PoC-in-GitHub/2021/CVE-2021-1732.json

218 lines
7.3 KiB
JSON
Raw Normal View History

2021-03-05 04:09:17 +01:00
[
2021-09-05 11:12:18 +02:00
{
"id": 344667460,
"name": "CVE-2021-1732-Exploit",
"full_name": "KaLendsi\/CVE-2021-1732-Exploit",
"owner": {
"login": "KaLendsi",
"id": 68001644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68001644?v=4",
"html_url": "https:\/\/github.com\/KaLendsi"
},
"html_url": "https:\/\/github.com\/KaLendsi\/CVE-2021-1732-Exploit",
"description": "CVE-2021-1732 Exploit",
"fork": false,
"created_at": "2021-03-05T02:11:10Z",
2022-02-08 19:16:26 +01:00
"updated_at": "2022-02-08T14:47:58Z",
2021-09-05 11:12:18 +02:00
"pushed_at": "2021-03-05T03:10:26Z",
2022-02-08 19:16:26 +01:00
"stargazers_count": 363,
"watchers_count": 363,
2022-02-14 13:14:41 +01:00
"forks_count": 104,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-02-14 13:14:41 +01:00
"forks": 104,
2022-02-08 19:16:26 +01:00
"watchers": 363,
2021-09-05 11:12:18 +02:00
"score": 0
},
{
"id": 345537174,
"name": "CVE-2021-1732",
"full_name": "k-k-k-k-k\/CVE-2021-1732",
"owner": {
"login": "k-k-k-k-k",
"id": 36893648,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36893648?v=4",
"html_url": "https:\/\/github.com\/k-k-k-k-k"
},
"html_url": "https:\/\/github.com\/k-k-k-k-k\/CVE-2021-1732",
"description": "CVE-­2021­-1732 Microsoft Windows 10 本地提权漏 研究及Poc\/Exploit开发",
"fork": false,
"created_at": "2021-03-08T05:07:15Z",
2022-02-15 13:14:26 +01:00
"updated_at": "2022-02-15T10:55:51Z",
2021-09-05 11:12:18 +02:00
"pushed_at": "2021-03-08T11:41:19Z",
2022-02-15 13:14:26 +01:00
"stargazers_count": 61,
"watchers_count": 61,
2022-01-13 13:15:45 +01:00
"forks_count": 24,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-13 13:15:45 +01:00
"forks": 24,
2022-02-15 13:14:26 +01:00
"watchers": 61,
2021-09-05 11:12:18 +02:00
"score": 0
},
{
"id": 345855407,
"name": "CVE-2021-1732-Exploit",
"full_name": "oneoy\/CVE-2021-1732-Exploit",
"owner": {
"login": "oneoy",
"id": 38435398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38435398?v=4",
"html_url": "https:\/\/github.com\/oneoy"
},
"html_url": "https:\/\/github.com\/oneoy\/CVE-2021-1732-Exploit",
"description": null,
"fork": false,
"created_at": "2021-03-09T02:13:43Z",
2021-10-24 11:12:45 +02:00
"updated_at": "2021-10-24T05:17:01Z",
2021-09-05 11:12:18 +02:00
"pushed_at": "2021-03-09T02:13:51Z",
2021-10-24 11:12:45 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2022-01-01 01:13:35 +01:00
"forks_count": 6,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-01 01:13:35 +01:00
"forks": 6,
2021-10-24 11:12:45 +02:00
"watchers": 1,
2021-09-05 11:12:18 +02:00
"score": 0
},
{
"id": 353872268,
"name": "CVE-2021-1732_exp",
"full_name": "linuxdy\/CVE-2021-1732_exp",
"owner": {
"login": "linuxdy",
"id": 50064309,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50064309?v=4",
"html_url": "https:\/\/github.com\/linuxdy"
},
"html_url": "https:\/\/github.com\/linuxdy\/CVE-2021-1732_exp",
"description": null,
"fork": false,
"created_at": "2021-04-02T01:35:41Z",
2021-12-18 13:14:42 +01:00
"updated_at": "2021-12-18T11:55:36Z",
2021-09-05 11:12:18 +02:00
"pushed_at": "2021-03-30T08:32:03Z",
2021-12-18 13:14:42 +01:00
"stargazers_count": 3,
"watchers_count": 3,
2022-02-09 13:18:49 +01:00
"forks_count": 4,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-02-09 13:18:49 +01:00
"forks": 4,
2021-12-18 13:14:42 +01:00
"watchers": 3,
2021-09-05 11:12:18 +02:00
"score": 0
},
2021-04-23 11:11:23 +02:00
{
"id": 360813608,
"name": "CVE-2021-1732",
"full_name": "Pai-Po\/CVE-2021-1732",
"owner": {
"login": "Pai-Po",
"id": 12437819,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12437819?v=4",
"html_url": "https:\/\/github.com\/Pai-Po"
},
"html_url": "https:\/\/github.com\/Pai-Po\/CVE-2021-1732",
"description": "CVE-2021-1732 poc & exp; tested on 20H2",
"fork": false,
"created_at": "2021-04-23T08:21:54Z",
2022-01-22 19:16:20 +01:00
"updated_at": "2022-01-22T15:29:29Z",
2021-04-23 11:11:23 +02:00
"pushed_at": "2021-04-23T08:28:53Z",
2022-01-22 19:16:20 +01:00
"stargazers_count": 59,
"watchers_count": 59,
2022-01-21 07:14:38 +01:00
"forks_count": 14,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-01-21 07:14:38 +01:00
"forks": 14,
2022-01-22 19:16:20 +01:00
"watchers": 59,
2021-04-25 17:10:56 +02:00
"score": 0
},
{
"id": 361428612,
"name": "Windows-Privilege-Escalation-CVE-2021-1732",
"full_name": "exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/Windows-Privilege-Escalation-CVE-2021-1732",
"description": "Read my blog for more info - ",
"fork": false,
"created_at": "2021-04-25T12:55:15Z",
2022-02-15 01:14:34 +01:00
"updated_at": "2022-02-14T22:11:02Z",
2021-04-27 23:11:10 +02:00
"pushed_at": "2021-04-27T21:13:18Z",
2022-02-15 01:14:34 +01:00
"stargazers_count": 17,
"watchers_count": 17,
2022-02-09 13:18:49 +01:00
"forks_count": 10,
2021-09-13 23:12:57 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2022-02-09 13:18:49 +01:00
"forks": 10,
2022-02-15 01:14:34 +01:00
"watchers": 17,
2021-04-23 11:11:23 +02:00
"score": 0
2021-09-24 05:12:52 +02:00
},
{
"id": 409794385,
"name": "CVE-2021-1732",
"full_name": "BeneficialCode\/CVE-2021-1732",
"owner": {
"login": "BeneficialCode",
"id": 40847073,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40847073?v=4",
"html_url": "https:\/\/github.com\/BeneficialCode"
},
"html_url": "https:\/\/github.com\/BeneficialCode\/CVE-2021-1732",
"description": null,
"fork": false,
"created_at": "2021-09-24T01:28:58Z",
2021-11-08 07:13:10 +01:00
"updated_at": "2021-11-08T01:36:42Z",
"pushed_at": "2021-11-08T01:36:39Z",
2021-10-24 11:12:45 +02:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
2021-09-24 05:12:52 +02:00
"allow_forking": true,
2021-10-06 23:13:51 +02:00
"is_template": false,
"topics": [],
2021-10-01 23:13:10 +02:00
"visibility": "public",
2021-10-24 11:12:45 +02:00
"forks": 1,
"watchers": 1,
2021-09-24 05:12:52 +02:00
"score": 0
2022-01-23 19:14:01 +01:00
},
{
"id": 451100080,
"name": "CVE-2021-1732-EXP-",
"full_name": "ExploitCN\/CVE-2021-1732-EXP-",
"owner": {
"login": "ExploitCN",
"id": 98264245,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98264245?v=4",
"html_url": "https:\/\/github.com\/ExploitCN"
},
"html_url": "https:\/\/github.com\/ExploitCN\/CVE-2021-1732-EXP-",
"description": "对1909下windows版本的EXP进行分析并对代码添加调试和注释",
"fork": false,
"created_at": "2022-01-23T12:40:01Z",
"updated_at": "2022-01-23T12:43:36Z",
"pushed_at": "2022-01-23T12:43:33Z",
"stargazers_count": 0,
"watchers_count": 0,
2022-01-24 07:14:23 +01:00
"forks_count": 1,
2022-01-23 19:14:01 +01:00
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
2022-01-24 07:14:23 +01:00
"forks": 1,
2022-01-23 19:14:01 +01:00
"watchers": 0,
"score": 0
2021-03-05 04:09:17 +01:00
}
]