2024-11-29 03:31:51 +09:00
[
2024-12-24 03:31:43 +09:00
{
"id" : 246641886 ,
"name" : "NSE-scripts" ,
"full_name" : "psc4re\/NSE-scripts" ,
"owner" : {
"login" : "psc4re" ,
"id" : 4672886 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4" ,
"html_url" : "https:\/\/github.com\/psc4re" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/psc4re\/NSE-scripts" ,
"description" : "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473" ,
"fork" : false ,
"created_at" : "2020-03-11T17:51:29Z" ,
"updated_at" : "2024-11-06T12:30:06Z" ,
"pushed_at" : "2021-08-16T18:16:20Z" ,
"stargazers_count" : 161 ,
"watchers_count" : 161 ,
"has_discussions" : false ,
"forks_count" : 29 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2020-1350" ,
"cve-2021-21972" ,
"cve-2021-34473" ,
"nmap" ,
"nmap-scan-script" ,
"nmap-scripts" ,
"nse-script" ,
"poc" ,
"proxyshell" ,
"scanner" ,
"sigred" ,
"smbghost" ,
"smbv3" ,
"vcenter" ,
"vulnerability" ,
"vulnerability-detection"
] ,
"visibility" : "public" ,
"forks" : 29 ,
"watchers" : 161 ,
"score" : 0 ,
"subscribers_count" : 10
} ,
2024-11-29 03:31:51 +09:00
{
"id" : 279670211 ,
"name" : "CVE-2020-1350_HoneyPoC" ,
"full_name" : "ZephrFish\/CVE-2020-1350_HoneyPoC" ,
"owner" : {
"login" : "ZephrFish" ,
"id" : 5783068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4" ,
"html_url" : "https:\/\/github.com\/ZephrFish" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC" ,
"description" : "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019." ,
"fork" : false ,
"created_at" : "2020-07-14T19:02:25Z" ,
"updated_at" : "2024-11-10T12:13:04Z" ,
"pushed_at" : "2021-06-10T02:46:52Z" ,
"stargazers_count" : 281 ,
"watchers_count" : 281 ,
"has_discussions" : false ,
"forks_count" : 72 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2020-1350" ,
"sigred"
] ,
"visibility" : "public" ,
"forks" : 72 ,
"watchers" : 281 ,
"score" : 0 ,
"subscribers_count" : 11
} ,
{
"id" : 279776271 ,
"name" : "CVE-2020-1350" ,
"full_name" : "T13nn3s\/CVE-2020-1350" ,
"owner" : {
"login" : "T13nn3s" ,
"id" : 29333776 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4" ,
"html_url" : "https:\/\/github.com\/T13nn3s" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/T13nn3s\/CVE-2020-1350" ,
"description" : "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service" ,
"fork" : false ,
"created_at" : "2020-07-15T05:46:31Z" ,
"updated_at" : "2023-04-01T11:46:35Z" ,
"pushed_at" : "2023-04-01T11:46:03Z" ,
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 10 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 10 ,
"watchers" : 14 ,
"score" : 0 ,
"subscribers_count" : 5
}
]