PoC-in-GitHub/2021/CVE-2021-1675.json

491 lines
16 KiB
JSON
Raw Normal View History

2021-06-30 00:12:46 +09:00
[
{
"id": 381392691,
"name": "CVE-2021-1675",
"full_name": "yu2u\/CVE-2021-1675",
"owner": {
"login": "yu2u",
"id": 25322880,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4",
"html_url": "https:\/\/github.com\/yu2u"
},
"html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675",
"description": "CVE-2021-1675 exploit",
"fork": false,
"created_at": "2021-06-29T14:24:30Z",
2021-09-15 12:12:50 +09:00
"updated_at": "2021-09-15T02:02:40Z",
2021-06-30 00:12:46 +09:00
"pushed_at": "2021-06-29T14:26:25Z",
2021-09-15 12:12:50 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2021-07-01 00:11:40 +09:00
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-07-01 00:11:40 +09:00
"forks": 1,
2021-09-15 12:12:50 +09:00
"watchers": 2,
2021-06-30 00:12:46 +09:00
"score": 0
2021-06-30 06:12:38 +09:00
},
{
"id": 381444656,
"name": "CVE-2021-1675",
"full_name": "cube0x0\/CVE-2021-1675",
"owner": {
"login": "cube0x0",
"id": 39370848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
"html_url": "https:\/\/github.com\/cube0x0"
},
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
2021-07-04 00:11:25 +09:00
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
2021-06-30 06:12:38 +09:00
"fork": false,
"created_at": "2021-06-29T17:24:14Z",
2021-12-23 03:13:49 +09:00
"updated_at": "2021-12-22T12:59:48Z",
2021-07-21 06:11:48 +09:00
"pushed_at": "2021-07-20T15:28:13Z",
2021-12-23 03:13:49 +09:00
"stargazers_count": 1480,
"watchers_count": 1480,
2021-12-21 09:13:52 +09:00
"forks_count": 543,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-12-21 09:13:52 +09:00
"forks": 543,
2021-12-23 03:13:49 +09:00
"watchers": 1480,
2021-07-01 06:11:27 +09:00
"score": 0
},
{
"id": 381799016,
"name": "CVE-2021-1675",
"full_name": "LaresLLC\/CVE-2021-1675",
"owner": {
"login": "LaresLLC",
"id": 63059624,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4",
"html_url": "https:\/\/github.com\/LaresLLC"
},
"html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675",
"description": "CVE-2021-1675 Detection Info",
"fork": false,
"created_at": "2021-06-30T18:32:17Z",
2021-12-16 03:14:01 +09:00
"updated_at": "2021-12-15T14:42:26Z",
2021-07-08 06:11:42 +09:00
"pushed_at": "2021-07-07T15:43:05Z",
2021-12-16 03:14:01 +09:00
"stargazers_count": 214,
"watchers_count": 214,
2021-08-09 18:14:23 +09:00
"forks_count": 34,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-08-09 18:14:23 +09:00
"forks": 34,
2021-12-16 03:14:01 +09:00
"watchers": 214,
2021-07-01 12:11:28 +09:00
"score": 0
},
{
"id": 381858715,
"name": "patch-cve-2021-1675",
"full_name": "kondah\/patch-cve-2021-1675",
"owner": {
"login": "kondah",
"id": 7760108,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4",
"html_url": "https:\/\/github.com\/kondah"
},
"html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-06-30T23:39:21Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T04:47:24Z",
2021-07-01 12:11:28 +09:00
"pushed_at": "2021-06-30T23:40:44Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 2,
"watchers": 4,
2021-07-01 18:11:50 +09:00
"score": 0
},
2021-07-02 00:11:43 +09:00
{
"id": 382024474,
"name": "CVE-2021-1675",
"full_name": "puckiestyle\/CVE-2021-1675",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-01T12:24:19Z",
2021-11-01 06:12:49 +09:00
"updated_at": "2021-10-31T15:29:24Z",
"pushed_at": "2021-10-31T15:29:21Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 5,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 5,
"watchers": 2,
2021-07-02 00:11:43 +09:00
"score": 0
},
2021-10-07 00:13:09 +09:00
{
"id": 382407157,
"name": "CVE-2021-1675",
"full_name": "corelight\/CVE-2021-1675",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-02T16:44:24Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T04:58:16Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-09T14:17:40Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 3,
"watchers": 6,
2021-10-07 00:13:09 +09:00
"score": 0
},
{
"id": 383728669,
"name": "PrintNightmare",
"full_name": "JumpsecLabs\/PrintNightmare",
"owner": {
"login": "JumpsecLabs",
"id": 49488209,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49488209?v=4",
"html_url": "https:\/\/github.com\/JumpsecLabs"
},
"html_url": "https:\/\/github.com\/JumpsecLabs\/PrintNightmare",
"description": "Information on the Windows Spooler vulnerability - CVE-2021-1675; CVE 2021 34527",
"fork": false,
"created_at": "2021-07-07T08:32:09Z",
2021-12-16 03:14:01 +09:00
"updated_at": "2021-12-15T14:42:29Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-12T09:28:16Z",
2021-12-16 03:14:01 +09:00
"stargazers_count": 19,
"watchers_count": 19,
2021-10-24 18:12:45 +09:00
"forks_count": 9,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 9,
2021-12-16 03:14:01 +09:00
"watchers": 19,
2021-10-07 00:13:09 +09:00
"score": 0
},
{
"id": 384854320,
"name": "cve-2021-1675",
"full_name": "k8gege\/cve-2021-1675",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege"
},
"html_url": "https:\/\/github.com\/k8gege\/cve-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-11T03:48:25Z",
2021-11-14 21:13:01 +09:00
"updated_at": "2021-11-14T07:52:13Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-11T03:49:44Z",
2021-11-14 21:13:01 +09:00
"stargazers_count": 17,
"watchers_count": 17,
2021-10-24 18:12:45 +09:00
"forks_count": 3,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 3,
2021-11-14 21:13:01 +09:00
"watchers": 17,
2021-10-07 00:13:09 +09:00
"score": 0
},
{
"id": 385174791,
"name": "PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"full_name": "galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"owner": {
"login": "galoget",
"id": 8353133,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8353133?v=4",
"html_url": "https:\/\/github.com\/galoget"
},
"html_url": "https:\/\/github.com\/galoget\/PrintNightmare-CVE-2021-1675-CVE-2021-34527",
"description": "CVE-2021-1675 \/ CVE-2021-34527 - PrintNightmare Python, C# and PowerShell Exploits Implementations (LPE & RCE)",
"fork": false,
"created_at": "2021-07-12T08:18:40Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T06:07:00Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-12T08:35:30Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 2,
"watchers": 1,
2021-10-07 00:13:09 +09:00
"score": 0
},
{
"id": 386724774,
"name": "Microsoft-CVE-2021-1675",
"full_name": "thalpius\/Microsoft-CVE-2021-1675",
"owner": {
"login": "thalpius",
"id": 49958238,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49958238?v=4",
"html_url": "https:\/\/github.com\/thalpius"
},
"html_url": "https:\/\/github.com\/thalpius\/Microsoft-CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-16T18:06:05Z",
2021-12-08 09:13:26 +09:00
"updated_at": "2021-12-07T19:27:01Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-18T14:03:05Z",
2021-12-08 09:13:26 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2021-12-07 21:13:44 +09:00
"forks_count": 0,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-12-07 21:13:44 +09:00
"forks": 0,
2021-12-08 09:13:26 +09:00
"watchers": 1,
2021-12-07 21:13:44 +09:00
"score": 0
},
{
"id": 387202198,
"name": "Microsoft-CVE-2021-1675",
"full_name": "zha0\/Microsoft-CVE-2021-1675",
"owner": {
"login": "zha0",
"id": 5314165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5314165?v=4",
"html_url": "https:\/\/github.com\/zha0"
},
"html_url": "https:\/\/github.com\/zha0\/Microsoft-CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-18T15:00:27Z",
"updated_at": "2021-12-07T10:08:12Z",
"pushed_at": "2021-07-18T14:03:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
2021-10-07 00:13:09 +09:00
"score": 0
},
{
"id": 387694592,
"name": "CVE-2021-1675",
"full_name": "Winter3un\/CVE-2021-1675",
"owner": {
"login": "Winter3un",
"id": 12570968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12570968?v=4",
"html_url": "https:\/\/github.com\/Winter3un"
},
"html_url": "https:\/\/github.com\/Winter3un\/CVE-2021-1675",
"description": null,
"fork": false,
"created_at": "2021-07-20T06:26:45Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T06:07:21Z",
2021-10-07 00:13:09 +09:00
"pushed_at": "2021-07-20T06:46:12Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
2021-10-07 00:13:09 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-07 00:13:09 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 1,
"watchers": 2,
2021-10-07 00:13:09 +09:00
"score": 0
},
2021-07-23 00:11:59 +09:00
{
"id": 388427598,
"name": "my-CVE-2021-1675",
"full_name": "hahaleyile\/my-CVE-2021-1675",
"owner": {
"login": "hahaleyile",
"id": 38727644,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4",
"html_url": "https:\/\/github.com\/hahaleyile"
},
"html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675",
"description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675",
"fork": false,
"created_at": "2021-07-22T10:49:30Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T06:07:33Z",
2021-08-14 00:12:01 +09:00
"pushed_at": "2021-08-13T15:15:05Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-24 18:12:45 +09:00
"forks": 1,
"watchers": 2,
2021-07-23 00:11:59 +09:00
"score": 0
2021-09-02 00:13:14 +09:00
},
{
"id": 402035048,
"name": "CVE-2021-1675_RDL_LPE",
"full_name": "mstxq17\/CVE-2021-1675_RDL_LPE",
"owner": {
"login": "mstxq17",
"id": 29624427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
"html_url": "https:\/\/github.com\/mstxq17"
},
"html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE",
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
"fork": false,
"created_at": "2021-09-01T11:25:04Z",
2021-12-16 03:14:01 +09:00
"updated_at": "2021-12-15T14:42:53Z",
2021-09-02 00:13:14 +09:00
"pushed_at": "2021-09-01T11:25:22Z",
2021-12-16 03:14:01 +09:00
"stargazers_count": 105,
"watchers_count": 105,
2021-12-08 03:15:07 +09:00
"forks_count": 18,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-12-08 03:15:07 +09:00
"forks": 18,
2021-12-16 03:14:01 +09:00
"watchers": 105,
2021-09-02 00:13:14 +09:00
"score": 0
2021-09-13 00:14:32 +09:00
},
{
2021-09-27 00:12:53 +09:00
"id": 410565318,
2021-09-13 00:14:32 +09:00
"name": "PrintNightmare",
2021-10-18 00:12:49 +09:00
"full_name": "ly4k\/PrintNightmare",
2021-09-13 00:14:32 +09:00
"owner": {
2021-10-18 00:12:49 +09:00
"login": "ly4k",
2021-09-27 00:12:53 +09:00
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
2021-10-18 00:12:49 +09:00
"html_url": "https:\/\/github.com\/ly4k"
2021-09-13 00:14:32 +09:00
},
2021-10-18 00:12:49 +09:00
"html_url": "https:\/\/github.com\/ly4k\/PrintNightmare",
2021-09-27 00:12:53 +09:00
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
2021-09-13 00:14:32 +09:00
"fork": false,
2021-09-27 00:12:53 +09:00
"created_at": "2021-09-26T13:53:10Z",
2021-12-16 03:14:01 +09:00
"updated_at": "2021-12-15T14:43:03Z",
2021-10-18 00:12:49 +09:00
"pushed_at": "2021-10-17T13:29:56Z",
2021-12-16 03:14:01 +09:00
"stargazers_count": 93,
"watchers_count": 93,
2021-10-25 12:13:14 +09:00
"forks_count": 16,
2021-09-14 06:12:57 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
2021-10-15 12:12:58 +09:00
"topics": [
"cve-2021-1675",
"cve-2021-34527"
],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-10-25 12:13:14 +09:00
"forks": 16,
2021-12-16 03:14:01 +09:00
"watchers": 93,
2021-09-27 12:16:43 +09:00
"score": 0
},
{
"id": 410658843,
"name": "SharpPN",
"full_name": "Wra7h\/SharpPN",
"owner": {
"login": "Wra7h",
"id": 60988551,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4",
"html_url": "https:\/\/github.com\/Wra7h"
},
"html_url": "https:\/\/github.com\/Wra7h\/SharpPN",
"description": "C# PrintNightmare (CVE-2021-1675)",
"fork": false,
"created_at": "2021-09-26T20:46:23Z",
2021-12-16 03:14:01 +09:00
"updated_at": "2021-12-15T14:43:04Z",
2021-09-27 12:16:43 +09:00
"pushed_at": "2021-09-26T22:35:07Z",
2021-12-16 03:14:01 +09:00
"stargazers_count": 3,
"watchers_count": 3,
2021-11-24 03:14:38 +09:00
"forks_count": 3,
2021-09-27 12:16:43 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-02 06:13:10 +09:00
"visibility": "public",
2021-11-24 03:14:38 +09:00
"forks": 3,
2021-12-16 03:14:01 +09:00
"watchers": 3,
2021-09-13 00:14:32 +09:00
"score": 0
2021-10-06 06:14:32 +09:00
},
{
"id": 413951914,
"name": "CVE-2021-1675-PrintNightmare",
"full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
"owner": {
"login": "OppressionBreedsResistance",
"id": 60150959,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4",
"html_url": "https:\/\/github.com\/OppressionBreedsResistance"
},
"html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
"description": "Working PowerShell POC",
"fork": false,
"created_at": "2021-10-05T19:24:23Z",
2021-10-24 18:12:45 +09:00
"updated_at": "2021-10-24T06:08:06Z",
2021-10-07 06:13:51 +09:00
"pushed_at": "2021-10-06T21:04:44Z",
2021-10-24 18:12:45 +09:00
"stargazers_count": 2,
"watchers_count": 2,
2021-11-23 21:13:15 +09:00
"forks_count": 3,
2021-10-06 06:14:32 +09:00
"allow_forking": true,
2021-10-07 06:13:51 +09:00
"is_template": false,
"topics": [],
2021-10-06 06:14:32 +09:00
"visibility": "public",
2021-11-23 21:13:15 +09:00
"forks": 3,
2021-10-24 18:12:45 +09:00
"watchers": 2,
2021-10-06 06:14:32 +09:00
"score": 0
2021-12-06 03:13:07 +09:00
},
{
"id": 435194981,
"name": "NimNightmare",
"full_name": "fumamatar\/NimNightmare",
"owner": {
"login": "fumamatar",
"id": 51821028,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51821028?v=4",
"html_url": "https:\/\/github.com\/fumamatar"
},
"html_url": "https:\/\/github.com\/fumamatar\/NimNightmare",
"description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
"fork": false,
"created_at": "2021-12-05T14:49:32Z",
2021-12-11 09:13:08 +09:00
"updated_at": "2021-12-10T19:36:21Z",
2021-12-06 03:13:07 +09:00
"pushed_at": "2021-12-05T14:51:28Z",
2021-12-11 09:13:08 +09:00
"stargazers_count": 12,
"watchers_count": 12,
2021-12-06 03:13:07 +09:00
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
2021-12-11 09:13:08 +09:00
"watchers": 12,
2021-12-06 03:13:07 +09:00
"score": 0
2021-06-30 00:12:46 +09:00
}
]