2019-12-08 22:19:20 +09:00
[
{
"id" : 138456315 ,
"name" : "WinboxPoC" ,
"full_name" : "BasuCert\/WinboxPoC" ,
"owner" : {
"login" : "BasuCert" ,
"id" : 29852431 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/BasuCert"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/BasuCert\/WinboxPoC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)" ,
"fork" : false ,
"created_at" : "2018-06-24T05:34:05Z" ,
2022-06-17 09:15:53 +09:00
"updated_at" : "2022-06-16T20:16:13Z" ,
2020-10-17 00:10:27 +09:00
"pushed_at" : "2020-10-16T12:09:45Z" ,
2022-06-17 09:15:53 +09:00
"stargazers_count" : 467 ,
"watchers_count" : 467 ,
2022-05-31 15:16:07 +09:00
"forks_count" : 458 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2022-05-31 15:16:07 +09:00
"forks" : 458 ,
2022-06-17 09:15:53 +09:00
"watchers" : 467 ,
2021-04-03 18:12:08 +09:00
"score" : 0
} ,
2021-08-22 18:11:46 +09:00
{
"id" : 148370201 ,
"name" : "WinboxExploit" ,
"full_name" : "msterusky\/WinboxExploit" ,
"owner" : {
"login" : "msterusky" ,
"id" : 29436829 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4" ,
"html_url" : "https:\/\/github.com\/msterusky"
} ,
"html_url" : "https:\/\/github.com\/msterusky\/WinboxExploit" ,
"description" : "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]" ,
"fork" : false ,
"created_at" : "2018-09-11T19:36:49Z" ,
"updated_at" : "2021-03-13T16:56:42Z" ,
"pushed_at" : "2018-09-11T20:12:25Z" ,
"stargazers_count" : 5 ,
"watchers_count" : 5 ,
"forks_count" : 3 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-22 18:11:46 +09:00
"forks" : 3 ,
"watchers" : 5 ,
"score" : 0
} ,
{
"id" : 152906288 ,
"name" : "MikroRoot" ,
"full_name" : "syrex1013\/MikroRoot" ,
"owner" : {
"login" : "syrex1013" ,
"id" : 31669127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4" ,
"html_url" : "https:\/\/github.com\/syrex1013"
} ,
"html_url" : "https:\/\/github.com\/syrex1013\/MikroRoot" ,
"description" : "Automated version of CVE-2018-14847 (MikroTik Exploit)" ,
"fork" : false ,
"created_at" : "2018-10-13T19:17:42Z" ,
2021-12-07 09:13:37 +09:00
"updated_at" : "2021-12-06T20:08:10Z" ,
2021-08-22 18:11:46 +09:00
"pushed_at" : "2018-10-14T08:39:24Z" ,
2021-12-07 09:13:37 +09:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2021-08-22 18:11:46 +09:00
"forks_count" : 2 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-22 18:11:46 +09:00
"forks" : 2 ,
2021-12-07 09:13:37 +09:00
"watchers" : 15 ,
2021-08-22 18:11:46 +09:00
"score" : 0
} ,
2021-06-16 12:11:19 +09:00
{
"id" : 161894724 ,
"name" : "CVE-2018-14847" ,
"full_name" : "jas502n\/CVE-2018-14847" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2018-14847" ,
"description" : "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞" ,
"fork" : false ,
"created_at" : "2018-12-15T10:38:26Z" ,
2022-04-27 15:15:36 +09:00
"updated_at" : "2022-04-27T00:49:33Z" ,
2021-06-16 12:11:19 +09:00
"pushed_at" : "2018-12-16T04:15:01Z" ,
2022-04-27 15:15:36 +09:00
"stargazers_count" : 22 ,
"watchers_count" : 22 ,
2021-06-16 12:11:19 +09:00
"forks_count" : 8 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-06-16 12:11:19 +09:00
"forks" : 8 ,
2022-04-27 15:15:36 +09:00
"watchers" : 22 ,
2021-06-16 12:11:19 +09:00
"score" : 0
} ,
2021-04-02 12:10:50 +09:00
{
"id" : 188679903 ,
"name" : "mikrotik-beast" ,
"full_name" : "mahmoodsabir\/mikrotik-beast" ,
"owner" : {
"login" : "mahmoodsabir" ,
"id" : 47719250 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4" ,
"html_url" : "https:\/\/github.com\/mahmoodsabir"
} ,
"html_url" : "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast" ,
"description" : " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 " ,
"fork" : false ,
"created_at" : "2019-05-26T12:26:55Z" ,
"updated_at" : "2020-08-26T17:33:20Z" ,
"pushed_at" : "2019-05-26T13:06:01Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2022-03-05 21:14:08 +09:00
"forks_count" : 2 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2022-03-05 21:14:08 +09:00
"forks" : 2 ,
2021-04-02 12:10:50 +09:00
"watchers" : 2 ,
"score" : 0
} ,
2021-12-24 09:13:46 +09:00
{
"id" : 210848831 ,
"name" : "winboxPOC" ,
"full_name" : "Tr33-He11\/winboxPOC" ,
"owner" : {
"login" : "Tr33-He11" ,
"id" : 18653509 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4" ,
"html_url" : "https:\/\/github.com\/Tr33-He11"
} ,
"html_url" : "https:\/\/github.com\/Tr33-He11\/winboxPOC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) " ,
"fork" : false ,
"created_at" : "2019-09-25T13:12:56Z" ,
"updated_at" : "2021-12-23T21:35:48Z" ,
"pushed_at" : "2019-02-18T09:51:10Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
} ,
2021-03-22 00:10:35 +09:00
{
"id" : 211658714 ,
"name" : "Python-MikrotikLoginExploit" ,
"full_name" : "sinichi449\/Python-MikrotikLoginExploit" ,
"owner" : {
"login" : "sinichi449" ,
"id" : 44680392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4" ,
"html_url" : "https:\/\/github.com\/sinichi449"
} ,
"html_url" : "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit" ,
"description" : "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script" ,
"fork" : false ,
"created_at" : "2019-09-29T12:21:16Z" ,
2022-01-10 03:13:48 +09:00
"updated_at" : "2022-01-09T17:17:55Z" ,
2021-03-22 00:10:35 +09:00
"pushed_at" : "2019-09-30T04:10:23Z" ,
2022-01-10 03:13:48 +09:00
"stargazers_count" : 13 ,
"watchers_count" : 13 ,
2021-08-09 06:13:09 +09:00
"forks_count" : 1 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [
"exploit" ,
"mikrotik" ,
"python" ,
"winbox"
] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-09 06:13:09 +09:00
"forks" : 1 ,
2022-01-10 03:13:48 +09:00
"watchers" : 13 ,
2021-03-22 00:10:35 +09:00
"score" : 0
} ,
2020-04-29 12:08:13 +09:00
{
"id" : 259795725 ,
"name" : "CVE-2018-14847" ,
"full_name" : "yukar1z0e\/CVE-2018-14847" ,
"owner" : {
"login" : "yukar1z0e" ,
"id" : 44317939 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4" ,
2020-04-29 12:08:13 +09:00
"html_url" : "https:\/\/github.com\/yukar1z0e"
} ,
"html_url" : "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-04-29T01:40:33Z" ,
2020-05-18 18:07:54 +09:00
"updated_at" : "2020-05-18T07:48:01Z" ,
"pushed_at" : "2020-05-18T07:47:58Z" ,
2020-04-29 12:08:13 +09:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2020-06-09 00:08:09 +09:00
"forks_count" : 2 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2020-06-09 00:08:09 +09:00
"forks" : 2 ,
2020-04-29 12:08:13 +09:00
"watchers" : 0 ,
"score" : 0
2021-04-22 06:11:18 +09:00
} ,
{
"id" : 360240266 ,
"name" : "Mikrotik-router-hack" ,
"full_name" : "hacker30468\/Mikrotik-router-hack" ,
"owner" : {
"login" : "hacker30468" ,
"id" : 82890072 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4" ,
"html_url" : "https:\/\/github.com\/hacker30468"
} ,
"html_url" : "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack" ,
"description" : "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead." ,
"fork" : false ,
"created_at" : "2021-04-21T16:42:31Z" ,
2022-05-06 09:15:09 +09:00
"updated_at" : "2022-05-05T20:43:30Z" ,
2021-04-22 06:11:18 +09:00
"pushed_at" : "2021-04-21T16:46:37Z" ,
2022-05-06 09:15:09 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2022-05-31 03:19:24 +09:00
"forks_count" : 5 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2022-05-31 03:19:24 +09:00
"forks" : 5 ,
2022-05-06 09:15:09 +09:00
"watchers" : 6 ,
2021-04-22 06:11:18 +09:00
"score" : 0
2019-12-08 22:19:20 +09:00
}
]