2020-12-30 22:09:58 +01:00
[
{
"id" : 246641886 ,
"name" : "NSE-scripts" ,
"full_name" : "psc4re\/NSE-scripts" ,
"owner" : {
"login" : "psc4re" ,
"id" : 4672886 ,
2021-01-21 16:10:20 +01:00
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/psc4re" ,
"user_view_type" : "public"
2020-12-30 22:09:58 +01:00
} ,
"html_url" : "https:\/\/github.com\/psc4re\/NSE-scripts" ,
2021-08-16 23:12:11 +02:00
"description" : "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473" ,
2020-12-30 22:09:58 +01:00
"fork" : false ,
"created_at" : "2020-03-11T17:51:29Z" ,
2024-10-21 14:31:12 +02:00
"updated_at" : "2024-10-21T11:12:12Z" ,
2021-08-16 23:12:11 +02:00
"pushed_at" : "2021-08-16T18:16:20Z" ,
2024-10-21 14:31:12 +02:00
"stargazers_count" : 159 ,
"watchers_count" : 159 ,
2022-11-08 07:19:29 +01:00
"has_discussions" : false ,
2024-04-23 14:28:59 +02:00
"forks_count" : 28 ,
2021-09-13 23:12:57 +02:00
"allow_forking" : true ,
2021-10-06 23:13:51 +02:00
"is_template" : false ,
2022-06-28 20:20:29 +02:00
"web_commit_signoff_required" : false ,
2021-10-06 23:13:51 +02:00
"topics" : [
"cve-2020-1350" ,
"cve-2021-21972" ,
"cve-2021-34473" ,
"nmap" ,
"nmap-scan-script" ,
"nmap-scripts" ,
"nse-script" ,
"poc" ,
"proxyshell" ,
"scanner" ,
"sigred" ,
"smbghost" ,
"smbv3" ,
"vcenter" ,
"vulnerability" ,
"vulnerability-detection"
] ,
2021-10-01 23:13:10 +02:00
"visibility" : "public" ,
2024-04-23 14:28:59 +02:00
"forks" : 28 ,
2024-10-21 14:31:12 +02:00
"watchers" : 159 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-08-07 02:26:48 +02:00
"subscribers_count" : 10
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279670211 ,
"name" : "CVE-2020-1350_HoneyPoC" ,
"full_name" : "ZephrFish\/CVE-2020-1350_HoneyPoC" ,
"owner" : {
"login" : "ZephrFish" ,
"id" : 5783068 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/ZephrFish" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC" ,
"description" : "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019." ,
"fork" : false ,
"created_at" : "2020-07-14T19:02:25Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:44Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2021-06-10T02:46:52Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 280 ,
"watchers_count" : 280 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2024-03-12 07:26:38 +01:00
"forks_count" : 72 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2020-1350" ,
"sigred"
] ,
"visibility" : "public" ,
2024-03-12 07:26:38 +01:00
"forks" : 72 ,
2024-08-13 02:29:46 +02:00
"watchers" : 280 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 11
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279675165 ,
"name" : "CVE-2020-1350" ,
"full_name" : "mr-r3b00t\/CVE-2020-1350" ,
"owner" : {
"login" : "mr-r3b00t" ,
"id" : 14963690 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/mr-r3b00t" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350" ,
"description" : null ,
"fork" : false ,
"created_at" : "2020-07-14T19:28:46Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:44Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-20T06:15:56Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 4 ,
"watchers_count" : 4 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 6 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 6 ,
2024-08-13 02:29:46 +02:00
"watchers" : 4 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 4
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279701266 ,
"name" : "Fake_CVE-2020-1350" ,
"full_name" : "zoomerxsec\/Fake_CVE-2020-1350" ,
"owner" : {
"login" : "zoomerxsec" ,
"id" : 56858864 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/zoomerxsec" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350" ,
"description" : "Fake exploit tool, designed to rickroll users attempting to actually exploit." ,
"fork" : false ,
"created_at" : "2020-07-14T21:55:57Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:44Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-19T02:29:33Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 6 ,
"watchers_count" : 6 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
2024-08-13 02:29:46 +02:00
"watchers" : 6 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 3
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279776271 ,
"name" : "CVE-2020-1350" ,
"full_name" : "T13nn3s\/CVE-2020-1350" ,
"owner" : {
"login" : "T13nn3s" ,
"id" : 29333776 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/T13nn3s" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/T13nn3s\/CVE-2020-1350" ,
"description" : "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service" ,
"fork" : false ,
"created_at" : "2020-07-15T05:46:31Z" ,
2023-04-01 14:30:22 +02:00
"updated_at" : "2023-04-01T11:46:35Z" ,
"pushed_at" : "2023-04-01T11:46:03Z" ,
2023-01-02 13:13:52 +01:00
"stargazers_count" : 14 ,
"watchers_count" : 14 ,
"has_discussions" : false ,
"forks_count" : 10 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 10 ,
"watchers" : 14 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 5
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279778118 ,
"name" : "SIGRed" ,
"full_name" : "corelight\/SIGRed" ,
"owner" : {
"login" : "corelight" ,
"id" : 21672558 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/corelight" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/corelight\/SIGRed" ,
"description" : "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)" ,
"fork" : false ,
"created_at" : "2020-07-15T05:55:20Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:45Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-20T02:20:43Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 9 ,
"watchers_count" : 9 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2023-03-29 02:32:57 +02:00
"forks_count" : 5 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2023-03-29 02:32:57 +02:00
"forks" : 5 ,
2024-08-13 02:29:46 +02:00
"watchers" : 9 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-07-02 02:25:49 +02:00
"subscribers_count" : 5
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279961698 ,
"name" : "dRMM-CVE-2020-1350-response" ,
"full_name" : "jmaddington\/dRMM-CVE-2020-1350-response" ,
"owner" : {
"login" : "jmaddington" ,
"id" : 2353597 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/jmaddington" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response" ,
"description" : "Windows registry mitigation response to CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-15T19:43:39Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:47Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-15T19:59:02Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
2024-08-13 02:29:46 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 279999285 ,
"name" : "CVE-2020-1350-DoS" ,
"full_name" : "maxpl0it\/CVE-2020-1350-DoS" ,
"owner" : {
"login" : "maxpl0it" ,
"id" : 27973683 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/maxpl0it" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS" ,
"description" : "A denial-of-service proof-of-concept for CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-15T23:00:00Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:47Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-17T13:07:29Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 238 ,
"watchers_count" : 238 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
2024-08-22 08:29:46 +02:00
"forks_count" : 48 ,
2023-01-02 13:13:52 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2024-08-22 08:29:46 +02:00
"forks" : 48 ,
2024-08-13 02:29:46 +02:00
"watchers" : 238 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 15
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 280207373 ,
"name" : "CVE-2020-1350" ,
"full_name" : "captainGeech42\/CVE-2020-1350" ,
"owner" : {
"login" : "captainGeech42" ,
"id" : 4255667 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/captainGeech42" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/captainGeech42\/CVE-2020-1350" ,
"description" : "Denial of Service PoC for CVE-2020-1350 (SIGRed)" ,
"fork" : false ,
"created_at" : "2020-07-16T16:46:48Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:49Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-16T18:32:04Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 18 ,
"watchers_count" : 18 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 3 ,
2024-08-13 02:29:46 +02:00
"watchers" : 18 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-11-06 01:25:08 +01:00
"subscribers_count" : 3
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 280336928 ,
"name" : "CVE-2020-1350" ,
"full_name" : "connormcgarr\/CVE-2020-1350" ,
"owner" : {
"login" : "connormcgarr" ,
"id" : 45445720 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/connormcgarr" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/connormcgarr\/CVE-2020-1350" ,
"description" : "CVE-2020-1350 Proof-of-Concept" ,
"fork" : false ,
"created_at" : "2020-07-17T05:41:19Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:50Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-27T16:20:06Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 11 ,
"watchers_count" : 11 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 11 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 280665873 ,
"name" : "CVE-2020-1350" ,
"full_name" : "graph-inc\/CVE-2020-1350" ,
"owner" : {
"login" : "graph-inc" ,
"id" : 68469953 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/graph-inc" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/graph-inc\/CVE-2020-1350" ,
"description" : "Scanner and Mitigator for CVE 2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-18T13:49:54Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:53Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-18T14:05:55Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 2 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 1
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 280916907 ,
"name" : "CVE-2020-1350" ,
"full_name" : "CVEmaster\/CVE-2020-1350" ,
"owner" : {
"login" : "CVEmaster" ,
"id" : 68512490 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/CVEmaster" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/CVEmaster\/CVE-2020-1350" ,
"description" : "DNS Vulnerability - CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-19T17:32:47Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:03:55Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-20T14:25:59Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 0
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 281667659 ,
"name" : "cve-2020-1350" ,
"full_name" : "gdwnet\/cve-2020-1350" ,
"owner" : {
"login" : "gdwnet" ,
"id" : 19855556 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/gdwnet" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/gdwnet\/cve-2020-1350" ,
"description" : "A powershell script to deploy the registry mitigation key for CVE-2020-1350" ,
"fork" : false ,
"created_at" : "2020-07-22T12:11:33Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:04:00Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-22T12:15:00Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
2024-08-13 02:29:46 +02:00
"watchers" : 0 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
"subscribers_count" : 2
2023-01-02 13:13:52 +01:00
} ,
{
"id" : 282558950 ,
"name" : "CVE-2020-1350-Fix" ,
"full_name" : "simeononsecurity\/CVE-2020-1350-Fix" ,
"owner" : {
"login" : "simeononsecurity" ,
"id" : 4913771 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4" ,
2024-10-18 02:30:24 +02:00
"html_url" : "https:\/\/github.com\/simeononsecurity" ,
"user_view_type" : "public"
2023-01-02 13:13:52 +01:00
} ,
"html_url" : "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix" ,
"description" : "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence." ,
"fork" : false ,
"created_at" : "2020-07-26T02:12:36Z" ,
2024-08-13 02:29:46 +02:00
"updated_at" : "2024-08-12T20:04:07Z" ,
2023-01-02 13:13:52 +01:00
"pushed_at" : "2020-07-26T02:13:24Z" ,
2024-08-13 02:29:46 +02:00
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
2023-01-02 13:13:52 +01:00
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 2 ,
2024-08-13 02:29:46 +02:00
"watchers" : 2 ,
2023-06-19 15:46:37 +02:00
"score" : 0 ,
2023-08-21 02:29:26 +02:00
"subscribers_count" : 2
2020-12-30 22:09:58 +01:00
}
]