2024-11-28 19:31:51 +01:00
[
{
"id" : 491338151 ,
"name" : "TryHackMe-CVE-2022-26923" ,
"full_name" : "r1skkam\/TryHackMe-CVE-2022-26923" ,
"owner" : {
"login" : "r1skkam" ,
"id" : 58542375 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4" ,
"html_url" : "https:\/\/github.com\/r1skkam" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/r1skkam\/TryHackMe-CVE-2022-26923" ,
"description" : "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services" ,
"fork" : false ,
"created_at" : "2022-05-12T02:31:50Z" ,
"updated_at" : "2022-08-12T08:03:36Z" ,
"pushed_at" : "2022-05-12T03:24:04Z" ,
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 6 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 492169187 ,
"name" : "CVE-2022-26923_AD-Certificate-Services" ,
"full_name" : "LudovicPatho\/CVE-2022-26923_AD-Certificate-Services" ,
"owner" : {
"login" : "LudovicPatho" ,
"id" : 26960886 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4" ,
"html_url" : "https:\/\/github.com\/LudovicPatho" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/LudovicPatho\/CVE-2022-26923_AD-Certificate-Services" ,
"description" : "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed." ,
"fork" : false ,
"created_at" : "2022-05-14T09:27:06Z" ,
2024-12-18 01:32:50 +01:00
"updated_at" : "2024-12-17T21:30:52Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2022-05-14T20:56:39Z" ,
2024-12-18 01:32:50 +01:00
"stargazers_count" : 43 ,
"watchers_count" : 43 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
2024-12-18 01:32:50 +01:00
"forks_count" : 14 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-18 01:32:50 +01:00
"forks" : 14 ,
"watchers" : 43 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 525955636 ,
"name" : "CVE-2022-26923-Powershell-POC" ,
"full_name" : "lsecqt\/CVE-2022-26923-Powershell-POC" ,
"owner" : {
"login" : "lsecqt" ,
"id" : 102690672 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/102690672?v=4" ,
"html_url" : "https:\/\/github.com\/lsecqt" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/lsecqt\/CVE-2022-26923-Powershell-POC" ,
"description" : "A powershell poc to load and automatically run Certify and Rubeus from memory." ,
"fork" : false ,
"created_at" : "2022-08-17T21:13:49Z" ,
"updated_at" : "2024-11-21T05:59:54Z" ,
"pushed_at" : "2022-08-17T21:25:20Z" ,
"stargazers_count" : 17 ,
"watchers_count" : 17 ,
"has_discussions" : false ,
"forks_count" : 8 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 8 ,
"watchers" : 17 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 706016211 ,
"name" : "PIGADVulnScanner" ,
"full_name" : "evilashz\/PIGADVulnScanner" ,
"owner" : {
"login" : "evilashz" ,
"id" : 50722929 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4" ,
"html_url" : "https:\/\/github.com\/evilashz" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/evilashz\/PIGADVulnScanner" ,
"description" : "检测域内常见一把梭漏洞, 包括: NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare" ,
"fork" : false ,
"created_at" : "2023-10-17T06:29:44Z" ,
2024-12-25 07:31:34 +01:00
"updated_at" : "2024-12-25T03:01:23Z" ,
2024-11-28 19:31:51 +01:00
"pushed_at" : "2023-10-23T04:47:11Z" ,
2024-12-25 07:31:34 +01:00
"stargazers_count" : 41 ,
"watchers_count" : 41 ,
2024-11-28 19:31:51 +01:00
"has_discussions" : false ,
2024-12-04 07:32:12 +01:00
"forks_count" : 11 ,
2024-11-28 19:31:51 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-12-04 07:32:12 +01:00
"forks" : 11 ,
2024-12-25 07:31:34 +01:00
"watchers" : 41 ,
2024-11-28 19:31:51 +01:00
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 724703848 ,
"name" : "CVE-2022-26923" ,
"full_name" : "Gh-Badr\/CVE-2022-26923" ,
"owner" : {
"login" : "Gh-Badr" ,
"id" : 110426701 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/110426701?v=4" ,
"html_url" : "https:\/\/github.com\/Gh-Badr" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Gh-Badr\/CVE-2022-26923" ,
"description" : "A proof of concept exploiting CVE-2022-26923." ,
"fork" : false ,
"created_at" : "2023-11-28T16:13:36Z" ,
"updated_at" : "2023-12-06T21:25:52Z" ,
"pushed_at" : "2023-12-09T23:39:37Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 850747240 ,
"name" : "CVE-2022-26923" ,
"full_name" : "Yowise\/CVE-2022-26923" ,
"owner" : {
"login" : "Yowise" ,
"id" : 42322439 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/42322439?v=4" ,
"html_url" : "https:\/\/github.com\/Yowise" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/Yowise\/CVE-2022-26923" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-09-01T17:03:27Z" ,
"updated_at" : "2024-09-01T17:04:54Z" ,
"pushed_at" : "2024-09-01T17:04:51Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]