------------------------------------------------------- /Docker_Registry_API_Unauth.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Docker_Registry_API_Unauth.json -------------------------------------------------------------------------------- /Dubbo_Admin_Default_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Dubbo_Admin_Default_Password.json -------------------------------------------------------------------------------- /Fastmeeting_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Fastmeeting_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /FineReport_v9_Arbitrary_File_Overwrite.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/FineReport_v9_Arbitrary_File_Overwrite.json -------------------------------------------------------------------------------- /Gitlab_RCE_CVE_2021_22205.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Gitlab_RCE_CVE_2021_22205.json -------------------------------------------------------------------------------- /Grafana_Plugins_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Grafana_Plugins_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /Hikvision_RCE_CVE_2021_36260.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Hikvision_RCE_CVE_2021_36260.json -------------------------------------------------------------------------------- /Jellyfin_SSRF_CVE_2021_29490.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Jellyfin_SSRF_CVE_2021_29490.json -------------------------------------------------------------------------------- /Konga_Default_JWT_KEY.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Konga_Default_JWT_KEY.json -------------------------------------------------------------------------------- /Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Metabase_Geojson_Arbitrary_File_Read_CVE_2021_41277.json -------------------------------------------------------------------------------- /MobileIron_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/MobileIron_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /Node_RED_ui_base_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Node_RED_ui_base_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/README.md -------------------------------------------------------------------------------- /Security_Devices_Hardcoded_Password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Security_Devices_Hardcoded_Password.json -------------------------------------------------------------------------------- /SonarQube_unauth_CVE_2020_27986.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/SonarQube_unauth_CVE_2020_27986.json -------------------------------------------------------------------------------- /Struts2_Log4Shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Struts2_Log4Shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /Struts2_Log4Shell_CVE_2021_44228_2.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Struts2_Log4Shell_CVE_2021_44228_2.json -------------------------------------------------------------------------------- /Struts2_Log4Shell_CVE_2021_44228_3.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Struts2_Log4Shell_CVE_2021_44228_3.json -------------------------------------------------------------------------------- /UniFi_Network_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/UniFi_Network_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /VENGD_Arbitrary_File_Upload.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/VENGD_Arbitrary_File_Upload.json -------------------------------------------------------------------------------- /VMWare_Horizon_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/VMWare_Horizon_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /VMware_NSX_Log4shell_CVE_2021_44228.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/VMware_NSX_Log4shell_CVE_2021_44228.json -------------------------------------------------------------------------------- /VMware_vCenter_Log4shell_CVE_2021_44228_1.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/VMware_vCenter_Log4shell_CVE_2021_44228_1.json -------------------------------------------------------------------------------- /VMware_vCenter_v7.0.2_Arbitrary_File_Read.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/VMware_vCenter_v7.0.2_Arbitrary_File_Read.json -------------------------------------------------------------------------------- /Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/Weaver_EOffice_Arbitrary_File_Upload_CNVD_2021_49104.json -------------------------------------------------------------------------------- /YAPI_RCE.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/YAPI_RCE.json -------------------------------------------------------------------------------- /alibaba_canal_default_password.json: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/aetkrad/goby_poc/HEAD/alibaba_canal_default_password.json --------------------------------------------------------------------------------