PoC-in-GitHub/2020/CVE-2020-1350.json

370 lines
13 KiB
JSON
Raw Normal View History

2020-07-14 23:08:44 +02:00
[
2020-07-18 05:08:36 +02:00
{
"id": 246641886,
"name": "NSE-scripts",
"full_name": "pr4jwal\/NSE-scripts",
"owner": {
"login": "pr4jwal",
"id": 4672886,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/pr4jwal"
},
"html_url": "https:\/\/github.com\/pr4jwal\/NSE-scripts",
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
2020-07-20 17:08:55 +02:00
"updated_at": "2020-07-20T10:11:22Z",
2020-07-18 05:08:36 +02:00
"pushed_at": "2020-07-17T20:58:16Z",
2020-07-20 17:08:55 +02:00
"stargazers_count": 30,
"watchers_count": 30,
2020-07-18 05:08:36 +02:00
"forks_count": 7,
"forks": 7,
2020-07-20 17:08:55 +02:00
"watchers": 30,
2020-07-18 05:08:36 +02:00
"score": 0
},
2020-07-14 23:08:44 +02:00
{
"id": 279670211,
"name": "CVE-2020-1350",
"full_name": "ZephrFish\/CVE-2020-1350",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350",
2020-07-16 05:08:22 +02:00
"description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
2020-07-14 23:08:44 +02:00
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
2020-07-24 17:08:35 +02:00
"updated_at": "2020-07-24T11:27:06Z",
2020-07-20 23:10:34 +02:00
"pushed_at": "2020-07-20T17:54:16Z",
2020-07-24 17:08:35 +02:00
"stargazers_count": 196,
"watchers_count": 196,
"forks_count": 66,
"forks": 66,
"watchers": 196,
2020-07-14 23:08:44 +02:00
"score": 0
},
{
"id": 279675165,
"name": "CVE-2020-1350",
"full_name": "mr-r3b00t\/CVE-2020-1350",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
"description": null,
"fork": false,
"created_at": "2020-07-14T19:28:46Z",
2020-07-20 11:08:33 +02:00
"updated_at": "2020-07-20T06:15:59Z",
"pushed_at": "2020-07-20T06:15:56Z",
2020-07-16 17:08:28 +02:00
"stargazers_count": 5,
"watchers_count": 5,
2020-07-16 11:08:29 +02:00
"forks_count": 5,
"forks": 5,
2020-07-16 17:08:28 +02:00
"watchers": 5,
2020-07-14 23:08:44 +02:00
"score": 0
},
2020-07-18 05:08:36 +02:00
{
"id": 279701266,
"name": "Fake_CVE-2020-1350",
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
"owner": {
"login": "zoomerxsec",
"id": 56858864,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56858864?v=4",
"html_url": "https:\/\/github.com\/zoomerxsec"
},
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
2020-07-21 11:09:44 +02:00
"updated_at": "2020-07-21T07:03:15Z",
2020-07-19 05:09:40 +02:00
"pushed_at": "2020-07-19T02:29:33Z",
2020-07-21 11:09:44 +02:00
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
2020-07-18 05:08:36 +02:00
"score": 0
},
2020-07-14 23:08:44 +02:00
{
2020-07-15 05:09:40 +02:00
"id": 279708493,
"name": "cve-2020-1350",
"full_name": "tinkersec\/cve-2020-1350",
2020-07-14 23:08:44 +02:00
"owner": {
2020-07-15 05:09:40 +02:00
"login": "tinkersec",
"id": 35904426,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35904426?v=4",
"html_url": "https:\/\/github.com\/tinkersec"
2020-07-14 23:08:44 +02:00
},
2020-07-15 05:09:40 +02:00
"html_url": "https:\/\/github.com\/tinkersec\/cve-2020-1350",
"description": "Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.",
2020-07-14 23:08:44 +02:00
"fork": false,
2020-07-15 05:09:40 +02:00
"created_at": "2020-07-14T22:45:48Z",
2020-07-24 11:08:52 +02:00
"updated_at": "2020-07-24T07:47:26Z",
2020-07-15 17:08:32 +02:00
"pushed_at": "2020-07-15T13:53:24Z",
2020-07-24 11:08:52 +02:00
"stargazers_count": 56,
"watchers_count": 56,
2020-07-20 11:08:33 +02:00
"forks_count": 19,
"forks": 19,
2020-07-24 11:08:52 +02:00
"watchers": 56,
2020-07-15 11:11:05 +02:00
"score": 0
},
{
"id": 279776271,
"name": "CVE-2020-1350",
"full_name": "T13nn3s\/CVE-2020-1350",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false,
"created_at": "2020-07-15T05:46:31Z",
2020-07-22 17:08:40 +02:00
"updated_at": "2020-07-22T14:11:50Z",
2020-07-18 11:08:23 +02:00
"pushed_at": "2020-07-18T06:38:11Z",
2020-07-22 17:08:40 +02:00
"stargazers_count": 10,
"watchers_count": 10,
2020-07-23 17:13:08 +02:00
"forks_count": 9,
"forks": 9,
2020-07-22 17:08:40 +02:00
"watchers": 10,
2020-07-14 23:08:44 +02:00
"score": 0
2020-07-15 23:08:40 +02:00
},
2020-07-16 05:08:22 +02:00
{
"id": 279778118,
"name": "SIGRed",
"full_name": "corelight\/SIGRed",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
2020-07-22 11:08:40 +02:00
"updated_at": "2020-07-22T07:04:21Z",
2020-07-20 05:08:27 +02:00
"pushed_at": "2020-07-20T02:20:43Z",
2020-07-22 11:08:40 +02:00
"stargazers_count": 6,
"watchers_count": 6,
2020-07-16 23:08:17 +02:00
"forks_count": 1,
"forks": 1,
2020-07-22 11:08:40 +02:00
"watchers": 6,
2020-07-16 05:08:22 +02:00
"score": 0
},
2020-07-15 23:08:40 +02:00
{
"id": 279961698,
"name": "dRMM-CVE-2020-1350-response",
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
"owner": {
"login": "jmaddington",
"id": 2353597,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2353597?v=4",
"html_url": "https:\/\/github.com\/jmaddington"
},
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
"description": "Windows registry mitigation response to CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T19:43:39Z",
"updated_at": "2020-07-15T19:59:04Z",
"pushed_at": "2020-07-15T19:59:02Z",
"stargazers_count": 0,
"watchers_count": 0,
2020-07-16 23:08:17 +02:00
"forks_count": 1,
"forks": 1,
2020-07-15 23:08:40 +02:00
"watchers": 0,
"score": 0
},
{
2020-07-16 05:08:22 +02:00
"id": 279999285,
"name": "CVE-2020-1350-DoS",
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
2020-07-15 23:08:40 +02:00
"owner": {
2020-07-16 05:08:22 +02:00
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
2020-07-15 23:08:40 +02:00
},
2020-07-16 05:08:22 +02:00
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
2020-07-15 23:08:40 +02:00
"fork": false,
2020-07-16 05:08:22 +02:00
"created_at": "2020-07-15T23:00:00Z",
2020-07-25 23:09:26 +02:00
"updated_at": "2020-07-25T18:42:26Z",
2020-07-17 17:08:25 +02:00
"pushed_at": "2020-07-17T13:07:29Z",
2020-07-25 23:09:26 +02:00
"stargazers_count": 177,
"watchers_count": 177,
2020-07-23 17:13:08 +02:00
"forks_count": 40,
"forks": 40,
2020-07-25 23:09:26 +02:00
"watchers": 177,
2020-07-16 23:08:17 +02:00
"score": 0
},
{
"id": 280207373,
"name": "CVE-2020-1350",
"full_name": "captainGeech42\/CVE-2020-1350",
"owner": {
"login": "captainGeech42",
"id": 4255667,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4255667?v=4",
"html_url": "https:\/\/github.com\/captainGeech42"
},
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
"fork": false,
"created_at": "2020-07-16T16:46:48Z",
2020-07-21 23:08:50 +02:00
"updated_at": "2020-07-21T17:41:33Z",
2020-07-16 23:08:17 +02:00
"pushed_at": "2020-07-16T18:32:04Z",
2020-07-21 23:08:50 +02:00
"stargazers_count": 7,
"watchers_count": 7,
2020-07-17 05:09:11 +02:00
"forks_count": 1,
"forks": 1,
2020-07-21 23:08:50 +02:00
"watchers": 7,
2020-07-15 23:08:40 +02:00
"score": 0
2020-07-18 17:08:16 +02:00
},
{
"id": 280626225,
"name": "CVE-2020-1350-poc",
"full_name": "5ing\/CVE-2020-1350-poc",
"owner": {
"login": "5ing",
"id": 39704004,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/39704004?v=4",
"html_url": "https:\/\/github.com\/5ing"
},
"html_url": "https:\/\/github.com\/5ing\/CVE-2020-1350-poc",
"description": "A universal poc of CVE-2020-1350 that makes the dns.exe easy to crash",
"fork": false,
"created_at": "2020-07-18T09:42:26Z",
"updated_at": "2020-07-18T09:42:26Z",
"pushed_at": "2020-07-18T09:42:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 280665873,
"name": "CVE-2020-1350",
"full_name": "graph-inc\/CVE-2020-1350",
"owner": {
"login": "graph-inc",
"id": 68469953,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/68469953?v=4",
"html_url": "https:\/\/github.com\/graph-inc"
},
"html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
"description": "Scanner and Mitigator for CVE 2020-1350",
"fork": false,
"created_at": "2020-07-18T13:49:54Z",
2020-07-19 11:09:31 +02:00
"updated_at": "2020-07-19T07:30:18Z",
2020-07-18 17:08:16 +02:00
"pushed_at": "2020-07-18T14:05:55Z",
2020-07-19 11:09:31 +02:00
"stargazers_count": 1,
"watchers_count": 1,
2020-07-18 17:08:16 +02:00
"forks_count": 0,
"forks": 0,
2020-07-19 11:09:31 +02:00
"watchers": 1,
2020-07-18 17:08:16 +02:00
"score": 0
2020-07-19 23:08:54 +02:00
},
{
"id": 280916907,
"name": "CVE-2020-1350",
"full_name": "CVEmaster\/CVE-2020-1350",
"owner": {
"login": "CVEmaster",
"id": 68512490,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/68512490?v=4",
"html_url": "https:\/\/github.com\/CVEmaster"
},
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
"description": "DNS Vulnerability - CVE-2020-1350",
"fork": false,
"created_at": "2020-07-19T17:32:47Z",
2020-07-20 17:08:55 +02:00
"updated_at": "2020-07-20T14:26:02Z",
"pushed_at": "2020-07-20T14:25:59Z",
2020-07-19 23:08:54 +02:00
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-07-20 11:08:33 +02:00
},
{
"id": 281006200,
"name": "CVE-2020-1350-poc",
"full_name": "Plazmaz\/CVE-2020-1350-poc",
"owner": {
"login": "Plazmaz",
"id": 1331014,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1331014?v=4",
"html_url": "https:\/\/github.com\/Plazmaz"
},
"html_url": "https:\/\/github.com\/Plazmaz\/CVE-2020-1350-poc",
"description": "A basic proof of concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-20T03:44:58Z",
2020-07-20 23:10:34 +02:00
"updated_at": "2020-07-20T17:31:42Z",
2020-07-20 11:08:33 +02:00
"pushed_at": "2020-07-20T03:51:20Z",
2020-07-20 23:10:34 +02:00
"stargazers_count": 2,
"watchers_count": 2,
2020-07-20 11:08:33 +02:00
"forks_count": 0,
"forks": 0,
2020-07-20 23:10:34 +02:00
"watchers": 2,
2020-07-20 11:08:33 +02:00
"score": 0
2020-07-20 17:08:55 +02:00
},
{
"id": 281069444,
"name": "CVE-2020-1350-checker.ps1",
"full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
"owner": {
"login": "Secuora-Org",
"id": 67636594,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/67636594?v=4",
"html_url": "https:\/\/github.com\/Secuora-Org"
},
"html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
"fork": false,
"created_at": "2020-07-20T09:12:07Z",
"updated_at": "2020-07-20T09:12:36Z",
"pushed_at": "2020-07-20T09:12:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-07-22 17:08:40 +02:00
},
{
"id": 281667659,
"name": "cve-2020-1350",
"full_name": "gdwnet\/cve-2020-1350",
"owner": {
"login": "gdwnet",
"id": 19855556,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/19855556?v=4",
"html_url": "https:\/\/github.com\/gdwnet"
},
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-22T12:11:33Z",
"updated_at": "2020-07-22T12:15:03Z",
"pushed_at": "2020-07-22T12:15:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
2020-07-14 23:08:44 +02:00
}
]