2019-12-08 22:19:20 +09:00
[
{
"id" : 138456315 ,
"name" : "WinboxPoC" ,
"full_name" : "BasuCert\/WinboxPoC" ,
"owner" : {
"login" : "BasuCert" ,
"id" : 29852431 ,
2021-01-22 00:10:20 +09:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4" ,
2019-12-12 14:14:27 +09:00
"html_url" : "https:\/\/github.com\/BasuCert"
2019-12-08 22:19:20 +09:00
} ,
"html_url" : "https:\/\/github.com\/BasuCert\/WinboxPoC" ,
"description" : "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)" ,
"fork" : false ,
"created_at" : "2018-06-24T05:34:05Z" ,
2023-07-09 22:41:27 +09:00
"updated_at" : "2023-07-09T06:48:38Z" ,
2020-10-17 00:10:27 +09:00
"pushed_at" : "2020-10-16T12:09:45Z" ,
2023-07-09 22:41:27 +09:00
"stargazers_count" : 490 ,
"watchers_count" : 490 ,
2022-11-08 15:19:29 +09:00
"has_discussions" : false ,
2023-06-30 22:45:37 +09:00
"forks_count" : 474 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2023-06-30 22:45:37 +09:00
"forks" : 474 ,
2023-07-09 22:41:27 +09:00
"watchers" : 490 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
2023-07-09 03:29:30 +09:00
"subscribers_count" : 58
2021-04-03 18:12:08 +09:00
} ,
2021-08-22 18:11:46 +09:00
{
"id" : 148370201 ,
"name" : "WinboxExploit" ,
"full_name" : "msterusky\/WinboxExploit" ,
"owner" : {
"login" : "msterusky" ,
"id" : 29436829 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4" ,
"html_url" : "https:\/\/github.com\/msterusky"
} ,
"html_url" : "https:\/\/github.com\/msterusky\/WinboxExploit" ,
"description" : "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]" ,
"fork" : false ,
"created_at" : "2018-09-11T19:36:49Z" ,
2023-04-11 03:32:48 +09:00
"updated_at" : "2023-04-10T14:27:16Z" ,
2021-08-22 18:11:46 +09:00
"pushed_at" : "2018-09-11T20:12:25Z" ,
2023-04-11 03:32:48 +09:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2022-11-08 15:19:29 +09:00
"has_discussions" : false ,
2021-08-22 18:11:46 +09:00
"forks_count" : 3 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2021-08-22 18:11:46 +09:00
"forks" : 3 ,
2023-04-11 03:32:48 +09:00
"watchers" : 6 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2021-08-22 18:11:46 +09:00
} ,
2023-06-28 15:29:09 +09:00
{
"id" : 152906288 ,
"name" : "MikroRoot" ,
"full_name" : "syrex1013\/MikroRoot" ,
"owner" : {
"login" : "syrex1013" ,
"id" : 31669127 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4" ,
"html_url" : "https:\/\/github.com\/syrex1013"
} ,
"html_url" : "https:\/\/github.com\/syrex1013\/MikroRoot" ,
"description" : "Automated version of CVE-2018-14847 (MikroTik Exploit)" ,
"fork" : false ,
"created_at" : "2018-10-13T19:17:42Z" ,
"updated_at" : "2021-12-06T20:08:10Z" ,
"pushed_at" : "2018-10-14T08:39:24Z" ,
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 15 ,
"score" : 0 ,
"subscribers_count" : 3
} ,
2021-06-16 12:11:19 +09:00
{
"id" : 161894724 ,
"name" : "CVE-2018-14847" ,
"full_name" : "jas502n\/CVE-2018-14847" ,
"owner" : {
"login" : "jas502n" ,
"id" : 16593068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4" ,
"html_url" : "https:\/\/github.com\/jas502n"
} ,
"html_url" : "https:\/\/github.com\/jas502n\/CVE-2018-14847" ,
"description" : "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞" ,
"fork" : false ,
"created_at" : "2018-12-15T10:38:26Z" ,
2023-05-17 03:32:22 +09:00
"updated_at" : "2023-05-16T17:55:20Z" ,
2021-06-16 12:11:19 +09:00
"pushed_at" : "2018-12-16T04:15:01Z" ,
2023-05-17 03:32:22 +09:00
"stargazers_count" : 24 ,
"watchers_count" : 24 ,
2022-11-08 09:17:44 +09:00
"has_discussions" : false ,
2022-12-30 15:24:04 +09:00
"forks_count" : 9 ,
2021-09-14 06:12:57 +09:00
"allow_forking" : true ,
2021-10-07 06:13:51 +09:00
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2021-10-07 06:13:51 +09:00
"topics" : [ ] ,
2021-10-02 06:13:10 +09:00
"visibility" : "public" ,
2022-12-30 15:24:04 +09:00
"forks" : 9 ,
2023-05-17 03:32:22 +09:00
"watchers" : 24 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 188679903 ,
"name" : "mikrotik-beast" ,
"full_name" : "mahmoodsabir\/mikrotik-beast" ,
"owner" : {
"login" : "mahmoodsabir" ,
"id" : 47719250 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4" ,
"html_url" : "https:\/\/github.com\/mahmoodsabir"
} ,
"html_url" : "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast" ,
"description" : " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 " ,
"fork" : false ,
"created_at" : "2019-05-26T12:26:55Z" ,
2023-04-11 03:32:48 +09:00
"updated_at" : "2023-04-10T14:46:14Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2019-05-26T13:06:01Z" ,
2023-04-11 03:32:48 +09:00
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-04-11 03:32:48 +09:00
"watchers" : 3 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 0
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 211658714 ,
"name" : "Python-MikrotikLoginExploit" ,
"full_name" : "sinichi449\/Python-MikrotikLoginExploit" ,
"owner" : {
"login" : "sinichi449" ,
"id" : 44680392 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4" ,
"html_url" : "https:\/\/github.com\/sinichi449"
} ,
"html_url" : "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit" ,
"description" : "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script" ,
"fork" : false ,
"created_at" : "2019-09-29T12:21:16Z" ,
2023-06-20 15:24:22 +09:00
"updated_at" : "2023-06-20T04:49:48Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2019-09-30T04:10:23Z" ,
2023-06-20 15:24:22 +09:00
"stargazers_count" : 15 ,
"watchers_count" : 15 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"exploit" ,
"mikrotik" ,
"python" ,
"winbox"
] ,
"visibility" : "public" ,
"forks" : 2 ,
2023-06-20 15:24:22 +09:00
"watchers" : 15 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 4
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 259795725 ,
"name" : "CVE-2018-14847" ,
"full_name" : "yukar1z0e\/CVE-2018-14847" ,
"owner" : {
"login" : "yukar1z0e" ,
"id" : 44317939 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4" ,
"html_url" : "https:\/\/github.com\/yukar1z0e"
} ,
"html_url" : "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-04-29T01:40:33Z" ,
"updated_at" : "2022-12-20T04:50:57Z" ,
"pushed_at" : "2020-05-18T07:47:58Z" ,
"stargazers_count" : 1 ,
"watchers_count" : 1 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 1 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 360240266 ,
"name" : "Mikrotik-router-hack" ,
"full_name" : "hacker30468\/Mikrotik-router-hack" ,
"owner" : {
"login" : "hacker30468" ,
"id" : 82890072 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4" ,
"html_url" : "https:\/\/github.com\/hacker30468"
} ,
"html_url" : "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack" ,
"description" : "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead." ,
"fork" : false ,
"created_at" : "2021-04-21T16:42:31Z" ,
2023-07-04 09:30:26 +09:00
"updated_at" : "2023-07-03T20:43:29Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2021-04-21T16:46:37Z" ,
2023-07-04 09:30:26 +09:00
"stargazers_count" : 19 ,
"watchers_count" : 19 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
2023-01-19 03:35:10 +09:00
"forks_count" : 10 ,
2023-01-07 09:35:14 +09:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-01-19 03:35:10 +09:00
"forks" : 10 ,
2023-07-04 09:30:26 +09:00
"watchers" : 19 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-07 09:35:14 +09:00
} ,
{
"id" : 559816350 ,
"name" : "routeros-CVE-2018-14847-bytheway" ,
"full_name" : "babyshen\/routeros-CVE-2018-14847-bytheway" ,
"owner" : {
"login" : "babyshen" ,
"id" : 11402197 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4" ,
"html_url" : "https:\/\/github.com\/babyshen"
} ,
"html_url" : "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway" ,
"description" : "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:" ,
"fork" : false ,
"created_at" : "2022-10-31T06:38:11Z" ,
2023-06-08 15:44:20 +09:00
"updated_at" : "2023-06-08T05:19:54Z" ,
2023-01-07 09:35:14 +09:00
"pushed_at" : "2022-11-17T01:22:12Z" ,
2023-06-08 15:44:20 +09:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-07 09:35:14 +09:00
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
2023-06-08 15:44:20 +09:00
"watchers" : 2 ,
2023-06-19 22:46:37 +09:00
"score" : 0 ,
"subscribers_count" : 1
2019-12-08 22:19:20 +09:00
}
]