PoC-in-GitHub/2020/CVE-2020-0601.json

485 lines
17 KiB
JSON
Raw Normal View History

2020-01-15 05:00:02 +01:00
[
{
"id": 233959211,
"name": "CVE-2020-0601",
"full_name": "nissan-sudo\/CVE-2020-0601",
"owner": {
"login": "nissan-sudo",
"id": 58976920,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58976920?v=4",
"html_url": "https:\/\/github.com\/nissan-sudo"
},
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
2020-01-15 11:00:02 +01:00
"description": "Remote Code Execution Exploit ",
2020-01-15 05:00:02 +01:00
"fork": false,
"created_at": "2020-01-14T23:53:18Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:28:37Z",
2020-01-15 05:00:02 +01:00
"pushed_at": "2020-01-14T23:56:22Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2020-01-15 05:00:02 +01:00
"forks_count": 0,
"forks": 0,
2020-01-27 22:07:32 +01:00
"watchers": 2,
2020-01-15 05:00:02 +01:00
"score": 0
},
{
"id": 233960159,
"name": "cve-2020-0601",
"full_name": "0xxon\/cve-2020-0601",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601",
"description": "Zeek package to detect CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T00:01:29Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:26:44Z",
2020-01-18 20:27:02 +01:00
"pushed_at": "2020-01-17T17:13:52Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 34,
"watchers_count": 34,
2020-01-23 22:07:28 +01:00
"forks_count": 11,
"forks": 11,
2020-01-27 22:07:32 +01:00
"watchers": 34,
2020-01-15 23:00:02 +01:00
"score": 0
},
{
"id": 234134766,
"name": "CVE-2020-0601",
"full_name": "SherlockSec\/CVE-2020-0601",
"owner": {
"login": "SherlockSec",
"id": 37545173,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
"html_url": "https:\/\/github.com\/SherlockSec"
},
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
"description": "A Windows Crypto Exploit",
"fork": false,
"created_at": "2020-01-15T17:26:58Z",
2020-01-16 23:00:02 +01:00
"updated_at": "2020-01-16T20:56:07Z",
2020-01-15 23:00:02 +01:00
"pushed_at": "2020-01-15T17:28:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 234146234,
"name": "CVE-2020-0601",
"full_name": "JPurrier\/CVE-2020-0601",
"owner": {
"login": "JPurrier",
"id": 25715340,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4",
"html_url": "https:\/\/github.com\/JPurrier"
},
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-15T18:31:30Z",
2020-01-17 17:00:02 +01:00
"updated_at": "2020-01-17T10:49:19Z",
"pushed_at": "2020-01-17T10:49:17Z",
2020-01-15 23:00:02 +01:00
"stargazers_count": 0,
"watchers_count": 0,
2020-01-15 05:00:02 +01:00
"forks_count": 0,
"forks": 0,
2020-01-15 23:00:02 +01:00
"watchers": 0,
2020-01-15 05:00:02 +01:00
"score": 0
2020-01-16 05:00:02 +01:00
},
{
"id": 234190972,
"name": "cve-2020-0601-plugin",
"full_name": "0xxon\/cve-2020-0601-plugin",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-plugin",
"description": "Zeek package that uses OpenSSL to detect CVE-2020-0601 exploit attempts",
"fork": false,
"created_at": "2020-01-15T23:07:02Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:27:02Z",
2020-01-16 23:00:02 +01:00
"pushed_at": "2020-01-16T18:06:57Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 4,
"watchers_count": 4,
2020-01-16 05:00:02 +01:00
"forks_count": 0,
"forks": 0,
2020-01-27 22:07:32 +01:00
"watchers": 4,
2020-01-16 05:00:02 +01:00
"score": 0
},
{
"id": 234191063,
2020-01-24 22:07:28 +01:00
"name": "CurveBall",
"full_name": "ollypwn\/CurveBall",
2020-01-16 05:00:02 +01:00
"owner": {
"login": "ollypwn",
"id": 53348818,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ollypwn"
},
2020-01-24 22:07:28 +01:00
"html_url": "https:\/\/github.com\/ollypwn\/CurveBall",
"description": "PoC for CVE-2020-0601- Windows CryptoAPI (Crypt32.dll)",
2020-01-16 05:00:02 +01:00
"fork": false,
"created_at": "2020-01-15T23:07:41Z",
2020-01-28 22:07:37 +01:00
"updated_at": "2020-01-28T18:49:50Z",
2020-01-21 04:08:01 +01:00
"pushed_at": "2020-01-20T23:33:19Z",
2020-01-28 22:07:37 +01:00
"stargazers_count": 732,
"watchers_count": 732,
2020-01-27 10:07:26 +01:00
"forks_count": 181,
"forks": 181,
2020-01-28 22:07:37 +01:00
"watchers": 732,
2020-01-16 05:00:02 +01:00
"score": 0
},
{
"id": 234192123,
"name": "chainoffools",
"full_name": "kudelskisecurity\/chainoffools",
"owner": {
"login": "kudelskisecurity",
"id": 10771090,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10771090?v=4",
"html_url": "https:\/\/github.com\/kudelskisecurity"
},
"html_url": "https:\/\/github.com\/kudelskisecurity\/chainoffools",
"description": "A PoC for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-15T23:15:32Z",
2020-01-28 22:07:37 +01:00
"updated_at": "2020-01-28T21:05:50Z",
2020-01-17 17:00:02 +01:00
"pushed_at": "2020-01-17T13:29:44Z",
2020-01-28 22:07:37 +01:00
"stargazers_count": 288,
"watchers_count": 288,
"forks_count": 71,
"forks": 71,
"watchers": 288,
2020-01-16 05:00:02 +01:00
"score": 0
},
{
"id": 234220195,
"name": "Awesome-CVE-2020-0601",
2020-01-25 16:07:23 +01:00
"full_name": "RrUZi\/Awesome-CVE-2020-0601",
2020-01-16 05:00:02 +01:00
"owner": {
2020-01-25 16:07:23 +01:00
"login": "RrUZi",
"id": 43235635,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43235635?v=4",
"html_url": "https:\/\/github.com\/RrUZi"
2020-01-16 05:00:02 +01:00
},
2020-01-25 16:07:23 +01:00
"html_url": "https:\/\/github.com\/RrUZi\/Awesome-CVE-2020-0601",
2020-01-16 05:00:02 +01:00
"description": "😂An awesome curated list of repos for CVE-2020-0601.",
"fork": false,
"created_at": "2020-01-16T02:46:21Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:27:07Z",
2020-01-25 16:07:23 +01:00
"pushed_at": "2020-01-25T14:38:04Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 4,
"watchers_count": 4,
2020-01-16 05:00:02 +01:00
"forks_count": 0,
"forks": 0,
2020-01-27 22:07:32 +01:00
"watchers": 4,
2020-01-16 17:00:02 +01:00
"score": 0
},
{
"id": 234317211,
"name": "CVE-2020-0601",
"full_name": "BleepSec\/CVE-2020-0601",
"owner": {
"login": "BleepSec",
"id": 550582,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/550582?v=4",
"html_url": "https:\/\/github.com\/BleepSec"
},
"html_url": "https:\/\/github.com\/BleepSec\/CVE-2020-0601",
"description": "Curated list of CVE-2020-0601 resources",
"fork": false,
"created_at": "2020-01-16T12:40:48Z",
2020-01-16 23:00:02 +01:00
"updated_at": "2020-01-16T17:05:31Z",
"pushed_at": "2020-01-16T17:05:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234378948,
"name": "CVE-2020-0601",
"full_name": "apmunch\/CVE-2020-0601",
"owner": {
"login": "apmunch",
"id": 7328483,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7328483?v=4",
"html_url": "https:\/\/github.com\/apmunch"
},
"html_url": "https:\/\/github.com\/apmunch\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-16T17:54:36Z",
"updated_at": "2020-01-16T18:04:01Z",
"pushed_at": "2020-01-16T18:03:59Z",
2020-01-16 17:00:02 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2020-01-16 05:00:02 +01:00
"score": 0
2020-01-17 05:00:02 +01:00
},
{
"id": 234433419,
"name": "badecparams",
"full_name": "saleemrashid\/badecparams",
"owner": {
"login": "saleemrashid",
"id": 22301423,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22301423?v=4",
"html_url": "https:\/\/github.com\/saleemrashid"
},
"html_url": "https:\/\/github.com\/saleemrashid\/badecparams",
"description": "Proof of Concept for CVE-2020-0601",
"fork": false,
"created_at": "2020-01-16T23:44:37Z",
2020-01-28 04:07:21 +01:00
"updated_at": "2020-01-28T02:06:21Z",
2020-01-18 20:27:02 +01:00
"pushed_at": "2020-01-17T16:32:39Z",
2020-01-28 04:07:21 +01:00
"stargazers_count": 46,
"watchers_count": 46,
2020-01-23 22:07:28 +01:00
"forks_count": 9,
"forks": 9,
2020-01-28 04:07:21 +01:00
"watchers": 46,
2020-01-17 05:00:02 +01:00
"score": 0
},
{
"id": 234442281,
"name": "cve-2020-0601-utils",
"full_name": "0xxon\/cve-2020-0601-utils",
"owner": {
"login": "0xxon",
"id": 1538460,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
"html_url": "https:\/\/github.com\/0xxon"
},
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
"fork": false,
"created_at": "2020-01-17T01:02:52Z",
2020-01-21 22:07:35 +01:00
"updated_at": "2020-01-21T19:49:00Z",
"pushed_at": "2020-01-21T19:48:58Z",
2020-01-17 05:00:02 +01:00
"stargazers_count": 0,
"watchers_count": 0,
2020-01-20 10:07:34 +01:00
"forks_count": 1,
"forks": 1,
2020-01-17 05:00:02 +01:00
"watchers": 0,
"score": 0
2020-01-17 17:00:02 +01:00
},
{
"id": 234574037,
"name": "Windows10_Cumulative_Updates_PowerShell",
"full_name": "Doug-Moody\/Windows10_Cumulative_Updates_PowerShell",
"owner": {
"login": "Doug-Moody",
"id": 40870695,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40870695?v=4",
"html_url": "https:\/\/github.com\/Doug-Moody"
},
"html_url": "https:\/\/github.com\/Doug-Moody\/Windows10_Cumulative_Updates_PowerShell",
2020-01-18 20:27:02 +01:00
"description": "Powershell to patch CVE-2020-0601 . Complete security rollup for Windows 10 1507-1909",
2020-01-17 17:00:02 +01:00
"fork": false,
"created_at": "2020-01-17T15:13:37Z",
2020-01-28 22:07:37 +01:00
"updated_at": "2020-01-28T16:32:46Z",
"pushed_at": "2020-01-28T16:32:44Z",
2020-01-28 16:07:52 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-01-23 22:07:28 +01:00
"forks_count": 0,
"forks": 0,
2020-01-28 16:07:52 +01:00
"watchers": 1,
2020-01-18 20:27:02 +01:00
"score": 0
},
{
"id": 234588471,
"name": "CVE-2020-0601",
"full_name": "MarkusZehnle\/CVE-2020-0601",
"owner": {
"login": "MarkusZehnle",
"id": 60010315,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/60010315?v=4",
"html_url": "https:\/\/github.com\/MarkusZehnle"
},
"html_url": "https:\/\/github.com\/MarkusZehnle\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-17T16:24:31Z",
"updated_at": "2020-01-17T16:42:32Z",
"pushed_at": "2020-01-17T16:42:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234598729,
"name": "CVE-2020-0601",
"full_name": "YoannDqr\/CVE-2020-0601",
"owner": {
"login": "YoannDqr",
"id": 26006989,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/26006989?v=4",
"html_url": "https:\/\/github.com\/YoannDqr"
},
"html_url": "https:\/\/github.com\/YoannDqr\/CVE-2020-0601",
"description": "CurveBall CVE exploitation",
"fork": false,
"created_at": "2020-01-17T17:17:55Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:28:36Z",
2020-01-20 16:08:30 +01:00
"pushed_at": "2020-01-20T10:52:57Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-01-18 20:27:02 +01:00
"forks_count": 0,
"forks": 0,
2020-01-27 22:07:32 +01:00
"watchers": 1,
2020-01-18 20:27:02 +01:00
"score": 0
},
{
"id": 234714299,
"name": "cve-2020-0601-Perl",
"full_name": "thimelp\/cve-2020-0601-Perl",
"owner": {
"login": "thimelp",
"id": 60032194,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/60032194?v=4",
"html_url": "https:\/\/github.com\/thimelp"
},
"html_url": "https:\/\/github.com\/thimelp\/cve-2020-0601-Perl",
"description": "Perl version of recently published scripts to build ECC certificates with specific parameters re CVE-2020-0601",
"fork": false,
"created_at": "2020-01-18T09:58:16Z",
"updated_at": "2020-01-18T12:07:08Z",
"pushed_at": "2020-01-18T12:07:06Z",
2020-01-17 17:00:02 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-01-20 03:07:05 +01:00
},
{
"id": 234920281,
"name": "curveball_lua",
"full_name": "dlee35\/curveball_lua",
"owner": {
"login": "dlee35",
"id": 7849311,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/7849311?v=4",
"html_url": "https:\/\/github.com\/dlee35"
},
"html_url": "https:\/\/github.com\/dlee35\/curveball_lua",
"description": "Repo containing lua scripts and PCAP to find CVE-2020-0601 exploit attempts via network traffic",
"fork": false,
"created_at": "2020-01-19T15:20:19Z",
"updated_at": "2020-01-19T21:25:55Z",
"pushed_at": "2020-01-19T21:25:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 234944443,
"name": "-CVE-2020-0601-ECC---EXPLOIT",
"full_name": "IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"owner": {
"login": "IIICTECH",
"id": 5104528,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5104528?v=4",
"html_url": "https:\/\/github.com\/IIICTECH"
},
"html_url": "https:\/\/github.com\/IIICTECH\/-CVE-2020-0601-ECC---EXPLOIT",
"description": "CurveBall (CVE-2020-0601) - PoC CVE-2020-0601, or commonly referred to as CurveBall, is a vulnerability in which the signature of certificates using elliptic curve cryptography (ECC) is not correctly verified. Attackers can supply hand-rolled generators, bypassing validation, antivirus & all non-protections. ",
"fork": false,
"created_at": "2020-01-19T18:20:26Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:28:54Z",
2020-01-20 03:07:05 +01:00
"pushed_at": "2020-01-19T18:26:33Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2020-01-20 03:07:05 +01:00
"forks_count": 0,
"forks": 0,
2020-01-27 22:07:32 +01:00
"watchers": 1,
2020-01-20 03:07:05 +01:00
"score": 0
},
{
"id": 235000073,
"name": "CVE-2020-0601",
"full_name": "cosmicifint\/CVE-2020-0601",
"owner": {
"login": "cosmicifint",
"id": 50549802,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/50549802?v=4",
"html_url": "https:\/\/github.com\/cosmicifint"
},
"html_url": "https:\/\/github.com\/cosmicifint\/CVE-2020-0601",
"description": null,
"fork": false,
"created_at": "2020-01-20T02:04:05Z",
"updated_at": "2020-01-20T02:05:22Z",
"pushed_at": "2020-01-20T02:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-01-20 22:07:28 +01:00
},
{
"id": 235145190,
"name": "curveball",
"full_name": "gentilkiwi\/curveball",
"owner": {
"login": "gentilkiwi",
"id": 2307945,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2307945?v=4",
"html_url": "https:\/\/github.com\/gentilkiwi"
},
"html_url": "https:\/\/github.com\/gentilkiwi\/curveball",
"description": "CVE-2020-0601 #curveball - Alternative Key Calculator",
"fork": false,
"created_at": "2020-01-20T16:24:20Z",
2020-01-27 22:07:32 +01:00
"updated_at": "2020-01-27T17:26:49Z",
2020-01-21 04:08:01 +01:00
"pushed_at": "2020-01-20T23:00:14Z",
2020-01-27 22:07:32 +01:00
"stargazers_count": 59,
"watchers_count": 59,
2020-01-23 22:07:28 +01:00
"forks_count": 7,
"forks": 7,
2020-01-27 22:07:32 +01:00
"watchers": 59,
2020-01-25 22:07:08 +01:00
"score": 0
},
{
"id": 235858699,
"name": "CurveBall",
"full_name": "Hans-MartinHannibalLauridsen\/CurveBall",
"owner": {
"login": "Hans-MartinHannibalLauridsen",
"id": 19854797,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19854797?v=4",
"html_url": "https:\/\/github.com\/Hans-MartinHannibalLauridsen"
},
"html_url": "https:\/\/github.com\/Hans-MartinHannibalLauridsen\/CurveBall",
"description": "CVE-2020-0601: Windows CryptoAPI Vulnerability. (CurveBall\/ChainOfFools)",
"fork": false,
"created_at": "2020-01-23T18:26:48Z",
2020-01-28 16:07:52 +01:00
"updated_at": "2020-01-28T10:11:46Z",
"pushed_at": "2020-01-28T10:11:44Z",
2020-01-25 22:07:08 +01:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
2020-01-20 22:07:28 +01:00
"score": 0
2020-01-15 05:00:02 +01:00
}
]