Auto Update 2020/09/29 00:10:05

This commit is contained in:
motikan2010-bot 2020-09-29 00:10:05 +09:00
parent c93cf6da0a
commit 00645ba0fa
25 changed files with 176 additions and 176 deletions

View file

@ -13,13 +13,13 @@
"description": "Proof of concept for CVE-2015-7547",
"fork": false,
"created_at": "2016-02-10T21:13:54Z",
"updated_at": "2020-09-23T21:11:56Z",
"updated_at": "2020-09-28T12:57:46Z",
"pushed_at": "2016-02-20T07:57:58Z",
"stargazers_count": 546,
"watchers_count": 546,
"stargazers_count": 547,
"watchers_count": 547,
"forks_count": 179,
"forks": 179,
"watchers": 546,
"watchers": 547,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2017-09-23T05:11:45Z",
"stargazers_count": 427,
"watchers_count": 427,
"forks_count": 192,
"forks": 192,
"forks_count": 191,
"forks": 191,
"watchers": 427,
"score": 0
},

View file

@ -128,13 +128,13 @@
"description": "forked from https:\/\/github.com\/s3xy\/CVE-2017-10271. Vulnerability in the Oracle WebLogic Server component of Oracle Fusion Middleware (subcomponent: WLS Security). Supported versions that are affected are 10.3.6.0.0, 12.1.3.0.0, 12.2.1.1.0 and 12.2.1.2.0. Easily exploitable vulnerability allows unauthenticated attacker with network access via HTTP to compromise Oracle WebLogic Server.Modified by hanc00l",
"fork": false,
"created_at": "2018-01-03T06:14:28Z",
"updated_at": "2020-03-05T08:20:20Z",
"updated_at": "2020-09-28T14:29:52Z",
"pushed_at": "2018-01-03T00:42:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 38,
"forks": 38,
"watchers": 2,
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 39,
"forks": 39,
"watchers": 3,
"score": 0
},
{

View file

@ -17,8 +17,8 @@
"pushed_at": "2018-08-31T01:54:40Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"forks_count": 4,
"forks": 4,
"watchers": 3,
"score": 0
}

View file

@ -59,13 +59,13 @@
"description": "SambaCry exploit and vulnerable container (CVE-2017-7494)",
"fork": false,
"created_at": "2017-05-26T00:58:25Z",
"updated_at": "2020-09-25T17:35:33Z",
"updated_at": "2020-09-28T14:01:53Z",
"pushed_at": "2017-10-31T16:20:29Z",
"stargazers_count": 246,
"watchers_count": 246,
"stargazers_count": 247,
"watchers_count": 247,
"forks_count": 88,
"forks": 88,
"watchers": 246,
"watchers": 247,
"score": 0
},
{

View file

@ -40,8 +40,8 @@
"pushed_at": "2020-07-24T17:54:54Z",
"stargazers_count": 468,
"watchers_count": 468,
"forks_count": 115,
"forks": 115,
"forks_count": 114,
"forks": 114,
"watchers": 468,
"score": 0
},

View file

@ -36,13 +36,13 @@
"description": "一款功能强大的漏洞扫描器子域名爆破使用aioDNSasyncio异步快速扫描覆盖目标全方位资产进行批量漏洞扫描中间件信息收集自动收集ip代理探测Waf信息时自动使用来保护本机真实Ip在本机Ip被Waf杀死后自动切换代理Ip进行扫描Waf信息收集(国内外100+款waf信息)包括安全狗云锁阿里云云盾腾讯云等提供部分已知waf bypass 方案,中间件漏洞检测(Thinkphp,weblogic等 CVE-2018-5955,CVE-2018-12613,CVE-2018-11759等)支持SQL注入, XSS, 命令执行,文件包含, ssrf 漏洞扫描, 支持自定义漏洞邮箱推送功能",
"fork": false,
"created_at": "2019-12-21T22:45:55Z",
"updated_at": "2020-09-23T02:27:42Z",
"updated_at": "2020-09-28T11:09:04Z",
"pushed_at": "2020-01-05T21:46:25Z",
"stargazers_count": 309,
"watchers_count": 309,
"stargazers_count": 310,
"watchers_count": 310,
"forks_count": 71,
"forks": 71,
"watchers": 309,
"watchers": 310,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2019-04-08T08:26:26Z",
"stargazers_count": 125,
"watchers_count": 125,
"forks_count": 51,
"forks": 51,
"forks_count": 50,
"forks": 50,
"watchers": 125,
"score": 0
},

View file

@ -40,8 +40,8 @@
"pushed_at": "2018-10-30T01:48:42Z",
"stargazers_count": 62,
"watchers_count": 62,
"forks_count": 17,
"forks": 17,
"forks_count": 16,
"forks": 16,
"watchers": 62,
"score": 0
},

View file

@ -312,13 +312,13 @@
"description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)",
"fork": false,
"created_at": "2019-05-15T15:01:38Z",
"updated_at": "2020-09-27T21:04:12Z",
"updated_at": "2020-09-28T12:14:33Z",
"pushed_at": "2019-06-13T13:07:03Z",
"stargazers_count": 335,
"watchers_count": 335,
"stargazers_count": 336,
"watchers_count": 336,
"forks_count": 189,
"forks": 189,
"watchers": 335,
"watchers": 336,
"score": 0
},
{
@ -2164,14 +2164,14 @@
{
"id": 206928449,
"name": "CVE-2019-0708-BlueKeep",
"full_name": "adkinguzi\/CVE-2019-0708-BlueKeep",
"full_name": "upknboy\/CVE-2019-0708-BlueKeep",
"owner": {
"login": "adkinguzi",
"login": "upknboy",
"id": 31617622,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4",
"html_url": "https:\/\/github.com\/adkinguzi"
"html_url": "https:\/\/github.com\/upknboy"
},
"html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep",
"html_url": "https:\/\/github.com\/upknboy\/CVE-2019-0708-BlueKeep",
"description": null,
"fork": false,
"created_at": "2019-09-07T06:50:47Z",
@ -2497,13 +2497,13 @@
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-08-29T05:47:05Z",
"updated_at": "2020-09-28T12:13:48Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 58,
"watchers_count": 58,
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 20,
"forks": 20,
"watchers": 58,
"watchers": 59,
"score": 0
},
{

View file

@ -13,13 +13,13 @@
"description": "An exploit for CVE-2019-17026. It pops xcalc and was tested on Ubuntu (x64).",
"fork": false,
"created_at": "2020-08-27T19:32:07Z",
"updated_at": "2020-09-18T10:30:07Z",
"updated_at": "2020-09-28T14:02:50Z",
"pushed_at": "2020-08-27T19:33:42Z",
"stargazers_count": 42,
"watchers_count": 42,
"stargazers_count": 43,
"watchers_count": 43,
"forks_count": 16,
"forks": 16,
"watchers": 42,
"watchers": 43,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": null,
"fork": false,
"created_at": "2019-10-04T06:32:08Z",
"updated_at": "2020-09-11T14:56:11Z",
"updated_at": "2020-09-28T11:10:48Z",
"pushed_at": "2019-11-12T03:58:00Z",
"stargazers_count": 60,
"watchers_count": 60,
"stargazers_count": 61,
"watchers_count": 61,
"forks_count": 24,
"forks": 24,
"watchers": 60,
"watchers": 61,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": "Temproot for Pixel 2 and Pixel 2 XL via CVE-2019-2215",
"fork": false,
"created_at": "2019-10-14T17:27:37Z",
"updated_at": "2020-09-10T14:31:55Z",
"updated_at": "2020-09-28T11:27:15Z",
"pushed_at": "2019-10-15T01:04:08Z",
"stargazers_count": 52,
"watchers_count": 52,
"stargazers_count": 53,
"watchers_count": 53,
"forks_count": 39,
"forks": 39,
"watchers": 52,
"watchers": 53,
"score": 0
},
{

View file

@ -772,13 +772,13 @@
"description": "CVE-2020-0796.SMBGhost_Crash_Poc ",
"fork": false,
"created_at": "2020-03-18T08:29:28Z",
"updated_at": "2020-07-15T08:20:44Z",
"updated_at": "2020-09-28T14:23:34Z",
"pushed_at": "2020-03-18T08:57:36Z",
"stargazers_count": 9,
"watchers_count": 9,
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 7,
"forks": 7,
"watchers": 9,
"watchers": 10,
"score": 0
},
{
@ -1094,13 +1094,13 @@
"description": "CVE-2020-0796 Remote Code Execution POC",
"fork": false,
"created_at": "2020-04-20T14:35:48Z",
"updated_at": "2020-09-28T02:44:36Z",
"updated_at": "2020-09-28T13:32:37Z",
"pushed_at": "2020-06-09T20:46:45Z",
"stargazers_count": 320,
"watchers_count": 320,
"stargazers_count": 321,
"watchers_count": 321,
"forks_count": 103,
"forks": 103,
"watchers": 320,
"watchers": 321,
"score": 0
},
{
@ -1264,29 +1264,6 @@
"watchers": 0,
"score": 0
},
{
"id": 268985001,
"name": "SMBGhost",
"full_name": "fdbao\/SMBGhost",
"owner": {
"login": "fdbao",
"id": 38367799,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/38367799?v=4",
"html_url": "https:\/\/github.com\/fdbao"
},
"html_url": "https:\/\/github.com\/fdbao\/SMBGhost",
"description": "批量测试CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-06-03T03:59:49Z",
"updated_at": "2020-07-14T08:05:05Z",
"pushed_at": "2020-06-03T04:01:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 270919583,
"name": "CVE-2020-0796",
@ -1333,6 +1310,29 @@
"watchers": 63,
"score": 0
},
{
"id": 271468541,
"name": "SMBGhost",
"full_name": "1060275195\/SMBGhost",
"owner": {
"login": "1060275195",
"id": 37568190,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/37568190?v=4",
"html_url": "https:\/\/github.com\/1060275195"
},
"html_url": "https:\/\/github.com\/1060275195\/SMBGhost",
"description": "批量测试CVE-2020-0796 - SMBv3 RCE",
"fork": false,
"created_at": "2020-06-11T06:24:30Z",
"updated_at": "2020-09-28T13:21:59Z",
"pushed_at": "2020-06-03T04:01:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 273582266,
"name": "SMBGhost-LPE-Metasploit-Module",

View file

@ -13,13 +13,13 @@
"description": "Exploit Code for CVE-2020-1283 - Windows-Denial-of-Service-Vulnerability",
"fork": false,
"created_at": "2020-04-17T09:21:36Z",
"updated_at": "2020-09-23T13:46:00Z",
"updated_at": "2020-09-28T13:42:30Z",
"pushed_at": "2020-06-16T08:08:46Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 2,
"forks": 2,
"watchers": 4,
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 4,
"forks": 4,
"watchers": 5,
"score": 0
}
]

View file

@ -17,8 +17,8 @@
"pushed_at": "2020-08-17T16:49:35Z",
"stargazers_count": 34,
"watchers_count": 34,
"forks_count": 10,
"forks": 10,
"forks_count": 11,
"forks": 11,
"watchers": 34,
"score": 0
},

View file

@ -13,8 +13,8 @@
"description": "This repository holds the advisory of the CVE-2020-14294",
"fork": false,
"created_at": "2020-09-24T08:49:05Z",
"updated_at": "2020-09-24T09:55:20Z",
"pushed_at": "2020-09-24T09:54:51Z",
"updated_at": "2020-09-28T13:11:18Z",
"pushed_at": "2020-09-28T13:11:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,

View file

@ -36,13 +36,13 @@
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2020-09-28T06:46:05Z",
"updated_at": "2020-09-28T14:37:53Z",
"pushed_at": "2020-09-23T07:04:58Z",
"stargazers_count": 1068,
"watchers_count": 1068,
"forks_count": 223,
"forks": 223,
"watchers": 1068,
"stargazers_count": 1072,
"watchers_count": 1072,
"forks_count": 224,
"forks": 224,
"watchers": 1072,
"score": 0
},
{
@ -59,13 +59,13 @@
"description": null,
"fork": false,
"created_at": "2020-09-14T16:52:37Z",
"updated_at": "2020-09-23T15:58:50Z",
"updated_at": "2020-09-28T12:25:26Z",
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 27,
"watchers_count": 27,
"stargazers_count": 28,
"watchers_count": 28,
"forks_count": 5,
"forks": 5,
"watchers": 27,
"watchers": 28,
"score": 0
},
{
@ -82,13 +82,13 @@
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2020-09-28T06:19:59Z",
"updated_at": "2020-09-28T13:08:59Z",
"pushed_at": "2020-09-25T15:32:01Z",
"stargazers_count": 619,
"watchers_count": 619,
"forks_count": 178,
"forks": 178,
"watchers": 619,
"stargazers_count": 621,
"watchers_count": 621,
"forks_count": 179,
"forks": 179,
"watchers": 621,
"score": 0
},
{
@ -128,13 +128,13 @@
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2020-09-28T08:18:20Z",
"updated_at": "2020-09-28T13:38:08Z",
"pushed_at": "2020-09-17T18:06:57Z",
"stargazers_count": 145,
"watchers_count": 145,
"forks_count": 50,
"forks": 50,
"watchers": 145,
"stargazers_count": 146,
"watchers_count": 146,
"forks_count": 51,
"forks": 51,
"watchers": 146,
"score": 0
},
{
@ -151,13 +151,13 @@
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2020-09-28T01:47:51Z",
"updated_at": "2020-09-28T09:55:52Z",
"pushed_at": "2020-09-16T14:05:27Z",
"stargazers_count": 104,
"watchers_count": 104,
"stargazers_count": 105,
"watchers_count": 105,
"forks_count": 26,
"forks": 26,
"watchers": 104,
"watchers": 105,
"score": 0
},
{
@ -335,13 +335,13 @@
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2020-09-27T02:03:32Z",
"updated_at": "2020-09-28T14:06:18Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 28,
"watchers_count": 28,
"stargazers_count": 29,
"watchers_count": 29,
"forks_count": 5,
"forks": 5,
"watchers": 28,
"watchers": 29,
"score": 0
},
{
@ -574,29 +574,6 @@
"watchers": 0,
"score": 0
},
{
"id": 296960827,
"name": "Zerologon",
"full_name": "batmanli61\/Zerologon",
"owner": {
"login": "batmanli61",
"id": 19485801,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19485801?v=4",
"html_url": "https:\/\/github.com\/batmanli61"
},
"html_url": "https:\/\/github.com\/batmanli61\/Zerologon",
"description": "Zerologon Exploit | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-19T22:21:24Z",
"updated_at": "2020-09-19T22:31:15Z",
"pushed_at": "2020-09-19T22:31:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 296966855,
"name": "CVE-2020-1472",
@ -734,5 +711,28 @@
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 299264416,
"name": "CVE-2020-1472",
"full_name": "Whippet0\/CVE-2020-1472",
"owner": {
"login": "Whippet0",
"id": 46486374,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46486374?v=4",
"html_url": "https:\/\/github.com\/Whippet0"
},
"html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472",
"description": "CVE-2020-1472",
"fork": false,
"created_at": "2020-09-28T09:54:31Z",
"updated_at": "2020-09-28T10:00:34Z",
"pushed_at": "2020-09-28T10:00:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "PoC exploits for CVE-2020-17382",
"fork": false,
"created_at": "2020-09-17T18:26:32Z",
"updated_at": "2020-09-28T09:09:55Z",
"updated_at": "2020-09-28T11:54:35Z",
"pushed_at": "2020-09-26T15:17:50Z",
"stargazers_count": 59,
"watchers_count": 59,
"forks_count": 9,
"forks": 9,
"watchers": 59,
"stargazers_count": 60,
"watchers_count": 60,
"forks_count": 10,
"forks": 10,
"watchers": 60,
"score": 0
}
]

View file

@ -316,8 +316,8 @@
"pushed_at": "2020-03-09T14:51:43Z",
"stargazers_count": 135,
"watchers_count": 135,
"forks_count": 51,
"forks": 51,
"forks_count": 50,
"forks": 50,
"watchers": 135,
"score": 0
},

View file

@ -247,8 +247,8 @@
"pushed_at": "2020-09-28T05:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
}

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-5837 exploit",
"fork": false,
"created_at": "2020-04-16T08:15:18Z",
"updated_at": "2020-09-23T13:45:34Z",
"updated_at": "2020-09-28T13:42:11Z",
"pushed_at": "2020-05-13T09:45:12Z",
"stargazers_count": 30,
"watchers_count": 30,
"forks_count": 11,
"forks": 11,
"watchers": 30,
"stargazers_count": 31,
"watchers_count": 31,
"forks_count": 12,
"forks": 12,
"watchers": 31,
"score": 0
}
]

View file

@ -13,7 +13,7 @@
"description": null,
"fork": false,
"created_at": "2020-04-07T11:17:27Z",
"updated_at": "2020-09-23T13:45:46Z",
"updated_at": "2020-09-28T13:42:23Z",
"pushed_at": "2020-07-14T06:39:31Z",
"stargazers_count": 11,
"watchers_count": 11,

View file

@ -13,13 +13,13 @@
"description": "Hacking Artifactory with server side template injection",
"fork": false,
"created_at": "2020-03-11T13:56:43Z",
"updated_at": "2020-09-28T09:00:39Z",
"updated_at": "2020-09-28T12:55:50Z",
"pushed_at": "2020-03-12T06:55:39Z",
"stargazers_count": 21,
"watchers_count": 21,
"stargazers_count": 22,
"watchers_count": 22,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"watchers": 22,
"score": 0
}
]

View file

@ -13,13 +13,13 @@
"description": "CVE-2020-8103 Link Resolution Privilege Escalation Vulnerability in Bitdefender Antivirus Free",
"fork": false,
"created_at": "2020-04-03T07:57:53Z",
"updated_at": "2020-09-23T13:45:37Z",
"updated_at": "2020-09-28T13:42:18Z",
"pushed_at": "2020-06-08T20:23:53Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"stargazers_count": 12,
"watchers_count": 12,
"forks_count": 4,
"forks": 4,
"watchers": 12,
"score": 0
}
]

View file

@ -310,9 +310,9 @@ A remote code execution vulnerability exists in the way that the Microsoft Serve
- [halsten/CVE-2020-0796](https://github.com/halsten/CVE-2020-0796)
- [ysyyrps123/CVE-2020-0796](https://github.com/ysyyrps123/CVE-2020-0796)
- [ysyyrps123/CVE-2020-0796-exp](https://github.com/ysyyrps123/CVE-2020-0796-exp)
- [fdbao/SMBGhost](https://github.com/fdbao/SMBGhost)
- [exp-sky/CVE-2020-0796](https://github.com/exp-sky/CVE-2020-0796)
- [Barriuso/SMBGhost_AutomateExploitation](https://github.com/Barriuso/SMBGhost_AutomateExploitation)
- [1060275195/SMBGhost](https://github.com/1060275195/SMBGhost)
- [Almorabea/SMBGhost-LPE-Metasploit-Module](https://github.com/Almorabea/SMBGhost-LPE-Metasploit-Module)
- [ZecOps/SMBGhost-SMBleed-scanner](https://github.com/ZecOps/SMBGhost-SMBleed-scanner)
- [getdrive/smbghost](https://github.com/getdrive/smbghost)
@ -521,13 +521,13 @@ An elevation of privilege vulnerability exists when an attacker establishes a vu
- [zeronetworks/zerologon](https://github.com/zeronetworks/zerologon)
- [sv3nbeast/CVE-2020-1472](https://github.com/sv3nbeast/CVE-2020-1472)
- [midpipps/CVE-2020-1472-Easy](https://github.com/midpipps/CVE-2020-1472-Easy)
- [batmanli61/Zerologon](https://github.com/batmanli61/Zerologon)
- [hectorgie/CVE-2020-1472](https://github.com/hectorgie/CVE-2020-1472)
- [johnpathe/zerologon-cve-2020-1472-notes](https://github.com/johnpathe/zerologon-cve-2020-1472-notes)
- [t31m0/CVE-2020-1472](https://github.com/t31m0/CVE-2020-1472)
- [grupooruss/CVE-2020-1472](https://github.com/grupooruss/CVE-2020-1472)
- [striveben/CVE-2020-1472](https://github.com/striveben/CVE-2020-1472)
- [Fa1c0n35/CVE-2020-1472-02-](https://github.com/Fa1c0n35/CVE-2020-1472-02-)
- [Whippet0/CVE-2020-1472](https://github.com/Whippet0/CVE-2020-1472)
### CVE-2020-1493
@ -2554,7 +2554,7 @@ A remote code execution vulnerability exists in Remote Desktop Services formerly
- [wqsemc/CVE-2019-0708](https://github.com/wqsemc/CVE-2019-0708)
- [mai-lang-chai/CVE-2019-0708-RCE](https://github.com/mai-lang-chai/CVE-2019-0708-RCE)
- [Micr067/CVE-2019-0708RDP-MSF](https://github.com/Micr067/CVE-2019-0708RDP-MSF)
- [adkinguzi/CVE-2019-0708-BlueKeep](https://github.com/adkinguzi/CVE-2019-0708-BlueKeep)
- [upknboy/CVE-2019-0708-BlueKeep](https://github.com/upknboy/CVE-2019-0708-BlueKeep)
- [FrostsaberX/CVE-2019-0708](https://github.com/FrostsaberX/CVE-2019-0708)
- [qing-root/CVE-2019-0708-EXP-MSF-](https://github.com/qing-root/CVE-2019-0708-EXP-MSF-)
- [distance-vector/CVE-2019-0708](https://github.com/distance-vector/CVE-2019-0708)