2019-12-08 14:19:20 +01:00
[
2021-01-07 04:10:04 +01:00
{
"id" : 88117490 ,
"name" : "CVE-2017-0199" ,
"full_name" : "ryhanson\/CVE-2017-0199" ,
"owner" : {
"login" : "ryhanson" ,
"id" : 3486433 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4" ,
"html_url" : "https:\/\/github.com\/ryhanson"
} ,
"html_url" : "https:\/\/github.com\/ryhanson\/CVE-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-04-13T02:41:36Z" ,
"updated_at" : "2017-04-13T02:41:36Z" ,
"pushed_at" : "2017-04-13T02:41:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 88185964 ,
"name" : "cve-2017-0199" ,
"full_name" : "SyFi\/cve-2017-0199" ,
"owner" : {
"login" : "SyFi" ,
"id" : 26314806 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4" ,
"html_url" : "https:\/\/github.com\/SyFi"
} ,
"html_url" : "https:\/\/github.com\/SyFi\/cve-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-04-13T16:40:27Z" ,
"updated_at" : "2019-12-06T00:55:16Z" ,
"pushed_at" : "2017-04-13T16:45:10Z" ,
"stargazers_count" : 12 ,
"watchers_count" : 12 ,
"forks_count" : 7 ,
"forks" : 7 ,
"watchers" : 12 ,
"score" : 0
} ,
{
"id" : 88486475 ,
"name" : "CVE-2017-0199" ,
"full_name" : "bhdresh\/CVE-2017-0199" ,
"owner" : {
"login" : "bhdresh" ,
"id" : 8931885 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4" ,
"html_url" : "https:\/\/github.com\/bhdresh"
} ,
"html_url" : "https:\/\/github.com\/bhdresh\/CVE-2017-0199" ,
"description" : "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration." ,
"fork" : false ,
"created_at" : "2017-04-17T08:10:07Z" ,
2021-01-10 10:09:54 +01:00
"updated_at" : "2021-01-10T04:10:28Z" ,
2021-01-07 04:10:04 +01:00
"pushed_at" : "2017-11-19T11:01:16Z" ,
2021-01-10 10:09:54 +01:00
"stargazers_count" : 639 ,
"watchers_count" : 639 ,
2021-01-07 04:10:04 +01:00
"forks_count" : 284 ,
"forks" : 284 ,
2021-01-10 10:09:54 +01:00
"watchers" : 639 ,
2021-01-07 04:10:04 +01:00
"score" : 0
} ,
{
"id" : 88590374 ,
"name" : "CVE-2017-0199-Fix" ,
"full_name" : "NotAwful\/CVE-2017-0199-Fix" ,
"owner" : {
"login" : "NotAwful" ,
"id" : 25178947 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4" ,
"html_url" : "https:\/\/github.com\/NotAwful"
} ,
"html_url" : "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix" ,
"description" : "Quick and dirty fix to OLE2 executing code via .hta" ,
"fork" : false ,
"created_at" : "2017-04-18T06:33:45Z" ,
"updated_at" : "2018-03-18T10:23:47Z" ,
"pushed_at" : "2017-04-24T20:48:36Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 14 ,
"score" : 0
} ,
{
"id" : 88700030 ,
"name" : "CVE-2017-0199-master" ,
"full_name" : "haibara3839\/CVE-2017-0199-master" ,
"owner" : {
"login" : "haibara3839" ,
"id" : 17246565 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4" ,
"html_url" : "https:\/\/github.com\/haibara3839"
} ,
"html_url" : "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master" ,
"description" : "CVE-2017-0199" ,
"fork" : false ,
"created_at" : "2017-04-19T04:15:54Z" ,
"updated_at" : "2020-08-13T13:59:18Z" ,
"pushed_at" : "2017-04-19T04:25:47Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
2021-01-12 04:10:06 +01:00
"forks_count" : 10 ,
"forks" : 10 ,
2021-01-07 04:10:04 +01:00
"watchers" : 16 ,
"score" : 0
} ,
{
"id" : 89043209 ,
"name" : "CVE-2017-0199" ,
"full_name" : "Exploit-install\/CVE-2017-0199" ,
"owner" : {
"login" : "Exploit-install" ,
"id" : 13824191 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4" ,
"html_url" : "https:\/\/github.com\/Exploit-install"
} ,
"html_url" : "https:\/\/github.com\/Exploit-install\/CVE-2017-0199" ,
"description" : "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration." ,
"fork" : false ,
"created_at" : "2017-04-22T04:01:38Z" ,
"updated_at" : "2020-04-07T06:30:43Z" ,
"pushed_at" : "2017-04-22T04:01:54Z" ,
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
"forks_count" : 11 ,
"forks" : 11 ,
"watchers" : 7 ,
"score" : 0
} ,
{
"id" : 89065031 ,
"name" : "PoC-CVE-2017-0199" ,
"full_name" : "zakybstrd21215\/PoC-CVE-2017-0199" ,
"owner" : {
"login" : "zakybstrd21215" ,
"id" : 22362343 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4" ,
"html_url" : "https:\/\/github.com\/zakybstrd21215"
} ,
"html_url" : "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199" ,
"description" : "Exploit toolkit for vulnerability RCE Microsoft RTF" ,
"fork" : false ,
"created_at" : "2017-04-22T11:32:39Z" ,
"updated_at" : "2019-02-02T15:31:28Z" ,
"pushed_at" : "2017-04-22T11:35:38Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 89145802 ,
"name" : "CVE-2017-0199" ,
"full_name" : "n1shant-sinha\/CVE-2017-0199" ,
"owner" : {
"login" : "n1shant-sinha" ,
"id" : 8848453 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4" ,
"html_url" : "https:\/\/github.com\/n1shant-sinha"
} ,
"html_url" : "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199" ,
"description" : "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration." ,
"fork" : false ,
"created_at" : "2017-04-23T13:58:30Z" ,
"updated_at" : "2018-10-18T14:32:17Z" ,
"pushed_at" : "2017-04-23T14:05:24Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 89296859 ,
"name" : "htattack" ,
"full_name" : "kn0wm4d\/htattack" ,
"owner" : {
"login" : "kn0wm4d" ,
"id" : 15344287 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4" ,
"html_url" : "https:\/\/github.com\/kn0wm4d"
} ,
"html_url" : "https:\/\/github.com\/kn0wm4d\/htattack" ,
"description" : "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)" ,
"fork" : false ,
"created_at" : "2017-04-24T23:44:31Z" ,
"updated_at" : "2020-08-29T04:54:33Z" ,
"pushed_at" : "2017-04-24T23:45:18Z" ,
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
"forks_count" : 3 ,
"forks" : 3 ,
"watchers" : 4 ,
"score" : 0
} ,
{
"id" : 89314149 ,
"name" : "Cve-2017-0199" ,
"full_name" : "joke998\/Cve-2017-0199" ,
"owner" : {
"login" : "joke998" ,
"id" : 25948923 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4" ,
"html_url" : "https:\/\/github.com\/joke998"
} ,
"html_url" : "https:\/\/github.com\/joke998\/Cve-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-04-25T03:38:15Z" ,
"updated_at" : "2017-04-25T03:38:15Z" ,
"pushed_at" : "2017-04-25T03:38:15Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 89314954 ,
"name" : "Cve-2017-0199-" ,
"full_name" : "joke998\/Cve-2017-0199-" ,
"owner" : {
"login" : "joke998" ,
"id" : 25948923 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4" ,
"html_url" : "https:\/\/github.com\/joke998"
} ,
"html_url" : "https:\/\/github.com\/joke998\/Cve-2017-0199-" ,
"description" : "Cve-2017-0199" ,
"fork" : false ,
"created_at" : "2017-04-25T03:48:53Z" ,
"updated_at" : "2017-04-25T03:48:53Z" ,
"pushed_at" : "2017-04-25T03:48:53Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 95870771 ,
"name" : "Microsoft-Word-CVE-2017-0199-" ,
"full_name" : "sUbc0ol\/Microsoft-Word-CVE-2017-0199-" ,
"owner" : {
"login" : "sUbc0ol" ,
"id" : 24601456 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4" ,
"html_url" : "https:\/\/github.com\/sUbc0ol"
} ,
"html_url" : "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-06-30T09:08:40Z" ,
"updated_at" : "2020-03-26T07:51:03Z" ,
"pushed_at" : "2017-06-30T09:11:27Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 104072875 ,
"name" : "CVE-2017-0199" ,
"full_name" : "viethdgit\/CVE-2017-0199" ,
"owner" : {
"login" : "viethdgit" ,
"id" : 24888568 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/24888568?v=4" ,
"html_url" : "https:\/\/github.com\/viethdgit"
} ,
"html_url" : "https:\/\/github.com\/viethdgit\/CVE-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-09-19T12:38:47Z" ,
"updated_at" : "2017-09-19T12:38:47Z" ,
"pushed_at" : "2017-09-19T12:47:49Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 109420190 ,
"name" : "RTF-Cleaner" ,
"full_name" : "nicpenning\/RTF-Cleaner" ,
"owner" : {
"login" : "nicpenning" ,
"id" : 5582679 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/5582679?v=4" ,
"html_url" : "https:\/\/github.com\/nicpenning"
} ,
"html_url" : "https:\/\/github.com\/nicpenning\/RTF-Cleaner" ,
"description" : "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically." ,
"fork" : false ,
"created_at" : "2017-11-03T16:47:16Z" ,
"updated_at" : "2019-06-29T16:49:45Z" ,
"pushed_at" : "2017-11-03T20:55:20Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 111145351 ,
"name" : "2017-11-17-Maldoc-Using-CVE-2017-0199" ,
"full_name" : "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199" ,
"owner" : {
"login" : "bloomer1016" ,
"id" : 12056770 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/12056770?v=4" ,
"html_url" : "https:\/\/github.com\/bloomer1016"
} ,
"html_url" : "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2017-11-17T20:00:29Z" ,
"updated_at" : "2020-03-29T03:29:38Z" ,
"pushed_at" : "2017-11-17T20:00:42Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 2 ,
"forks" : 2 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 113558617 ,
"name" : "RTF-Cleaner" ,
"full_name" : "jacobsoo\/RTF-Cleaner" ,
"owner" : {
"login" : "jacobsoo" ,
"id" : 3516693 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/3516693?v=4" ,
"html_url" : "https:\/\/github.com\/jacobsoo"
} ,
"html_url" : "https:\/\/github.com\/jacobsoo\/RTF-Cleaner" ,
"description" : "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759" ,
"fork" : false ,
"created_at" : "2017-12-08T09:45:25Z" ,
"updated_at" : "2018-02-21T04:37:47Z" ,
"pushed_at" : "2017-12-08T09:46:07Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 3 ,
"score" : 0
} ,
{
"id" : 126305253 ,
"name" : "CVE-2017-0199" ,
"full_name" : "likescam\/CVE-2017-0199" ,
"owner" : {
"login" : "likescam" ,
"id" : 2469038 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4" ,
"html_url" : "https:\/\/github.com\/likescam"
} ,
"html_url" : "https:\/\/github.com\/likescam\/CVE-2017-0199" ,
"description" : null ,
"fork" : false ,
"created_at" : "2018-03-22T08:40:55Z" ,
"updated_at" : "2018-03-22T08:41:14Z" ,
"pushed_at" : "2018-03-22T08:41:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2020-10-18 23:08:34 +02:00
{
"id" : 305189722 ,
"name" : "CVE-2017-0199-PY-KIT" ,
"full_name" : "stealth-ronin\/CVE-2017-0199-PY-KIT" ,
"owner" : {
"login" : "stealth-ronin" ,
"id" : 65579305 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/65579305?v=4" ,
"html_url" : "https:\/\/github.com\/stealth-ronin"
} ,
"html_url" : "https:\/\/github.com\/stealth-ronin\/CVE-2017-0199-PY-KIT" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-10-18T20:24:38Z" ,
"updated_at" : "2020-10-18T20:25:13Z" ,
"pushed_at" : "2020-10-18T20:25:11Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 14:19:20 +01:00
}
]