From 6f03bfb25e645baa4fdcfa925d429ba23618a6c9 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Sun, 10 Nov 2024 01:07:00 +0000 Subject: [PATCH] Auto update md PoCs lists [Sun Nov 10 01:07:00 UTC 2024] :robot: --- README.md | 34 +++++++++++++++++----------------- Top_Codeql.md | 34 +++++++++++++++++++++++++++++++++- 2 files changed, 50 insertions(+), 18 deletions(-) diff --git a/README.md b/README.md index c1290e6..77fdc22 100644 --- a/README.md +++ b/README.md @@ -22,15 +22,15 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |2276|2024-11-08T11:07:59Z|CVE-2024-1086|https://github.com/Notselwyn/CVE-2024-1086|Universal local privilege escalation Proof-of-Concept exploit for CVE-2024-1086, working on most Linux kernels between v5.14 and v6.6, including Debian, Ubuntu, and KernelCTF. The success rate is 99.4% in KernelCTF images.| |461|2024-10-28T13:01:04Z|cve-2024-6387-poc|https://github.com/zgzhang/cve-2024-6387-poc|a signal handler race condition in OpenSSH's server (sshd)| |616|2024-11-06T20:21:23Z|CVE-2024-38063|https://github.com/ynwarcs/CVE-2024-38063|poc for CVE-2024-38063 (RCE in tcpip.sys)| -|510|2024-11-02T22:40:27Z|git_rce|https://github.com/amalmurali47/git_rce|Exploit PoC for CVE-2024-32002| -|457|2024-11-06T06:22:46Z|CVE-2024-6387_Check|https://github.com/xaitax/CVE-2024-6387_Check|CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH| -|381|2024-11-02T06:09:23Z|cve-2024-6387-poc|https://github.com/acrono/cve-2024-6387-poc|32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc| -|206|2024-10-29T09:49:58Z|CVE-2024-38077|https://github.com/qi4L/CVE-2024-38077|RDL的堆溢出导致的RCE| +|511|2024-11-09T07:20:32Z|git_rce|https://github.com/amalmurali47/git_rce|Exploit PoC for CVE-2024-32002| +|458|2024-11-09T11:43:56Z|CVE-2024-6387_Check|https://github.com/xaitax/CVE-2024-6387_Check|CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH| +|382|2024-11-09T11:40:14Z|cve-2024-6387-poc|https://github.com/acrono/cve-2024-6387-poc|32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo/cve-2024-6387-poc| +|205|2024-11-09T11:39:15Z|CVE-2024-38077|https://github.com/qi4L/CVE-2024-38077|RDL的堆溢出导致的RCE| |317|2024-11-06T10:35:22Z|CVE-2024-26229|https://github.com/varwara/CVE-2024-26229|CWE-781: Improper Address Validation in IOCTL with METHOD_NEITHER I/O Control Code| |282|2024-11-03T17:42:55Z|CVE-2024-21338|https://github.com/hakaioffsec/CVE-2024-21338|Local Privilege Escalation from Admin to Kernel vulnerability on Windows 10 and Windows 11 operating systems with HVCI enabled.| |193|2024-10-28T18:16:25Z|CVE-2024-23897|https://github.com/h4x0r-dz/CVE-2024-23897|CVE-2024-23897| |253|2024-11-07T12:10:07Z|cve_2024_0044|https://github.com/pl4int3xt/cve_2024_0044|CVE-2024-0044: a "run-as any app" high-severity vulnerability affecting Android versions 12 and 13| -|3493|2024-11-08T14:08:34Z|xzbot|https://github.com/amlweems/xzbot|notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)| +|3494|2024-11-09T07:14:27Z|xzbot|https://github.com/amlweems/xzbot|notes, honeypot, and exploit demo for the xz backdoor (CVE-2024-3094)| |227|2024-11-08T15:42:35Z|CVE-2024-30088|https://github.com/tykawaii98/CVE-2024-30088|| |686|2024-11-08T18:37:32Z|CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability|https://github.com/xaitax/CVE-2024-21413-Microsoft-Outlook-Remote-Code-Execution-Vulnerability|Microsoft-Outlook-Remote-Code-Execution-Vulnerability| |226|2024-11-08T12:21:45Z|CVE-2024-4577|https://github.com/watchtowrlabs/CVE-2024-4577|PHP CGI Argument Injection (CVE-2024-4577) Remote Code Execution PoC| @@ -41,7 +41,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |5|2024-09-23T07:14:32Z|CVE-2024-38077-POC|https://github.com/SecStarBot/CVE-2024-38077-POC|| |133|2024-11-08T07:26:32Z|CVE-2024-4367-PoC|https://github.com/LOURC0D3/CVE-2024-4367-PoC|CVE-2024-4367 & CVE-2024-34342 Proof of Concept| |117|2024-11-07T23:11:59Z|CVE-2024-7479_CVE-2024-7481|https://github.com/PeterGabaldon/CVE-2024-7479_CVE-2024-7481|TeamViewer User to Kernel Elevation of Privilege PoC. CVE-2024-7479 and CVE-2024-7481. ZDI-24-1289 and ZDI-24-1290. TV-2024-1006.| -|146|2024-10-31T10:19:49Z|CVE-2024-25600|https://github.com/Chocapikk/CVE-2024-25600|Unauthenticated Remote Code Execution – Bricks <= 1.9.6| +|147|2024-11-09T10:18:33Z|CVE-2024-25600|https://github.com/Chocapikk/CVE-2024-25600|Unauthenticated Remote Code Execution – Bricks <= 1.9.6| |154|2024-11-06T01:28:23Z|CVE-2024-21413|https://github.com/duy-31/CVE-2024-21413|Microsoft Outlook Information Disclosure Vulnerability (leak password hash) - Expect Script POC| |133|2024-11-07T05:59:54Z|cve-2024-20017|https://github.com/mellow-hype/cve-2024-20017|exploits for CVE-2024-20017| |110|2024-11-08T17:03:45Z|cve-2024-6387-poc|https://github.com/lflare/cve-2024-6387-poc|MIRROR of the original 32-bit PoC for CVE-2024-6387 "regreSSHion" by 7etsuo/cve-2024-6387-poc| @@ -53,7 +53,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |star|updated_at|name|url|des| |---|---|---|---|---| |417|2024-11-05T02:55:02Z|qq-tim-elevation|https://github.com/vi3t1/qq-tim-elevation|CVE-2023-34312| -|1347|2024-11-09T01:00:45Z|cvelist|https://github.com/CVEProject/cvelist|Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023| +|1347|2024-11-09T23:00:44Z|cvelist|https://github.com/CVEProject/cvelist|Pilot program for CVE submission through GitHub. CVE Record Submission via Pilot PRs ending 6/30/2023| |778|2024-11-06T13:38:02Z|CVE-2023-38831-winrar-exploit|https://github.com/b1tg/CVE-2023-38831-winrar-exploit|CVE-2023-38831 winrar exploit generator| |479|2024-11-08T21:25:15Z|Windows_LPE_AFD_CVE-2023-21768|https://github.com/chompie1337/Windows_LPE_AFD_CVE-2023-21768|LPE exploit for CVE-2023-21768| |369|2024-10-27T03:06:47Z|CVE-2023-32233|https://github.com/Liuk3r/CVE-2023-32233|CVE-2023-32233: Linux内核中的安全漏洞| @@ -119,12 +119,12 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |star|updated_at|name|url|des| |---|---|---|---|---| |1339|2024-11-08T07:33:38Z|noPac|https://github.com/cube0x0/noPac|CVE-2021-42287/CVE-2021-42278 Scanner & Exploiter.| -|1837|2024-11-07T21:15:30Z|CVE-2021-1675|https://github.com/cube0x0/CVE-2021-1675|C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527| +|1838|2024-11-09T22:43:59Z|CVE-2021-1675|https://github.com/cube0x0/CVE-2021-1675|C# and Impacket implementation of PrintNightmare CVE-2021-1675/CVE-2021-34527| |1962|2024-11-01T11:32:00Z|CVE-2021-4034|https://github.com/berdav/CVE-2021-4034|CVE-2021-4034 1day| |1593|2024-11-06T08:13:28Z|CVE-2021-40444|https://github.com/lockedbyte/CVE-2021-40444|CVE-2021-40444 PoC| |1056|2024-10-30T17:51:59Z|CVE-2021-4034|https://github.com/arthepsy/CVE-2021-4034|PoC for PwnKit: Local Privilege Escalation Vulnerability in polkit’s pkexec (CVE-2021-4034)| |954|2024-11-01T09:34:03Z|CVE-2021-3156|https://github.com/blasty/CVE-2021-3156|| -|1011|2024-11-07T23:10:13Z|CVE-2021-1675|https://github.com/calebstewart/CVE-2021-1675|Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)| +|1013|2024-11-09T22:43:25Z|CVE-2021-1675|https://github.com/calebstewart/CVE-2021-1675|Pure PowerShell implementation of CVE-2021-1675 Print Spooler Local Privilege Escalation (PrintNightmare)| |484|2024-10-25T02:13:38Z|CVE-2021-21972|https://github.com/NS-Sp4ce/CVE-2021-21972|CVE-2021-21972 Exploit| |981|2024-10-21T20:24:07Z|sam-the-admin|https://github.com/safebuffer/sam-the-admin|Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user | |799|2024-11-06T08:13:58Z|CVE-2021-40444|https://github.com/klezVirus/CVE-2021-40444|CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit| @@ -133,7 +133,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |821|2024-11-06T11:55:26Z|CVE-2021-31166|https://github.com/0vercl0k/CVE-2021-31166|Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.| |851|2024-11-06T12:32:28Z|CVE-2021-44228-Scanner|https://github.com/logpresso/CVE-2021-44228-Scanner|Vulnerability scanner and mitigation patch for Log4j2 CVE-2021-44228| |1805|2024-11-08T21:55:09Z|log4j-shell-poc|https://github.com/kozmer/log4j-shell-poc|A Proof-Of-Concept for the CVE-2021-44228 vulnerability. | -|799|2024-11-08T09:04:35Z|noPac|https://github.com/Ridter/noPac|Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user | +|800|2024-11-09T10:36:47Z|noPac|https://github.com/Ridter/noPac|Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user | |407|2024-10-31T11:34:39Z|CVE-2021-3493|https://github.com/briskets/CVE-2021-3493|Ubuntu OverlayFS Local Privesc| |330|2024-09-19T12:06:30Z|CVE-2021-1675-LPE|https://github.com/hlldz/CVE-2021-1675-LPE|Local Privilege Escalation Edition for CVE-2021-1675/CVE-2021-34527| |1106|2024-10-11T18:48:29Z|log4shell-vulnerable-app|https://github.com/christophetd/log4shell-vulnerable-app|Spring Boot web application vulnerable to Log4Shell (CVE-2021-44228).| @@ -151,7 +151,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things ## 2020 |star|updated_at|name|url|des| |---|---|---|---|---| -|4120|2024-11-07T21:20:33Z|exphub|https://github.com/zhzyker/exphub|Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340| +|4121|2024-11-09T13:16:49Z|exphub|https://github.com/zhzyker/exphub|Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340| |1726|2024-11-06T20:46:51Z|CVE-2020-1472|https://github.com/SecuraBV/CVE-2020-1472|Test tool for CVE-2020-1472| |2008|2024-11-06T09:55:44Z|weblogicScanner|https://github.com/0xn0ne/weblogicScanner|weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883| |1303|2024-11-07T17:59:37Z|CVE-2020-0796|https://github.com/danigargu/CVE-2020-0796|CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost| @@ -161,8 +161,8 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |630|2024-11-01T14:52:47Z|zerologon|https://github.com/risksense/zerologon|Exploit for zerologon cve-2020-1472| |665|2024-11-07T17:59:52Z|SMBGhost|https://github.com/ly4k/SMBGhost|Scanner for CVE-2020-0796 - SMBv3 RCE| |372|2024-08-12T20:03:24Z|CVE-2020-5902|https://github.com/jas502n/CVE-2020-5902|CVE-2020-5902 BIG-IP| -|339|2024-11-08T23:48:37Z|CVEAC-2020|https://github.com/thesecretclub/CVEAC-2020|EasyAntiCheat Integrity check bypass by mimicking memory changes| -|537|2024-11-08T22:23:11Z|CVE-2020-0796-RCE-POC|https://github.com/jamf/CVE-2020-0796-RCE-POC|CVE-2020-0796 Remote Code Execution POC| +|538|2024-11-09T12:28:11Z|CVE-2020-0796-RCE-POC|https://github.com/jamf/CVE-2020-0796-RCE-POC|CVE-2020-0796 Remote Code Execution POC| +|338|2024-11-09T01:08:37Z|CVEAC-2020|https://github.com/thesecretclub/CVEAC-2020|EasyAntiCheat Integrity check bypass by mimicking memory changes| |131|2024-08-12T19:58:18Z|CVE_2020_2546|https://github.com/hktalent/CVE_2020_2546|CVE-2020-2546,CVE-2020-2915 CVE-2020-2801 CVE-2020-2798 CVE-2020-2883 CVE-2020-2884 CVE-2020-2950 WebLogic T3 payload exploit poc python3,| |886|2024-09-13T00:18:47Z|CurveBall|https://github.com/ly4k/CurveBall|PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)| |293|2024-10-14T16:36:43Z|CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner|https://github.com/bkfish/CNVD-2020-10487-Tomcat-Ajp-lfi-Scanner|Cnvd-2020-10487 / cve-2020-1938, scanner tool| @@ -185,7 +185,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |star|updated_at|name|url|des| |---|---|---|---|---| |2008|2024-11-06T09:55:44Z|weblogicScanner|https://github.com/0xn0ne/weblogicScanner|weblogic 漏洞扫描工具。目前包含对以下漏洞的检测能力:CVE-2014-4210、CVE-2016-0638、CVE-2016-3510、CVE-2017-3248、CVE-2017-3506、CVE-2017-10271、CVE-2018-2628、CVE-2018-2893、CVE-2018-2894、CVE-2018-3191、CVE-2018-3245、CVE-2018-3252、CVE-2019-2618、CVE-2019-2725、CVE-2019-2729、CVE-2019-2890、CVE-2020-2551、CVE-2020-14750、CVE-2020-14882、CVE-2020-14883| -|4120|2024-11-07T21:20:33Z|exphub|https://github.com/zhzyker/exphub|Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340| +|4121|2024-11-09T13:16:49Z|exphub|https://github.com/zhzyker/exphub|Exphub[漏洞利用脚本库] 包括Webloigc、Struts2、Tomcat、Nexus、Solr、Jboss、Drupal的漏洞利用脚本,最新添加CVE-2020-14882、CVE-2020-11444、CVE-2020-10204、CVE-2020-10199、CVE-2020-1938、CVE-2020-2551、CVE-2020-2555、CVE-2020-2883、CVE-2019-17558、CVE-2019-6340| |1792|2024-11-07T08:23:51Z|phuip-fpizdam|https://github.com/neex/phuip-fpizdam|Exploit for CVE-2019-11043| |1174|2024-10-31T00:43:46Z|BlueKeep|https://github.com/Ekultek/BlueKeep|Proof of concept for CVE-2019-0708| |491|2024-08-12T19:49:06Z|CVE-2019-0708|https://github.com/n1xbyte/CVE-2019-0708|dump| @@ -238,15 +238,15 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |201|2024-09-25T11:21:13Z|CVE-2018-0296|https://github.com/yassineaboukir/CVE-2018-0296|Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.| |167|2024-09-13T14:17:13Z|CVE-2018-3245|https://github.com/pyn3rd/CVE-2018-3245|CVE-2018-3245-PoC| |163|2024-08-12T19:38:37Z|cve-2018-8120|https://github.com/bigric3/cve-2018-8120|| +|120|2024-08-12T19:44:57Z|cve-2018-8453-exp|https://github.com/ze0r/cve-2018-8453-exp|cve-2018-8453 exp| |130|2024-11-07T00:15:54Z|CVE-2018-7600|https://github.com/pimps/CVE-2018-7600|Exploit for Drupal 7 <= 7.57 CVE-2018-7600| |166|2024-08-12T19:35:27Z|RTF_11882_0802|https://github.com/Ridter/RTF_11882_0802|PoC for CVE-2018-0802 And CVE-2017-11882| -|120|2024-08-12T19:44:57Z|cve-2018-8453-exp|https://github.com/ze0r/cve-2018-8453-exp|cve-2018-8453 exp| |181|2024-11-03T09:27:33Z|CVE-2018-15982_EXP|https://github.com/Ridter/CVE-2018-15982_EXP|exp of CVE-2018-15982| |167|2024-09-13T15:40:47Z|CVE-2018-8174-msf|https://github.com/0x09AL/CVE-2018-8174-msf|CVE-2018-8174 - VBScript memory corruption exploit.| |261|2024-09-19T11:51:28Z|credssp|https://github.com/preempt/credssp|A code demonstrating CVE-2018-0886| |60|2023-11-02T05:10:34Z|bluetoothdPoC|https://github.com/rani-i/bluetoothdPoC|CVE-2018-4087 PoC| |129|2024-08-12T19:42:04Z|CVE-2018-17182|https://github.com/jas502n/CVE-2018-17182|Linux 内核VMA-UAF 提权漏洞(CVE-2018-17182),0day| -|135|2024-09-18T22:47:02Z|CVE-2018-2894|https://github.com/LandGrey/CVE-2018-2894|CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script| +|136|2024-11-09T17:50:22Z|CVE-2018-2894|https://github.com/LandGrey/CVE-2018-2894|CVE-2018-2894 WebLogic Unrestricted File Upload Lead To RCE Check Script| ## 2017 |star|updated_at|name|url|des| |---|---|---|---|---| @@ -318,7 +318,7 @@ TOP All bugbounty pentesting CVE-2022- POC Exp Things |---|---|---|---|---| |542|2024-09-08T18:04:38Z|CVE-2015-7547|https://github.com/fjserna/CVE-2015-7547|Proof of concept for CVE-2015-7547| |286|2024-10-25T16:14:23Z|CVE-2015-1701|https://github.com/hfiref0x/CVE-2015-1701|Win32k LPE vulnerability used in APT attack| -|269|2024-09-24T07:39:22Z|iovyroot|https://github.com/dosomder/iovyroot|CVE-2015-1805 root tool| +|270|2024-11-09T15:25:05Z|iovyroot|https://github.com/dosomder/iovyroot|CVE-2015-1805 root tool| |203|2024-08-12T19:19:13Z|cve-2015-1538-1|https://github.com/jduck/cve-2015-1538-1|An exploit for CVE-2015-1538-1 - Google Stagefright ‘stsc’ MP4 Atom Integer Overflow Remote Code Execution| |131|2023-08-04T13:41:05Z|CVE-2015-3636|https://github.com/fi01/CVE-2015-3636|PoC code for 32 bit Android OS| |117|2024-10-30T22:24:19Z|cve-2015-6639|https://github.com/laginimaineb/cve-2015-6639|QSEE Privilege Escalation Exploit using PRDiag* commands (CVE-2015-6639)| diff --git a/Top_Codeql.md b/Top_Codeql.md index 74decb9..85312fb 100644 --- a/Top_Codeql.md +++ b/Top_Codeql.md @@ -3,7 +3,39 @@ # TOP Codeql TOP All Codeql for 0day Things -## Codeql# Donation +## Codeql +|star|name|url|des| +|---|---|---|---| +|7670|codeql|https://github.com/github/codeql|CodeQL: the libraries and queries that power security researchers around the world, as well as code scanning in GitHub Advanced Security| +|2067|secure-code-game|https://github.com/skills/secure-code-game|A GitHub Security Lab initiative, providing an in-repo learning experience, where learners secure intentionally vulnerable code.| +|1497|CodeQL|https://github.com/ASTTeam/CodeQL|《深入理解CodeQL》Finding vulnerabilities with CodeQL.| +|1161|codeql-action|https://github.com/github/codeql-action|Actions for running CodeQL analysis| +|840|CodeqlNote|https://github.com/safe6Sec/CodeqlNote|Codeql学习笔记| +|750|CodeQLpy|https://github.com/webraybtl/CodeQLpy|CodeQLpy是一款基于CodeQL实现的半自动化代码审计工具,目前仅支持java语言。实现从源码反编译,数据库生成,脆弱性发现的全过程,可以辅助代码审计人员快速定位源码可能存在的漏洞。| +|748|codeql-cli-binaries|https://github.com/github/codeql-cli-binaries|Binaries for the CodeQL CLI| +|736|learning-codeql|https://github.com/SummerSec/learning-codeql|CodeQL Java 全网最全的中文学习资料| +|493|vscode-codeql-starter|https://github.com/github/vscode-codeql-starter|Starter workspace to use with the CodeQL extension for Visual Studio Code.| +|465|codeql-go|https://github.com/github/codeql-go|The CodeQL extractor and libraries for Go.| +|426|vscode-codeql|https://github.com/github/vscode-codeql|An extension for Visual Studio Code that adds rich language support for CodeQL| +|401|Choccy|https://github.com/l3yx/Choccy|GitHub项目监控 && CodeQL自动扫描 (GitHub project monitoring && CodeQL automatic analysis)| +|363|CodeqlLearn|https://github.com/Firebasky/CodeqlLearn|记录学习codeql的过程| +|298|codeql_compile|https://github.com/ice-doom/codeql_compile|自动反编译闭源应用,创建codeql数据库| +|207|codeql|https://github.com/githubsatelliteworkshops/codeql|GitHub Satellite 2020 workshops on finding security vulnerabilities with CodeQL for Java/JavaScript.| +|172|CodeQLRule|https://github.com/ice-doom/CodeQLRule|个人使用CodeQL编写的一些规则| +|127|codeql-coding-standards|https://github.com/github/codeql-coding-standards|This repository contains CodeQL queries and libraries which support various Coding Standards.| +|109|codeql-container|https://github.com/microsoft/codeql-container|Prepackaged and precompiled github codeql container for rapid analysis, deployment and development.| +|96|codeql.nvim|https://github.com/pwntester/codeql.nvim|CodeQL plugin for Neovim| +|94|codeql-queries|https://github.com/cldrn/codeql-queries|My CodeQL queries collection| +|91|codeql|https://github.com/githubuniverseworkshops/codeql|CodeQL workshops for GitHub Universe| +|87|codeql-docker|https://github.com/j3ssie/codeql-docker|Ready to use docker image for CodeQL| +|85|codeql-zero-to-hero|https://github.com/GitHubSecurityLab/codeql-zero-to-hero|CodeQL zero to hero blog post series challenges| +|81|ghas-jira-integration|https://github.com/github/ghas-jira-integration|Synchronize GitHub Code Scanning alerts to Jira issues| +|80|codeql-queries|https://github.com/advanced-security/codeql-queries|[Deprecated] GitHub's Field Team's CodeQL Custom Queries, Suites, and Configurations. See GitHubSecurityLab/CodeQL-Community-Packs instead| +|69|codeql-debug|https://github.com/zbazztian/codeql-debug|| +|68|CodeQL-Community-Packs|https://github.com/GitHubSecurityLab/CodeQL-Community-Packs|Collection of community-driven CodeQL query, library and extension packs| +|37|codeql-action-sync-tool|https://github.com/github/codeql-action-sync-tool|A tool for syncing the CodeQL Action from GitHub.com to GitHub Enterprise Server, including copying the CodeQL bundle.| +|35|codeql-learninglab-actions|https://github.com/github/codeql-learninglab-actions|Actions and Images for use in Learning Lab courses for CodeQL| +|30|codeql|https://github.com/cor0ps/codeql|收集规则|# Donation | Wechat Pay | AliPay | Paypal | BTC Pay |BCH Pay | | --- | --- | --- | --- | --- | |||[paypal](https://www.paypal.me/pwned2019) **miracletalent@gmail.com**|||