[ { "id": 437314230, "name": "sam-the-admin", "full_name": "WazeHell\/sam-the-admin", "owner": { "login": "WazeHell", "id": 20618414, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4", "html_url": "https:\/\/github.com\/WazeHell" }, "html_url": "https:\/\/github.com\/WazeHell\/sam-the-admin", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", "updated_at": "2022-12-22T08:45:13Z", "pushed_at": "2022-07-10T22:23:13Z", "stargazers_count": 867, "watchers_count": 867, "has_discussions": false, "forks_count": 181, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "active-directory", "exploitation", "redteam", "s4u2self" ], "visibility": "public", "forks": 181, "watchers": 867, "score": 0 }, { "id": 437829160, "name": "noPac", "full_name": "Ridter\/noPac", "owner": { "login": "Ridter", "id": 6007471, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4", "html_url": "https:\/\/github.com\/Ridter" }, "html_url": "https:\/\/github.com\/Ridter\/noPac", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", "updated_at": "2023-01-04T06:10:46Z", "pushed_at": "2022-12-28T22:50:04Z", "stargazers_count": 496, "watchers_count": 496, "has_discussions": false, "forks_count": 90, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 90, "watchers": 496, "score": 0 }, { "id": 437924403, "name": "noPac", "full_name": "waterrr\/noPac", "owner": { "login": "waterrr", "id": 15225499, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4", "html_url": "https:\/\/github.com\/waterrr" }, "html_url": "https:\/\/github.com\/waterrr\/noPac", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287", "fork": false, "created_at": "2021-12-13T15:24:59Z", "updated_at": "2022-06-23T02:19:40Z", "pushed_at": "2021-12-13T15:40:14Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 438053162, "name": "Pachine", "full_name": "ly4k\/Pachine", "owner": { "login": "ly4k", "id": 53348818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4", "html_url": "https:\/\/github.com\/ly4k" }, "html_url": "https:\/\/github.com\/ly4k\/Pachine", "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)", "fork": false, "created_at": "2021-12-13T23:15:05Z", "updated_at": "2022-12-31T11:20:48Z", "pushed_at": "2022-01-13T12:35:19Z", "stargazers_count": 250, "watchers_count": 250, "has_discussions": false, "forks_count": 36, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-42278" ], "visibility": "public", "forks": 36, "watchers": 250, "score": 0 }, { "id": 442163896, "name": "noPac-detection", "full_name": "cybersecurityworks553\/noPac-detection", "owner": { "login": "cybersecurityworks553", "id": 63910792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", "html_url": "https:\/\/github.com\/cybersecurityworks553" }, "html_url": "https:\/\/github.com\/cybersecurityworks553\/noPac-detection", "description": "Detection script for CVE-2021-42278 and CVE-2021-42287", "fork": false, "created_at": "2021-12-27T13:10:45Z", "updated_at": "2022-03-30T06:49:25Z", "pushed_at": "2021-12-27T13:27:33Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0 } ]