[ { "id": 246641886, "name": "NSE-scripts", "full_name": "psc4re\/NSE-scripts", "owner": { "login": "psc4re", "id": 4672886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4", "html_url": "https:\/\/github.com\/psc4re" }, "html_url": "https:\/\/github.com\/psc4re\/NSE-scripts", "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473", "fork": false, "created_at": "2020-03-11T17:51:29Z", "updated_at": "2023-04-22T15:39:57Z", "pushed_at": "2021-08-16T18:16:20Z", "stargazers_count": 156, "watchers_count": 156, "has_discussions": false, "forks_count": 28, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-1350", "cve-2021-21972", "cve-2021-34473", "nmap", "nmap-scan-script", "nmap-scripts", "nse-script", "poc", "proxyshell", "scanner", "sigred", "smbghost", "smbv3", "vcenter", "vulnerability", "vulnerability-detection" ], "visibility": "public", "forks": 28, "watchers": 156, "score": 0 }, { "id": 279670211, "name": "CVE-2020-1350_HoneyPoC", "full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC", "description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.", "fork": false, "created_at": "2020-07-14T19:02:25Z", "updated_at": "2023-04-09T19:27:06Z", "pushed_at": "2021-06-10T02:46:52Z", "stargazers_count": 278, "watchers_count": 278, "has_discussions": false, "forks_count": 77, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-1350", "sigred" ], "visibility": "public", "forks": 77, "watchers": 278, "score": 0 }, { "id": 279675165, "name": "CVE-2020-1350", "full_name": "mr-r3b00t\/CVE-2020-1350", "owner": { "login": "mr-r3b00t", "id": 14963690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4", "html_url": "https:\/\/github.com\/mr-r3b00t" }, "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350", "description": null, "fork": false, "created_at": "2020-07-14T19:28:46Z", "updated_at": "2021-05-06T11:57:25Z", "pushed_at": "2020-07-20T06:15:56Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 5, "score": 0 }, { "id": 279701266, "name": "Fake_CVE-2020-1350", "full_name": "zoomerxsec\/Fake_CVE-2020-1350", "owner": { "login": "zoomerxsec", "id": 56858864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4", "html_url": "https:\/\/github.com\/zoomerxsec" }, "html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350", "description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.", "fork": false, "created_at": "2020-07-14T21:55:57Z", "updated_at": "2022-08-18T07:05:31Z", "pushed_at": "2020-07-19T02:29:33Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 8, "score": 0 }, { "id": 279776271, "name": "CVE-2020-1350", "full_name": "T13nn3s\/CVE-2020-1350", "owner": { "login": "T13nn3s", "id": 29333776, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4", "html_url": "https:\/\/github.com\/T13nn3s" }, "html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350", "description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service", "fork": false, "created_at": "2020-07-15T05:46:31Z", "updated_at": "2023-04-01T11:46:35Z", "pushed_at": "2023-04-01T11:46:03Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 14, "score": 0 }, { "id": 279778118, "name": "SIGRed", "full_name": "corelight\/SIGRed", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/SIGRed", "description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)", "fork": false, "created_at": "2020-07-15T05:55:20Z", "updated_at": "2021-01-14T18:47:12Z", "pushed_at": "2020-07-20T02:20:43Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 10, "score": 0 }, { "id": 279961698, "name": "dRMM-CVE-2020-1350-response", "full_name": "jmaddington\/dRMM-CVE-2020-1350-response", "owner": { "login": "jmaddington", "id": 2353597, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4", "html_url": "https:\/\/github.com\/jmaddington" }, "html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response", "description": "Windows registry mitigation response to CVE-2020-1350", "fork": false, "created_at": "2020-07-15T19:43:39Z", "updated_at": "2020-10-10T20:38:31Z", "pushed_at": "2020-07-15T19:59:02Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0 }, { "id": 279999285, "name": "CVE-2020-1350-DoS", "full_name": "maxpl0it\/CVE-2020-1350-DoS", "owner": { "login": "maxpl0it", "id": 27973683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4", "html_url": "https:\/\/github.com\/maxpl0it" }, "html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS", "description": "A denial-of-service proof-of-concept for CVE-2020-1350", "fork": false, "created_at": "2020-07-15T23:00:00Z", "updated_at": "2023-03-23T15:21:50Z", "pushed_at": "2020-07-17T13:07:29Z", "stargazers_count": 234, "watchers_count": 234, "has_discussions": false, "forks_count": 51, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 51, "watchers": 234, "score": 0 }, { "id": 280207373, "name": "CVE-2020-1350", "full_name": "captainGeech42\/CVE-2020-1350", "owner": { "login": "captainGeech42", "id": 4255667, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4", "html_url": "https:\/\/github.com\/captainGeech42" }, "html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350", "description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)", "fork": false, "created_at": "2020-07-16T16:46:48Z", "updated_at": "2023-03-23T15:21:50Z", "pushed_at": "2020-07-16T18:32:04Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 19, "score": 0 }, { "id": 280336928, "name": "CVE-2020-1350", "full_name": "connormcgarr\/CVE-2020-1350", "owner": { "login": "connormcgarr", "id": 45445720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4", "html_url": "https:\/\/github.com\/connormcgarr" }, "html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350", "description": "CVE-2020-1350 Proof-of-Concept", "fork": false, "created_at": "2020-07-17T05:41:19Z", "updated_at": "2023-02-13T11:26:34Z", "pushed_at": "2020-07-27T16:20:06Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 11, "score": 0 }, { "id": 280665873, "name": "CVE-2020-1350", "full_name": "graph-inc\/CVE-2020-1350", "owner": { "login": "graph-inc", "id": 68469953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4", "html_url": "https:\/\/github.com\/graph-inc" }, "html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350", "description": "Scanner and Mitigator for CVE 2020-1350", "fork": false, "created_at": "2020-07-18T13:49:54Z", "updated_at": "2021-01-27T17:38:05Z", "pushed_at": "2020-07-18T14:05:55Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0 }, { "id": 280916907, "name": "CVE-2020-1350", "full_name": "CVEmaster\/CVE-2020-1350", "owner": { "login": "CVEmaster", "id": 68512490, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4", "html_url": "https:\/\/github.com\/CVEmaster" }, "html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350", "description": "DNS Vulnerability - CVE-2020-1350", "fork": false, "created_at": "2020-07-19T17:32:47Z", "updated_at": "2020-10-10T20:39:05Z", "pushed_at": "2020-07-20T14:25:59Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 281667659, "name": "cve-2020-1350", "full_name": "gdwnet\/cve-2020-1350", "owner": { "login": "gdwnet", "id": 19855556, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4", "html_url": "https:\/\/github.com\/gdwnet" }, "html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350", "description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350", "fork": false, "created_at": "2020-07-22T12:11:33Z", "updated_at": "2020-10-10T20:40:26Z", "pushed_at": "2020-07-22T12:15:00Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 282558950, "name": "CVE-2020-1350-Fix", "full_name": "simeononsecurity\/CVE-2020-1350-Fix", "owner": { "login": "simeononsecurity", "id": 4913771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4", "html_url": "https:\/\/github.com\/simeononsecurity" }, "html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix", "description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.", "fork": false, "created_at": "2020-07-26T02:12:36Z", "updated_at": "2023-02-11T20:24:43Z", "pushed_at": "2020-07-26T02:13:24Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 302986138, "name": "CVE-2020-1350-checker.ps1", "full_name": "5l1v3r1\/CVE-2020-1350-checker.ps1", "owner": { "login": "5l1v3r1", "id": 34143537, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34143537?v=4", "html_url": "https:\/\/github.com\/5l1v3r1" }, "html_url": "https:\/\/github.com\/5l1v3r1\/CVE-2020-1350-checker.ps1", "description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.", "fork": false, "created_at": "2020-10-10T20:40:46Z", "updated_at": "2022-10-06T15:48:12Z", "pushed_at": "2020-07-20T09:12:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]