2019-12-08 22:19:20 +09:00
[
{
"id" : 138456315 ,
"name" : "WinboxPoC" ,
"full_name" : "BasuCert\/WinboxPoC" ,
"owner" : {
"login" : "BasuCert" ,
"id" : 29852431 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/BasuCert"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/BasuCert\/WinboxPoC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)" ,
"fork" : false ,
"created_at" : "2018-06-24T05:34:05Z" ,
2021-08-21 06:12:25 +09:00
"updated_at" : "2021-08-20T16:53:57Z" ,
2020-10-17 00:10:27 +09:00
"pushed_at" : "2020-10-16T12:09:45Z" ,
2021-08-21 06:12:25 +09:00
"stargazers_count" : 438 ,
"watchers_count" : 438 ,
2021-08-21 00:12:06 +09:00
"forks_count" : 416 ,
"forks" : 416 ,
2021-08-21 06:12:25 +09:00
"watchers" : 438 ,
2021-04-03 18:12:08 +09:00
"score" : 0
} ,
2021-06-16 12:11:19 +09:00
{
"id" : 161894724 ,
"name" : "CVE-2018-14847" ,
"full_name" : "jas502n\/CVE-2018-14847" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2018-14847" ,
"description" : "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞" ,
"fork" : false ,
"created_at" : "2018-12-15T10:38:26Z" ,
"updated_at" : "2021-05-21T16:37:17Z" ,
"pushed_at" : "2018-12-16T04:15:01Z" ,
"stargazers_count" : 18 ,
"watchers_count" : 18 ,
"forks_count" : 8 ,
"forks" : 8 ,
"watchers" : 18 ,
"score" : 0
} ,
2021-04-02 12:10:50 +09:00
{
"id" : 178807607 ,
"name" : "winboxPOC" ,
"full_name" : "th3f3n1x87\/winboxPOC" ,
"owner" : {
"login" : "th3f3n1x87" ,
"id" : 15888700 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4" ,
"html_url" : "https:\/\/github.com\/th3f3n1x87"
} ,
"html_url" : "https:\/\/github.com\/th3f3n1x87\/winboxPOC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) " ,
"fork" : false ,
"created_at" : "2019-04-01T07:20:23Z" ,
"updated_at" : "2020-03-24T14:07:22Z" ,
"pushed_at" : "2019-02-18T09:51:10Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 1 ,
"score" : 0
} ,
{
"id" : 188679903 ,
"name" : "mikrotik-beast" ,
"full_name" : "mahmoodsabir\/mikrotik-beast" ,
"owner" : {
"login" : "mahmoodsabir" ,
"id" : 47719250 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4" ,
"html_url" : "https:\/\/github.com\/mahmoodsabir"
} ,
"html_url" : "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast" ,
"description" : " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 " ,
"fork" : false ,
"created_at" : "2019-05-26T12:26:55Z" ,
"updated_at" : "2020-08-26T17:33:20Z" ,
"pushed_at" : "2019-05-26T13:06:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 2 ,
"score" : 0
} ,
2021-03-22 00:10:35 +09:00
{
"id" : 211658714 ,
"name" : "Python-MikrotikLoginExploit" ,
"full_name" : "sinichi449\/Python-MikrotikLoginExploit" ,
"owner" : {
"login" : "sinichi449" ,
"id" : 44680392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4" ,
"html_url" : "https:\/\/github.com\/sinichi449"
} ,
"html_url" : "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit" ,
"description" : "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script" ,
"fork" : false ,
"created_at" : "2019-09-29T12:21:16Z" ,
2021-08-09 06:13:09 +09:00
"updated_at" : "2021-08-08T20:13:14Z" ,
2021-03-22 00:10:35 +09:00
"pushed_at" : "2019-09-30T04:10:23Z" ,
2021-08-09 06:13:09 +09:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 10 ,
2021-03-22 00:10:35 +09:00
"score" : 0
} ,
2020-04-29 12:08:13 +09:00
{
"id" : 259795725 ,
"name" : "CVE-2018-14847" ,
"full_name" : "yukar1z0e\/CVE-2018-14847" ,
"owner" : {
"login" : "yukar1z0e" ,
"id" : 44317939 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4" ,
2020-04-29 12:08:13 +09:00
"html_url" : "https:\/\/github.com\/yukar1z0e"
} ,
"html_url" : "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-04-29T01:40:33Z" ,
2020-05-18 18:07:54 +09:00
"updated_at" : "2020-05-18T07:48:01Z" ,
"pushed_at" : "2020-05-18T07:47:58Z" ,
2020-04-29 12:08:13 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-06-09 00:08:09 +09:00
"forks_count" : 2 ,
"forks" : 2 ,
2020-04-29 12:08:13 +09:00
"watchers" : 0 ,
"score" : 0
2021-04-22 06:11:18 +09:00
} ,
{
"id" : 360240266 ,
"name" : "Mikrotik-router-hack" ,
"full_name" : "hacker30468\/Mikrotik-router-hack" ,
"owner" : {
"login" : "hacker30468" ,
"id" : 82890072 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4" ,
"html_url" : "https:\/\/github.com\/hacker30468"
} ,
"html_url" : "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack" ,
"description" : "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead." ,
"fork" : false ,
"created_at" : "2021-04-21T16:42:31Z" ,
"updated_at" : "2021-04-21T16:46:39Z" ,
"pushed_at" : "2021-04-21T16:46:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2019-12-08 22:19:20 +09:00
}
]