2022-05-12 08:16:12 +02:00
[
{
"id" : 491338151 ,
"name" : "TryHackMe-CVE-2022-26923" ,
"full_name" : "r1skkam\/TryHackMe-CVE-2022-26923" ,
"owner" : {
"login" : "r1skkam" ,
"id" : 58542375 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4" ,
"html_url" : "https:\/\/github.com\/r1skkam"
} ,
"html_url" : "https:\/\/github.com\/r1skkam\/TryHackMe-CVE-2022-26923" ,
"description" : "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services" ,
"fork" : false ,
"created_at" : "2022-05-12T02:31:50Z" ,
2022-08-12 14:17:59 +02:00
"updated_at" : "2022-08-12T08:03:36Z" ,
2022-05-12 08:16:12 +02:00
"pushed_at" : "2022-05-12T03:24:04Z" ,
2022-08-12 14:17:59 +02:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"forks_count" : 3 ,
2022-05-12 08:16:12 +02:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2022-05-12 08:16:12 +02:00
"topics" : [ ] ,
"visibility" : "public" ,
2022-08-12 14:17:59 +02:00
"forks" : 3 ,
"watchers" : 6 ,
2022-05-12 08:16:12 +02:00
"score" : 0
2022-05-14 14:15:16 +02:00
} ,
{
"id" : 492169187 ,
"name" : "CVE-2022-26923_AD-Certificate-Services" ,
"full_name" : "LudovicPatho\/CVE-2022-26923_AD-Certificate-Services" ,
"owner" : {
"login" : "LudovicPatho" ,
"id" : 26960886 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4" ,
"html_url" : "https:\/\/github.com\/LudovicPatho"
} ,
"html_url" : "https:\/\/github.com\/LudovicPatho\/CVE-2022-26923_AD-Certificate-Services" ,
2022-05-15 02:15:06 +02:00
"description" : "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed." ,
2022-05-14 14:15:16 +02:00
"fork" : false ,
"created_at" : "2022-05-14T09:27:06Z" ,
2022-08-25 20:18:38 +02:00
"updated_at" : "2022-08-25T13:45:43Z" ,
2022-05-15 02:15:06 +02:00
"pushed_at" : "2022-05-14T20:56:39Z" ,
2022-08-25 20:18:38 +02:00
"stargazers_count" : 22 ,
"watchers_count" : 22 ,
2022-07-06 14:17:56 +02:00
"forks_count" : 6 ,
2022-05-14 14:15:16 +02:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2022-05-14 14:15:16 +02:00
"topics" : [ ] ,
"visibility" : "public" ,
2022-07-06 14:17:56 +02:00
"forks" : 6 ,
2022-08-25 20:18:38 +02:00
"watchers" : 22 ,
2022-05-14 14:15:16 +02:00
"score" : 0
2022-08-18 02:21:22 +02:00
} ,
{
"id" : 525955636 ,
"name" : "CVE-2022-26923-Powershell-POC" ,
"full_name" : "lsecqt\/CVE-2022-26923-Powershell-POC" ,
"owner" : {
"login" : "lsecqt" ,
"id" : 102690672 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/102690672?v=4" ,
"html_url" : "https:\/\/github.com\/lsecqt"
} ,
"html_url" : "https:\/\/github.com\/lsecqt\/CVE-2022-26923-Powershell-POC" ,
"description" : "A powershell poc to load and automatically run Certify and Rubeus from memory." ,
"fork" : false ,
"created_at" : "2022-08-17T21:13:49Z" ,
2022-08-26 14:17:23 +02:00
"updated_at" : "2022-08-26T10:46:13Z" ,
2022-08-18 02:21:22 +02:00
"pushed_at" : "2022-08-17T21:25:20Z" ,
2022-08-26 14:17:23 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2022-08-18 02:21:22 +02:00
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2022-08-26 14:17:23 +02:00
"watchers" : 5 ,
2022-08-18 02:21:22 +02:00
"score" : 0
2022-05-12 08:16:12 +02:00
}
]