2020-07-14 23:08:44 +02:00
[
2020-07-18 05:08:36 +02:00
{
"id" : 246641886 ,
"name" : "NSE-scripts" ,
"full_name" : "pr4jwal\/NSE-scripts" ,
"owner" : {
"login" : "pr4jwal" ,
"id" : 4672886 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/4672886?v=4" ,
"html_url" : "https:\/\/github.com\/pr4jwal"
} ,
"html_url" : "https:\/\/github.com\/pr4jwal\/NSE-scripts" ,
"description" : "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST" ,
"fork" : false ,
"created_at" : "2020-03-11T17:51:29Z" ,
2020-07-20 17:08:55 +02:00
"updated_at" : "2020-07-20T10:11:22Z" ,
2020-07-18 05:08:36 +02:00
"pushed_at" : "2020-07-17T20:58:16Z" ,
2020-07-20 17:08:55 +02:00
"stargazers_count" : 30 ,
"watchers_count" : 30 ,
2020-07-18 05:08:36 +02:00
"forks_count" : 7 ,
"forks" : 7 ,
2020-07-20 17:08:55 +02:00
"watchers" : 30 ,
2020-07-18 05:08:36 +02:00
"score" : 0
} ,
2020-07-14 23:08:44 +02:00
{
"id" : 279670211 ,
"name" : "CVE-2020-1350" ,
"full_name" : "ZephrFish\/CVE-2020-1350" ,
"owner" : {
"login" : "ZephrFish" ,
"id" : 5783068 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/5783068?v=4" ,
"html_url" : "https:\/\/github.com\/ZephrFish"
} ,
"html_url" : "https:\/\/github.com\/ZephrFish\/CVE-2020-1350" ,
2020-07-16 05:08:22 +02:00
"description" : "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019." ,
2020-07-14 23:08:44 +02:00
"fork" : false ,
"created_at" : "2020-07-14T19:02:25Z" ,
2020-07-24 17:08:35 +02:00
"updated_at" : "2020-07-24T11:27:06Z" ,
2020-07-20 23:10:34 +02:00
"pushed_at" : "2020-07-20T17:54:16Z" ,
2020-07-24 17:08:35 +02:00
"stargazers_count" : 196 ,
"watchers_count" : 196 ,
"forks_count" : 66 ,
"forks" : 66 ,
"watchers" : 196 ,
2020-07-14 23:08:44 +02:00
"score" : 0
} ,
{
"id" : 279675165 ,
"name" : "CVE-2020-1350" ,
"full_name" : "mr-r3b00t\/CVE-2020-1350" ,
"owner" : {
"login" : "mr-r3b00t" ,
"id" : 14963690 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4" ,
"html_url" : "https:\/\/github.com\/mr-r3b00t"
} ,
"html_url" : "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-07-14T19:28:46Z" ,
2020-07-20 11:08:33 +02:00
"updated_at" : "2020-07-20T06:15:59Z" ,
"pushed_at" : "2020-07-20T06:15:56Z" ,
2020-07-16 17:08:28 +02:00
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
2020-07-16 11:08:29 +02:00
"forks_count" : 5 ,
"forks" : 5 ,
2020-07-16 17:08:28 +02:00
"watchers" : 5 ,
2020-07-14 23:08:44 +02:00
"score" : 0
} ,
2020-07-18 05:08:36 +02:00
{
"id" : 279701266 ,
"name" : "Fake_CVE-2020-1350" ,
"full_name" : "zoomerxsec\/Fake_CVE-2020-1350" ,
"owner" : {
"login" : "zoomerxsec" ,
"id" : 56858864 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/56858864?v=4" ,
"html_url" : "https:\/\/github.com\/zoomerxsec"
} ,
"html_url" : "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350" ,
"description" : "Fake exploit tool, designed to rickroll users attempting to actually exploit." ,
"fork" : false ,
"created_at" : "2020-07-14T21:55:57Z" ,
2020-07-21 11:09:44 +02:00
"updated_at" : "2020-07-21T07:03:15Z" ,
2020-07-19 05:09:40 +02:00
"pushed_at" : "2020-07-19T02:29:33Z" ,
2020-07-21 11:09:44 +02:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"forks_count" : 1 ,
"forks" : 1 ,
"watchers" : 3 ,
2020-07-18 05:08:36 +02:00
"score" : 0
} ,
2020-07-14 23:08:44 +02:00
{
2020-07-15 05:09:40 +02:00
"id" : 279708493 ,
"name" : "cve-2020-1350" ,
"full_name" : "tinkersec\/cve-2020-1350" ,
2020-07-14 23:08:44 +02:00
"owner" : {
2020-07-15 05:09:40 +02:00
"login" : "tinkersec" ,
"id" : 35904426 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/35904426?v=4" ,
"html_url" : "https:\/\/github.com\/tinkersec"
2020-07-14 23:08:44 +02:00
} ,
2020-07-15 05:09:40 +02:00
"html_url" : "https:\/\/github.com\/tinkersec\/cve-2020-1350" ,
"description" : "Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019." ,
2020-07-14 23:08:44 +02:00
"fork" : false ,
2020-07-15 05:09:40 +02:00
"created_at" : "2020-07-14T22:45:48Z" ,
2020-07-24 11:08:52 +02:00
"updated_at" : "2020-07-24T07:47:26Z" ,
2020-07-15 17:08:32 +02:00
"pushed_at" : "2020-07-15T13:53:24Z" ,
2020-07-24 11:08:52 +02:00
"stargazers_count" : 56 ,
"watchers_count" : 56 ,
2020-07-20 11:08:33 +02:00
"forks_count" : 19 ,
"forks" : 19 ,
2020-07-24 11:08:52 +02:00
"watchers" : 56 ,
2020-07-15 11:11:05 +02:00
"score" : 0
} ,
{
"id" : 279776271 ,
"name" : "CVE-2020-1350" ,
"full_name" : "T13nn3s\/CVE-2020-1350" ,
"owner" : {
"login" : "T13nn3s" ,
"id" : 29333776 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4" ,
"html_url" : "https:\/\/github.com\/T13nn3s"
} ,
"html_url" : "https:\/\/github.com\/T13nn3s\/CVE-2020-1350" ,
"description" : "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service" ,
"fork" : false ,
"created_at" : "2020-07-15T05:46:31Z" ,
2020-07-22 17:08:40 +02:00
"updated_at" : "2020-07-22T14:11:50Z" ,
2020-07-18 11:08:23 +02:00
"pushed_at" : "2020-07-18T06:38:11Z" ,
2020-07-22 17:08:40 +02:00
"stargazers_count" : 10 ,
"watchers_count" : 10 ,
2020-07-23 17:13:08 +02:00
"forks_count" : 9 ,
"forks" : 9 ,
2020-07-22 17:08:40 +02:00
"watchers" : 10 ,
2020-07-14 23:08:44 +02:00
"score" : 0
2020-07-15 23:08:40 +02:00
} ,
2020-07-16 05:08:22 +02:00
{
"id" : 279778118 ,
"name" : "SIGRed" ,
"full_name" : "corelight\/SIGRed" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4" ,
"html_url" : "https:\/\/github.com\/corelight"
} ,
"html_url" : "https:\/\/github.com\/corelight\/SIGRed" ,
"description" : "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)" ,
"fork" : false ,
"created_at" : "2020-07-15T05:55:20Z" ,
2020-07-22 11:08:40 +02:00
"updated_at" : "2020-07-22T07:04:21Z" ,
2020-07-20 05:08:27 +02:00
"pushed_at" : "2020-07-20T02:20:43Z" ,
2020-07-22 11:08:40 +02:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2020-07-16 23:08:17 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-07-22 11:08:40 +02:00
"watchers" : 6 ,
2020-07-16 05:08:22 +02:00
"score" : 0
} ,
2020-07-15 23:08:40 +02:00
{
"id" : 279961698 ,
"name" : "dRMM-CVE-2020-1350-response" ,
"full_name" : "jmaddington\/dRMM-CVE-2020-1350-response" ,
"owner" : {
"login" : "jmaddington" ,
"id" : 2353597 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/2353597?v=4" ,
"html_url" : "https:\/\/github.com\/jmaddington"
} ,
"html_url" : "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response" ,
"description" : "Windows registry mitigation response to CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-15T19:43:39Z" ,
"updated_at" : "2020-07-15T19:59:04Z" ,
"pushed_at" : "2020-07-15T19:59:02Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-07-16 23:08:17 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-07-15 23:08:40 +02:00
"watchers" : 0 ,
"score" : 0
} ,
{
2020-07-16 05:08:22 +02:00
"id" : 279999285 ,
"name" : "CVE-2020-1350-DoS" ,
"full_name" : "maxpl0it\/CVE-2020-1350-DoS" ,
2020-07-15 23:08:40 +02:00
"owner" : {
2020-07-16 05:08:22 +02:00
"login" : "maxpl0it" ,
"id" : 27973683 ,
"avatar_url" : "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4" ,
"html_url" : "https:\/\/github.com\/maxpl0it"
2020-07-15 23:08:40 +02:00
} ,
2020-07-16 05:08:22 +02:00
"html_url" : "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS" ,
"description" : "A denial-of-service proof-of-concept for CVE-2020-1350" ,
2020-07-15 23:08:40 +02:00
"fork" : false ,
2020-07-16 05:08:22 +02:00
"created_at" : "2020-07-15T23:00:00Z" ,
2020-07-25 23:09:26 +02:00
"updated_at" : "2020-07-25T18:42:26Z" ,
2020-07-17 17:08:25 +02:00
"pushed_at" : "2020-07-17T13:07:29Z" ,
2020-07-25 23:09:26 +02:00
"stargazers_count" : 177 ,
"watchers_count" : 177 ,
2020-07-23 17:13:08 +02:00
"forks_count" : 40 ,
"forks" : 40 ,
2020-07-25 23:09:26 +02:00
"watchers" : 177 ,
2020-07-16 23:08:17 +02:00
"score" : 0
} ,
{
"id" : 280207373 ,
"name" : "CVE-2020-1350" ,
"full_name" : "captainGeech42\/CVE-2020-1350" ,
"owner" : {
"login" : "captainGeech42" ,
"id" : 4255667 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/4255667?v=4" ,
"html_url" : "https:\/\/github.com\/captainGeech42"
} ,
"html_url" : "https:\/\/github.com\/captainGeech42\/CVE-2020-1350" ,
"description" : "Denial of Service PoC for CVE-2020-1350 (SIGRed)" ,
"fork" : false ,
"created_at" : "2020-07-16T16:46:48Z" ,
2020-07-21 23:08:50 +02:00
"updated_at" : "2020-07-21T17:41:33Z" ,
2020-07-16 23:08:17 +02:00
"pushed_at" : "2020-07-16T18:32:04Z" ,
2020-07-21 23:08:50 +02:00
"stargazers_count" : 7 ,
"watchers_count" : 7 ,
2020-07-17 05:09:11 +02:00
"forks_count" : 1 ,
"forks" : 1 ,
2020-07-21 23:08:50 +02:00
"watchers" : 7 ,
2020-07-15 23:08:40 +02:00
"score" : 0
2020-07-18 17:08:16 +02:00
} ,
{
"id" : 280626225 ,
"name" : "CVE-2020-1350-poc" ,
"full_name" : "5ing\/CVE-2020-1350-poc" ,
"owner" : {
"login" : "5ing" ,
"id" : 39704004 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/39704004?v=4" ,
"html_url" : "https:\/\/github.com\/5ing"
} ,
"html_url" : "https:\/\/github.com\/5ing\/CVE-2020-1350-poc" ,
"description" : "A universal poc of CVE-2020-1350 that makes the dns.exe easy to crash" ,
"fork" : false ,
"created_at" : "2020-07-18T09:42:26Z" ,
"updated_at" : "2020-07-18T09:42:26Z" ,
"pushed_at" : "2020-07-18T09:42:27Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
{
"id" : 280665873 ,
"name" : "CVE-2020-1350" ,
"full_name" : "graph-inc\/CVE-2020-1350" ,
"owner" : {
"login" : "graph-inc" ,
"id" : 68469953 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/68469953?v=4" ,
"html_url" : "https:\/\/github.com\/graph-inc"
} ,
"html_url" : "https:\/\/github.com\/graph-inc\/CVE-2020-1350" ,
"description" : "Scanner and Mitigator for CVE 2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-18T13:49:54Z" ,
2020-07-19 11:09:31 +02:00
"updated_at" : "2020-07-19T07:30:18Z" ,
2020-07-18 17:08:16 +02:00
"pushed_at" : "2020-07-18T14:05:55Z" ,
2020-07-19 11:09:31 +02:00
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
2020-07-18 17:08:16 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-07-19 11:09:31 +02:00
"watchers" : 1 ,
2020-07-18 17:08:16 +02:00
"score" : 0
2020-07-19 23:08:54 +02:00
} ,
{
"id" : 280916907 ,
"name" : "CVE-2020-1350" ,
"full_name" : "CVEmaster\/CVE-2020-1350" ,
"owner" : {
"login" : "CVEmaster" ,
"id" : 68512490 ,
"avatar_url" : "https:\/\/avatars0.githubusercontent.com\/u\/68512490?v=4" ,
"html_url" : "https:\/\/github.com\/CVEmaster"
} ,
"html_url" : "https:\/\/github.com\/CVEmaster\/CVE-2020-1350" ,
"description" : "DNS Vulnerability - CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-19T17:32:47Z" ,
2020-07-20 17:08:55 +02:00
"updated_at" : "2020-07-20T14:26:02Z" ,
"pushed_at" : "2020-07-20T14:25:59Z" ,
2020-07-19 23:08:54 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-07-20 11:08:33 +02:00
} ,
{
"id" : 281006200 ,
"name" : "CVE-2020-1350-poc" ,
"full_name" : "Plazmaz\/CVE-2020-1350-poc" ,
"owner" : {
"login" : "Plazmaz" ,
"id" : 1331014 ,
"avatar_url" : "https:\/\/avatars2.githubusercontent.com\/u\/1331014?v=4" ,
"html_url" : "https:\/\/github.com\/Plazmaz"
} ,
"html_url" : "https:\/\/github.com\/Plazmaz\/CVE-2020-1350-poc" ,
"description" : "A basic proof of concept for CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-20T03:44:58Z" ,
2020-07-20 23:10:34 +02:00
"updated_at" : "2020-07-20T17:31:42Z" ,
2020-07-20 11:08:33 +02:00
"pushed_at" : "2020-07-20T03:51:20Z" ,
2020-07-20 23:10:34 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2020-07-20 11:08:33 +02:00
"forks_count" : 0 ,
"forks" : 0 ,
2020-07-20 23:10:34 +02:00
"watchers" : 2 ,
2020-07-20 11:08:33 +02:00
"score" : 0
2020-07-20 17:08:55 +02:00
} ,
{
"id" : 281069444 ,
"name" : "CVE-2020-1350-checker.ps1" ,
"full_name" : "Secuora-Org\/CVE-2020-1350-checker.ps1" ,
"owner" : {
"login" : "Secuora-Org" ,
"id" : 67636594 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/67636594?v=4" ,
"html_url" : "https:\/\/github.com\/Secuora-Org"
} ,
"html_url" : "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1" ,
"description" : "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código." ,
"fork" : false ,
"created_at" : "2020-07-20T09:12:07Z" ,
"updated_at" : "2020-07-20T09:12:36Z" ,
"pushed_at" : "2020-07-20T09:12:33Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-07-22 17:08:40 +02:00
} ,
{
"id" : 281667659 ,
"name" : "cve-2020-1350" ,
"full_name" : "gdwnet\/cve-2020-1350" ,
"owner" : {
"login" : "gdwnet" ,
"id" : 19855556 ,
"avatar_url" : "https:\/\/avatars1.githubusercontent.com\/u\/19855556?v=4" ,
"html_url" : "https:\/\/github.com\/gdwnet"
} ,
"html_url" : "https:\/\/github.com\/gdwnet\/cve-2020-1350" ,
"description" : "A powershell script to deploy the registry mitigation key for CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-22T12:11:33Z" ,
"updated_at" : "2020-07-22T12:15:03Z" ,
"pushed_at" : "2020-07-22T12:15:00Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2020-07-14 23:08:44 +02:00
}
]