PoC-in-GitHub/2021/CVE-2021-40444.json

939 lines
31 KiB
JSON
Raw Normal View History

2021-09-08 11:12:39 +02:00
[
{
"id": 404270939,
"name": "CVE-2021-40444",
"full_name": "ozergoker\/CVE-2021-40444",
"owner": {
"login": "ozergoker",
"id": 86879266,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
"html_url": "https:\/\/github.com\/ozergoker"
},
"html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444",
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
"fork": false,
"created_at": "2021-09-08T08:32:40Z",
2021-12-17 13:13:56 +01:00
"updated_at": "2021-12-17T08:36:39Z",
2021-09-29 17:13:20 +02:00
"pushed_at": "2021-09-29T11:39:26Z",
2021-12-17 13:13:56 +01:00
"stargazers_count": 17,
"watchers_count": 17,
2021-10-24 11:12:45 +02:00
"forks_count": 7,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-24 11:12:45 +02:00
"forks": 7,
2021-12-17 13:13:56 +01:00
"watchers": 17,
2021-09-09 05:12:32 +02:00
"score": 0
},
{
"id": 404560139,
"name": "CVE-2021-40444",
"full_name": "DarkSprings\/CVE-2021-40444",
"owner": {
"login": "DarkSprings",
"id": 90366126,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90366126?v=4",
"html_url": "https:\/\/github.com\/DarkSprings"
},
"html_url": "https:\/\/github.com\/DarkSprings\/CVE-2021-40444",
"description": "CVE-2021-40444 POC",
"fork": false,
"created_at": "2021-09-09T02:30:26Z",
2021-09-17 17:13:37 +02:00
"updated_at": "2021-09-17T10:41:29Z",
2021-09-09 05:12:32 +02:00
"pushed_at": "2021-09-09T02:34:39Z",
2021-09-17 17:13:37 +02:00
"stargazers_count": 6,
"watchers_count": 6,
2021-11-14 19:14:07 +01:00
"forks_count": 9,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-11-14 19:14:07 +01:00
"forks": 9,
2021-09-17 17:13:37 +02:00
"watchers": 6,
2021-09-09 05:12:32 +02:00
"score": 0
},
{
"id": 404570413,
"name": "CVE-2021-40444-POC",
"full_name": "rfcxv\/CVE-2021-40444-POC",
"owner": {
"login": "rfcxv",
"id": 90367910,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/90367910?v=4",
"html_url": "https:\/\/github.com\/rfcxv"
},
"html_url": "https:\/\/github.com\/rfcxv\/CVE-2021-40444-POC",
"description": null,
"fork": false,
"created_at": "2021-09-09T03:15:57Z",
2021-11-22 13:13:24 +01:00
"updated_at": "2021-11-22T07:51:23Z",
2021-09-09 11:12:44 +02:00
"pushed_at": "2021-09-09T03:26:21Z",
2021-11-22 13:13:24 +01:00
"stargazers_count": 12,
"watchers_count": 12,
2021-10-11 17:13:15 +02:00
"forks_count": 12,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-11 17:13:15 +02:00
"forks": 12,
2021-11-22 13:13:24 +01:00
"watchers": 12,
2021-09-14 11:13:00 +02:00
"score": 0
},
2021-09-14 17:13:01 +02:00
{
"id": 404667016,
"name": "CVE-2021-40444_EXP_JS",
"full_name": "bambooqj\/CVE-2021-40444_EXP_JS",
"owner": {
"login": "bambooqj",
"id": 20792621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20792621?v=4",
"html_url": "https:\/\/github.com\/bambooqj"
},
"html_url": "https:\/\/github.com\/bambooqj\/CVE-2021-40444_EXP_JS",
"description": "根据已知样本反编译代码",
"fork": false,
"created_at": "2021-09-09T09:46:00Z",
2021-09-16 11:14:12 +02:00
"updated_at": "2021-09-16T07:40:28Z",
2021-09-14 17:13:01 +02:00
"pushed_at": "2021-09-09T09:46:32Z",
2021-09-16 11:14:12 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2021-09-15 23:12:48 +02:00
"forks_count": 4,
2021-09-14 17:13:01 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-15 23:12:48 +02:00
"forks": 4,
2021-09-16 11:14:12 +02:00
"watchers": 3,
2021-09-14 17:13:01 +02:00
"score": 0
},
2021-09-14 11:13:00 +02:00
{
"id": 404779804,
"name": "cve-2021-40444-analysis",
"full_name": "Immersive-Labs-Sec\/cve-2021-40444-analysis",
"owner": {
"login": "Immersive-Labs-Sec",
"id": 79456607,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79456607?v=4",
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec"
},
"html_url": "https:\/\/github.com\/Immersive-Labs-Sec\/cve-2021-40444-analysis",
"description": null,
"fork": false,
"created_at": "2021-09-09T15:43:08Z",
"updated_at": "2021-09-14T08:18:40Z",
"pushed_at": "2021-09-14T08:18:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-14 11:13:00 +02:00
"forks": 0,
"watchers": 0,
2021-09-13 17:13:11 +02:00
"score": 0
},
2021-09-10 05:12:30 +02:00
{
"id": 404899720,
"name": "CVE-2021-40444",
"full_name": "vysecurity\/CVE-2021-40444",
"owner": {
"login": "vysecurity",
"id": 3596242,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
"html_url": "https:\/\/github.com\/vysecurity"
},
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-09-09T23:41:52Z",
2021-09-10 23:12:36 +02:00
"updated_at": "2021-09-10T16:34:33Z",
2021-09-10 05:12:30 +02:00
"pushed_at": "2021-09-09T23:41:53Z",
2021-09-10 23:12:36 +02:00
"stargazers_count": 3,
"watchers_count": 3,
2021-09-10 05:12:30 +02:00
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-10 05:12:30 +02:00
"forks": 0,
2021-09-10 23:12:36 +02:00
"watchers": 3,
2021-09-10 05:12:30 +02:00
"score": 0
2021-09-10 17:13:00 +02:00
},
{
"id": 405030498,
"name": "CVE-2021-40444-Sample",
"full_name": "Udyz\/CVE-2021-40444-Sample",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-Sample",
"description": "CVE-2021-40444 Sample ",
"fork": false,
"created_at": "2021-09-10T09:43:41Z",
2021-12-15 19:14:01 +01:00
"updated_at": "2021-12-15T14:42:57Z",
2021-09-11 17:12:37 +02:00
"pushed_at": "2021-09-11T10:35:20Z",
2021-12-15 19:14:01 +01:00
"stargazers_count": 78,
"watchers_count": 78,
2021-11-14 19:14:07 +01:00
"forks_count": 55,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-11-14 19:14:07 +01:00
"forks": 55,
2021-12-15 19:14:01 +01:00
"watchers": 78,
2021-09-10 23:12:36 +02:00
"score": 0
},
{
"id": 405129665,
"name": "CVE-2021-40444-evtx",
"full_name": "zaneGittins\/CVE-2021-40444-evtx",
"owner": {
"login": "zaneGittins",
"id": 22203776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22203776?v=4",
"html_url": "https:\/\/github.com\/zaneGittins"
},
"html_url": "https:\/\/github.com\/zaneGittins\/CVE-2021-40444-evtx",
"description": "Event logs from running CVE-2021-40444 samples",
"fork": false,
"created_at": "2021-09-10T15:36:43Z",
2021-12-15 19:14:01 +01:00
"updated_at": "2021-12-15T14:42:57Z",
2021-09-10 23:12:36 +02:00
"pushed_at": "2021-09-10T15:37:14Z",
2021-12-15 19:14:01 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2021-09-29 17:13:20 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-29 17:13:20 +02:00
"forks": 1,
2021-12-15 19:14:01 +01:00
"watchers": 1,
2021-09-10 23:12:36 +02:00
"score": 0
},
{
"id": 405152543,
"name": "CVE-2021-40444",
"full_name": "lockedbyte\/CVE-2021-40444",
"owner": {
"login": "lockedbyte",
"id": 37779789,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
"html_url": "https:\/\/github.com\/lockedbyte"
},
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
2021-09-11 05:11:58 +02:00
"description": "CVE-2021-40444 PoC",
2021-09-10 23:12:36 +02:00
"fork": false,
"created_at": "2021-09-10T16:55:53Z",
2021-12-25 19:13:21 +01:00
"updated_at": "2021-12-25T13:56:12Z",
2021-12-26 01:14:14 +01:00
"pushed_at": "2021-12-25T18:31:02Z",
2021-12-25 19:13:21 +01:00
"stargazers_count": 1331,
"watchers_count": 1331,
2021-12-26 01:14:14 +01:00
"forks_count": 437,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-12-26 01:14:14 +01:00
"forks": 437,
2021-12-25 19:13:21 +01:00
"watchers": 1331,
2021-09-11 05:11:58 +02:00
"score": 0
},
{
"id": 405266779,
"name": "CVE-2021-40444-docx-Generate",
"full_name": "fengjixuchui\/CVE-2021-40444-docx-Generate",
"owner": {
"login": "fengjixuchui",
"id": 2487206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2487206?v=4",
"html_url": "https:\/\/github.com\/fengjixuchui"
},
"html_url": "https:\/\/github.com\/fengjixuchui\/CVE-2021-40444-docx-Generate",
"description": null,
"fork": false,
"created_at": "2021-09-11T02:49:37Z",
2021-12-24 13:13:37 +01:00
"updated_at": "2021-12-24T11:57:05Z",
2021-09-11 05:11:58 +02:00
"pushed_at": "2021-09-11T02:49:31Z",
2021-12-24 13:13:37 +01:00
"stargazers_count": 5,
"watchers_count": 5,
2021-11-08 07:13:10 +01:00
"forks_count": 3,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-11-08 07:13:10 +01:00
"forks": 3,
2021-12-24 13:13:37 +01:00
"watchers": 5,
2021-09-11 05:11:58 +02:00
"score": 0
},
{
2021-10-15 05:12:58 +02:00
"id": 405292789,
2021-09-11 05:11:58 +02:00
"name": "CVE-2021-40444-docx-Generate",
2021-10-15 05:12:58 +02:00
"full_name": "KnoooW\/CVE-2021-40444-docx-Generate",
2021-09-11 05:11:58 +02:00
"owner": {
2021-10-15 05:12:58 +02:00
"login": "KnoooW",
"id": 4646393,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4646393?v=4",
"html_url": "https:\/\/github.com\/KnoooW"
2021-09-11 05:11:58 +02:00
},
2021-10-15 05:12:58 +02:00
"html_url": "https:\/\/github.com\/KnoooW\/CVE-2021-40444-docx-Generate",
2021-09-11 05:11:58 +02:00
"description": null,
"fork": false,
2021-10-15 05:12:58 +02:00
"created_at": "2021-09-11T05:31:52Z",
"updated_at": "2021-10-14T23:45:35Z",
"pushed_at": "2021-09-11T03:11:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-15 05:12:58 +02:00
"forks": 0,
"watchers": 0,
2021-09-11 11:12:22 +02:00
"score": 0
},
{
2021-09-11 17:12:37 +02:00
"id": 405335973,
"name": "Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
"full_name": "nightrelax\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
2021-09-11 11:12:22 +02:00
"owner": {
2021-09-11 17:12:37 +02:00
"login": "nightrelax",
"id": 1840688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1840688?v=4",
"html_url": "https:\/\/github.com\/nightrelax"
2021-09-11 11:12:22 +02:00
},
2021-09-11 17:12:37 +02:00
"html_url": "https:\/\/github.com\/nightrelax\/Exploit-PoC-CVE-2021-40444-inject-ma-doc-vao-docx",
"description": null,
2021-09-11 11:12:22 +02:00
"fork": false,
2021-09-11 17:12:37 +02:00
"created_at": "2021-09-11T09:21:29Z",
2021-09-20 23:14:09 +02:00
"updated_at": "2021-09-20T15:39:54Z",
2021-09-11 17:12:37 +02:00
"pushed_at": "2021-09-11T09:21:39Z",
2021-09-20 23:14:09 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2021-09-12 17:14:32 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-12 17:14:32 +02:00
"forks": 1,
2021-09-20 23:14:09 +02:00
"watchers": 2,
2021-09-10 17:13:00 +02:00
"score": 0
2021-09-11 23:13:54 +02:00
},
{
"id": 405415528,
"name": "MSHTMHell",
"full_name": "amartinsec\/MSHTMHell",
"owner": {
"login": "amartinsec",
"id": 65378624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65378624?v=4",
"html_url": "https:\/\/github.com\/amartinsec"
},
"html_url": "https:\/\/github.com\/amartinsec\/MSHTMHell",
"description": "Malicious document builder for CVE-2021-40444 ",
"fork": false,
"created_at": "2021-09-11T15:33:41Z",
2021-09-14 17:13:01 +02:00
"updated_at": "2021-09-14T13:49:09Z",
"pushed_at": "2021-09-14T13:49:06Z",
2021-09-11 23:13:54 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-09-14 17:13:01 +02:00
"forks_count": 1,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-14 17:13:01 +02:00
"forks": 1,
2021-09-11 23:13:54 +02:00
"watchers": 0,
"score": 0
},
{
"id": 405428447,
"name": "Caboom",
"full_name": "mansk1es\/Caboom",
"owner": {
"login": "mansk1es",
"id": 74832816,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74832816?v=4",
"html_url": "https:\/\/github.com\/mansk1es"
},
"html_url": "https:\/\/github.com\/mansk1es\/Caboom",
"description": "A malicious .cab creation tool for CVE-2021-40444",
"fork": false,
"created_at": "2021-09-11T16:31:05Z",
2021-12-15 19:14:01 +01:00
"updated_at": "2021-12-15T14:42:58Z",
2021-09-12 11:12:31 +02:00
"pushed_at": "2021-09-12T09:08:23Z",
2021-12-15 19:14:01 +01:00
"stargazers_count": 10,
"watchers_count": 10,
2021-10-07 11:15:55 +02:00
"forks_count": 5,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-07 11:15:55 +02:00
"forks": 5,
2021-12-15 19:14:01 +01:00
"watchers": 10,
2021-09-11 23:13:54 +02:00
"score": 0
},
2021-09-12 17:14:32 +02:00
{
"id": 405599465,
"name": "cve-2021-40444",
"full_name": "jamesrep\/cve-2021-40444",
"owner": {
"login": "jamesrep",
"id": 15976537,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15976537?v=4",
"html_url": "https:\/\/github.com\/jamesrep"
},
"html_url": "https:\/\/github.com\/jamesrep\/cve-2021-40444",
"description": "Reverse engineering the \"A Letter Before Court 4.docx\" malicious files exploting cve-2021-40444",
"fork": false,
"created_at": "2021-09-12T09:27:40Z",
"updated_at": "2021-09-12T12:00:29Z",
"pushed_at": "2021-09-12T12:00:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-12 17:14:32 +02:00
"forks": 0,
"watchers": 0,
"score": 0
2021-09-12 23:14:24 +02:00
},
{
"id": 405716870,
"name": "CVE-2021-40444_builders",
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
"owner": {
"login": "aslitsecurity",
"id": 9478055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
"html_url": "https:\/\/github.com\/aslitsecurity"
},
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
"fork": false,
"created_at": "2021-09-12T18:05:53Z",
2021-12-15 19:14:01 +01:00
"updated_at": "2021-12-15T14:42:58Z",
2021-10-11 23:12:46 +02:00
"pushed_at": "2021-10-11T20:53:19Z",
2021-12-15 19:14:01 +01:00
"stargazers_count": 160,
"watchers_count": 160,
2021-10-31 16:12:44 +01:00
"forks_count": 44,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-31 16:12:44 +01:00
"forks": 44,
2021-12-15 19:14:01 +01:00
"watchers": 160,
2021-09-13 17:13:11 +02:00
"score": 0
},
{
"id": 405915598,
"name": "CVE-2021-40444",
"full_name": "khoaduynu\/CVE-2021-40444",
"owner": {
"login": "khoaduynu",
"id": 45584422,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45584422?v=4",
"html_url": "https:\/\/github.com\/khoaduynu"
},
"html_url": "https:\/\/github.com\/khoaduynu\/CVE-2021-40444",
"description": "POC for CVE-2021-40444",
"fork": false,
"created_at": "2021-09-13T09:46:04Z",
"updated_at": "2021-09-13T09:46:04Z",
"pushed_at": "2021-09-13T09:46:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-13 17:13:11 +02:00
"forks": 0,
"watchers": 0,
2021-09-12 23:14:24 +02:00
"score": 0
2021-09-14 17:13:01 +02:00
},
{
"id": 406384562,
"name": "CVE-2021-40444",
"full_name": "js-on\/CVE-2021-40444",
"owner": {
"login": "js-on",
"id": 55274241,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55274241?v=4",
"html_url": "https:\/\/github.com\/js-on"
},
"html_url": "https:\/\/github.com\/js-on\/CVE-2021-40444",
"description": "partly working PoC, check lockedbytes PoC for full experience!",
"fork": false,
"created_at": "2021-09-14T13:45:36Z",
2021-12-15 19:14:01 +01:00
"updated_at": "2021-12-15T14:42:59Z",
2021-09-14 17:13:01 +02:00
"pushed_at": "2021-09-14T13:56:46Z",
2021-12-15 19:14:01 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2021-11-03 13:14:23 +01:00
"forks_count": 1,
2021-09-14 17:13:01 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-11-03 13:14:23 +01:00
"forks": 1,
2021-12-15 19:14:01 +01:00
"watchers": 1,
2021-09-14 17:13:01 +02:00
"score": 0
2021-09-14 23:12:52 +02:00
},
{
"id": 406457018,
"name": "CVE-2021-40444",
"full_name": "k8gege\/CVE-2021-40444",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-09-14T17:10:48Z",
2021-11-15 07:13:12 +01:00
"updated_at": "2021-11-15T04:16:33Z",
2021-09-14 23:12:52 +02:00
"pushed_at": "2021-09-14T17:19:26Z",
2021-11-15 07:13:12 +01:00
"stargazers_count": 18,
"watchers_count": 18,
"forks_count": 6,
2021-09-14 23:12:52 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-11-15 07:13:12 +01:00
"forks": 6,
"watchers": 18,
2021-09-14 23:12:52 +02:00
"score": 0
2021-09-16 11:14:12 +02:00
},
2021-09-18 23:12:34 +02:00
{
"id": 406513123,
"name": "MSHTML-CVE-2021-40444",
"full_name": "vanhohen\/MSHTML-CVE-2021-40444",
"owner": {
"login": "vanhohen",
"id": 13157446,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13157446?v=4",
"html_url": "https:\/\/github.com\/vanhohen"
},
"html_url": "https:\/\/github.com\/vanhohen\/MSHTML-CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-09-14T20:32:28Z",
"updated_at": "2021-09-18T19:46:25Z",
"pushed_at": "2021-09-16T17:53:29Z",
"stargazers_count": 0,
"watchers_count": 0,
2021-10-15 17:14:24 +02:00
"forks_count": 1,
2021-09-18 23:12:34 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-15 17:14:24 +02:00
"forks": 1,
2021-09-18 23:12:34 +02:00
"watchers": 0,
"score": 0
},
2021-09-16 11:14:12 +02:00
{
"id": 406942491,
"name": "CVE-2021-40444",
"full_name": "klezVirus\/CVE-2021-40444",
"owner": {
"login": "klezVirus",
"id": 8959898,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
"html_url": "https:\/\/github.com\/klezVirus"
},
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
"fork": false,
"created_at": "2021-09-15T22:34:35Z",
2021-12-27 19:14:15 +01:00
"updated_at": "2021-12-27T13:00:11Z",
2021-10-13 05:13:01 +02:00
"pushed_at": "2021-10-12T23:05:07Z",
2021-12-27 19:14:15 +01:00
"stargazers_count": 541,
"watchers_count": 541,
2021-12-27 07:13:34 +01:00
"forks_count": 122,
2021-09-16 11:14:12 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"0day",
"cve-2021-40444",
"msword",
"office",
"rce",
"remote-code-execution"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-12-27 07:13:34 +01:00
"forks": 122,
2021-12-27 19:14:15 +01:00
"watchers": 541,
2021-09-16 17:13:06 +02:00
"score": 0
},
{
"id": 407116716,
"name": "CVE-2021-40444-CAB",
"full_name": "Udyz\/CVE-2021-40444-CAB",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-40444-CAB",
"description": "CVE-2021-40444 - Custom CAB templates from MakeCAB",
"fork": false,
"created_at": "2021-09-16T10:14:08Z",
2021-10-09 23:12:27 +02:00
"updated_at": "2021-10-09T17:56:16Z",
2021-09-16 17:13:06 +02:00
"pushed_at": "2021-09-16T10:20:10Z",
2021-10-09 23:12:27 +02:00
"stargazers_count": 9,
"watchers_count": 9,
2021-09-17 17:13:37 +02:00
"forks_count": 6,
2021-09-16 17:13:06 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-17 17:13:37 +02:00
"forks": 6,
2021-10-09 23:12:27 +02:00
"watchers": 9,
2021-09-16 23:13:07 +02:00
"score": 0
},
2021-09-28 05:13:30 +02:00
{
"id": 407245865,
"name": "CVE-2021-40444-URL-Extractor",
"full_name": "gh0stxplt\/CVE-2021-40444-URL-Extractor",
"owner": {
"login": "gh0stxplt",
"id": 87348587,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87348587?v=4",
"html_url": "https:\/\/github.com\/gh0stxplt"
},
"html_url": "https:\/\/github.com\/gh0stxplt\/CVE-2021-40444-URL-Extractor",
"description": "Python script to extract embedded URLs from doc files (.docx, .docm, .rtf)",
"fork": false,
"created_at": "2021-09-16T16:54:50Z",
"updated_at": "2021-09-20T19:01:48Z",
"pushed_at": "2021-09-20T19:01:46Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"cve-2021-40444",
"python"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-09-28 05:13:30 +02:00
"forks": 2,
"watchers": 1,
"score": 0
},
2021-09-19 23:12:36 +02:00
{
"id": 408221589,
"name": "CVE-2021-40444--CABless",
"full_name": "Edubr2020\/CVE-2021-40444--CABless",
"owner": {
"login": "Edubr2020",
"id": 60452468,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452468?v=4",
"html_url": "https:\/\/github.com\/Edubr2020"
},
"html_url": "https:\/\/github.com\/Edubr2020\/CVE-2021-40444--CABless",
"description": "Modified code so that we don´t need to rely on CAB archives",
"fork": false,
"created_at": "2021-09-19T19:46:28Z",
2021-12-24 01:13:46 +01:00
"updated_at": "2021-12-23T19:42:00Z",
2021-09-22 23:13:02 +02:00
"pushed_at": "2021-09-22T20:07:51Z",
2021-12-24 01:13:46 +01:00
"stargazers_count": 76,
"watchers_count": 76,
2021-12-27 19:14:15 +01:00
"forks_count": 19,
2021-09-19 23:12:36 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-12-27 19:14:15 +01:00
"forks": 19,
2021-12-24 01:13:46 +01:00
"watchers": 76,
2021-12-16 13:13:47 +01:00
"score": 0
},
{
"id": 409931314,
"name": "CVE-2021-40444_CAB_archives",
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
"owner": {
"login": "kal1gh0st",
"id": 56889513,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
"html_url": "https:\/\/github.com\/kal1gh0st"
},
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
"description": "CVE 2021 40444 Windows Exploit services.dll",
"fork": false,
"created_at": "2021-09-24T10:59:34Z",
"updated_at": "2021-12-15T00:43:34Z",
"pushed_at": "2021-10-21T09:46:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
2021-09-19 23:12:36 +02:00
"score": 0
2021-09-29 17:13:20 +02:00
},
{
"id": 411631202,
"name": "Docx-Exploit-2021",
"full_name": "LazarusReborn\/Docx-Exploit-2021",
"owner": {
"login": "LazarusReborn",
"id": 89079373,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89079373?v=4",
"html_url": "https:\/\/github.com\/LazarusReborn"
},
"html_url": "https:\/\/github.com\/LazarusReborn\/Docx-Exploit-2021",
"description": "This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444",
"fork": false,
"created_at": "2021-09-29T10:35:55Z",
2021-11-08 19:13:24 +01:00
"updated_at": "2021-11-08T17:41:50Z",
2021-09-29 17:13:20 +02:00
"pushed_at": "2021-09-29T10:45:43Z",
2021-11-08 19:13:24 +01:00
"stargazers_count": 2,
"watchers_count": 2,
2021-10-22 11:13:02 +02:00
"forks_count": 1,
2021-09-29 17:13:20 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"botnet",
"docx",
"exploit",
"payload",
"rat",
"rce"
],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-22 11:13:02 +02:00
"forks": 1,
2021-11-08 19:13:24 +01:00
"watchers": 2,
2021-09-29 17:13:20 +02:00
"score": 0
2021-10-03 05:13:09 +02:00
},
{
"id": 412946991,
"name": "CVE-2021-40444",
"full_name": "H0j3n\/CVE-2021-40444",
"owner": {
"login": "H0j3n",
"id": 51261763,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
"html_url": "https:\/\/github.com\/H0j3n"
},
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-03T01:13:42Z",
2021-11-10 19:13:30 +01:00
"updated_at": "2021-11-10T13:43:45Z",
2021-10-10 11:12:39 +02:00
"pushed_at": "2021-10-10T06:32:11Z",
2021-11-10 19:13:30 +01:00
"stargazers_count": 8,
"watchers_count": 8,
2021-10-10 05:12:36 +02:00
"forks_count": 2,
2021-10-03 05:13:09 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [
"cve-2021-40444"
],
2021-10-03 05:13:09 +02:00
"visibility": "public",
2021-10-10 05:12:36 +02:00
"forks": 2,
2021-11-10 19:13:30 +01:00
"watchers": 8,
2021-10-03 05:13:09 +02:00
"score": 0
2021-10-16 11:12:32 +02:00
},
{
"id": 417748789,
"name": "TIC4301_Project",
"full_name": "factionsypho\/TIC4301_Project",
"owner": {
"login": "factionsypho",
"id": 40175487,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4",
"html_url": "https:\/\/github.com\/factionsypho"
},
"html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project",
"description": "TIC4301 Project - CVE-2021-40444",
"fork": false,
"created_at": "2021-10-16T07:07:26Z",
2021-12-06 19:14:40 +01:00
"updated_at": "2021-12-06T13:36:02Z",
"pushed_at": "2021-12-06T13:35:59Z",
2021-10-16 11:12:32 +02:00
"stargazers_count": 0,
"watchers_count": 0,
2021-10-16 17:12:34 +02:00
"forks_count": 1,
2021-10-16 11:12:32 +02:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-10-16 17:12:34 +02:00
"forks": 1,
2021-10-16 11:12:32 +02:00
"watchers": 0,
"score": 0
2021-10-25 05:13:14 +02:00
},
{
"id": 420818304,
"name": "CVE-2021-40444",
"full_name": "TiagoSergio\/CVE-2021-40444",
"owner": {
"login": "TiagoSergio",
"id": 24528913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
"html_url": "https:\/\/github.com\/TiagoSergio"
},
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-10-24T23:17:12Z",
"updated_at": "2021-10-24T23:17:28Z",
"pushed_at": "2021-10-24T23:17:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-10-28 17:14:29 +02:00
},
{
"id": 422246280,
"name": "CVE-2021-40444-POC",
"full_name": "0xK4gura\/CVE-2021-40444-POC",
"owner": {
"login": "0xK4gura",
"id": 92495243,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
"html_url": "https:\/\/github.com\/0xK4gura"
},
"html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC",
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
"fork": false,
"created_at": "2021-10-28T14:55:46Z",
2021-12-18 19:13:47 +01:00
"updated_at": "2021-12-18T15:28:47Z",
2021-10-31 10:12:52 +01:00
"pushed_at": "2021-10-31T08:15:00Z",
2021-12-18 19:13:47 +01:00
"stargazers_count": 4,
"watchers_count": 4,
2021-10-28 17:14:29 +02:00
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
2021-12-18 19:13:47 +01:00
"watchers": 4,
2021-10-28 17:14:29 +02:00
"score": 0
2021-11-09 13:16:40 +01:00
},
{
"id": 425935080,
"name": "word_mshtml",
"full_name": "Zeop-CyberSec\/word_mshtml",
"owner": {
"login": "Zeop-CyberSec",
"id": 68154603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
},
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
"fork": false,
"created_at": "2021-11-08T17:38:30Z",
2021-12-12 01:13:11 +01:00
"updated_at": "2021-12-11T21:29:07Z",
2021-11-09 13:16:40 +01:00
"pushed_at": "2021-11-09T11:12:53Z",
2021-12-12 01:13:11 +01:00
"stargazers_count": 1,
"watchers_count": 1,
2021-11-09 19:13:29 +01:00
"forks_count": 1,
2021-11-09 13:16:40 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-11-09 19:13:29 +01:00
"forks": 1,
2021-12-12 01:13:11 +01:00
"watchers": 1,
2021-11-09 13:16:40 +01:00
"score": 0
2021-11-22 19:15:36 +01:00
},
{
"id": 430718153,
"name": "CVE-2021-40444",
"full_name": "Alexcot25051999\/CVE-2021-40444",
"owner": {
"login": "Alexcot25051999",
"id": 94846095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
"html_url": "https:\/\/github.com\/Alexcot25051999"
},
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
"description": null,
"fork": false,
"created_at": "2021-11-22T13:29:20Z",
"updated_at": "2021-11-22T13:41:39Z",
"pushed_at": "2021-11-22T13:41:36Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-11-25 07:13:08 +01:00
},
{
"id": 431721742,
"name": "CVE-2021-40444-exp",
"full_name": "lisinan988\/CVE-2021-40444-exp",
"owner": {
"login": "lisinan988",
"id": 87479262,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
"html_url": "https:\/\/github.com\/lisinan988"
},
"html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
"description": null,
"fork": false,
"created_at": "2021-11-25T05:13:05Z",
"updated_at": "2021-11-25T05:13:19Z",
"pushed_at": "2021-11-25T05:13:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
2021-12-19 13:13:54 +01:00
},
{
"id": 439810103,
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"owner": {
"login": "34zY",
"id": 55347142,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
"html_url": "https:\/\/github.com\/34zY"
},
"html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
"description": "CVE-2021-40444",
"fork": false,
"created_at": "2021-12-19T08:16:07Z",
2021-12-25 01:13:30 +01:00
"updated_at": "2021-12-24T21:33:26Z",
2021-12-19 13:13:54 +01:00
"pushed_at": "2021-12-19T08:27:33Z",
2021-12-25 01:13:30 +01:00
"stargazers_count": 31,
"watchers_count": 31,
2021-12-28 07:13:37 +01:00
"forks_count": 9,
2021-12-19 13:13:54 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2021-12-28 07:13:37 +01:00
"forks": 9,
2021-12-25 01:13:30 +01:00
"watchers": 31,
2021-12-19 13:13:54 +01:00
"score": 0
2021-09-08 11:12:39 +02:00
}
]