[ { "id": 302145941, "name": "CVE-2020-16898", "full_name": "advanced-threat-research\/CVE-2020-16898", "owner": { "login": "advanced-threat-research", "id": 27901279, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4", "html_url": "https:\/\/github.com\/advanced-threat-research", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898", "description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule", "fork": false, "created_at": "2020-10-07T19:56:09Z", "updated_at": "2024-12-02T17:52:16Z", "pushed_at": "2020-10-26T10:15:32Z", "stargazers_count": 208, "watchers_count": 208, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "atr", "bad-neighbor", "badneighbor", "buffer-overflow", "buffer-overflow-vulnerability", "cve", "cve-2020-16898", "icmpv6", "lua", "mcafee", "microsoft", "neighbor-discovery", "neighbor-discovery-protocol", "rce", "suricata", "suricata-rule", "tcpip-stack", "windows-10" ], "visibility": "public", "forks": 31, "watchers": 208, "score": 0, "subscribers_count": 18 }, { "id": 303891965, "name": "CVE-2020-16898", "full_name": "corelight\/CVE-2020-16898", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898", "description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)", "fork": false, "created_at": "2020-10-14T03:25:00Z", "updated_at": "2024-10-12T10:28:29Z", "pushed_at": "2024-09-03T18:23:10Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 9, "score": 0, "subscribers_count": 13 }, { "id": 304024639, "name": "CVE-2020-16898_Check", "full_name": "Maliek\/CVE-2020-16898_Check", "owner": { "login": "Maliek", "id": 8858341, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8858341?v=4", "html_url": "https:\/\/github.com\/Maliek", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check", "description": "Minor powershell script that checks for vulnerable interfaces.", "fork": false, "created_at": "2020-10-14T13:30:38Z", "updated_at": "2020-10-16T09:20:02Z", "pushed_at": "2020-10-16T09:20:00Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 304044860, "name": "CVE-2020-16898", "full_name": "ZephrFish\/CVE-2020-16898", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898", "description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).", "fork": false, "created_at": "2020-10-14T14:42:52Z", "updated_at": "2023-03-01T05:20:04Z", "pushed_at": "2020-10-14T16:56:04Z", "stargazers_count": 20, "watchers_count": 20, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 20, "score": 0, "subscribers_count": 2 }, { "id": 304075693, "name": "cve-2020-16898", "full_name": "esnet-security\/cve-2020-16898", "owner": { "login": "esnet-security", "id": 46755983, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46755983?v=4", "html_url": "https:\/\/github.com\/esnet-security", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898", "description": "Detects CVE-2020-16898: \"Bad Neighbor\"", "fork": false, "created_at": "2020-10-14T16:38:06Z", "updated_at": "2020-10-15T15:39:52Z", "pushed_at": "2020-10-15T23:00:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 5 }, { "id": 304139222, "name": "CVE-2020-16898-Bad-Neighbor", "full_name": "initconf\/CVE-2020-16898-Bad-Neighbor", "owner": { "login": "initconf", "id": 4044729, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4", "html_url": "https:\/\/github.com\/initconf", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor", "description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"", "fork": false, "created_at": "2020-10-14T21:25:09Z", "updated_at": "2023-03-21T04:55:12Z", "pushed_at": "2020-10-22T21:12:03Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 304538917, "name": "CVE-2020-16898", "full_name": "Q1984\/CVE-2020-16898", "owner": { "login": "Q1984", "id": 50952023, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952023?v=4", "html_url": "https:\/\/github.com\/Q1984", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898", "description": "PoC Bad Neighbor BSOD exploit", "fork": false, "created_at": "2020-10-16T06:27:24Z", "updated_at": "2022-08-21T16:31:19Z", "pushed_at": "2020-10-16T11:17:22Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 304755825, "name": "cve-2020-16898", "full_name": "0xeb-bp\/cve-2020-16898", "owner": { "login": "0xeb-bp", "id": 53204152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4", "html_url": "https:\/\/github.com\/0xeb-bp", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898", "description": "PoC BSOD for CVE-2020-16898 (badneighbor)", "fork": false, "created_at": "2020-10-16T23:03:15Z", "updated_at": "2024-09-02T07:58:55Z", "pushed_at": "2020-10-16T23:12:52Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 21, "score": 0, "subscribers_count": 3 }, { "id": 304797048, "name": "cve-2020-16898", "full_name": "jiansiting\/cve-2020-16898", "owner": { "login": "jiansiting", "id": 28823754, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4", "html_url": "https:\/\/github.com\/jiansiting", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898", "description": "PoC BSOD for CVE-2020-16898", "fork": false, "created_at": "2020-10-17T04:32:11Z", "updated_at": "2024-09-02T07:59:28Z", "pushed_at": "2020-10-17T04:32:19Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 9, "score": 0, "subscribers_count": 2 }, { "id": 304819444, "name": "CVE-2020-16898_Workaround", "full_name": "CPO-EH\/CVE-2020-16898_Workaround", "owner": { "login": "CPO-EH", "id": 56457033, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4", "html_url": "https:\/\/github.com\/CPO-EH", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround", "description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability", "fork": false, "created_at": "2020-10-17T07:09:58Z", "updated_at": "2020-10-21T16:45:04Z", "pushed_at": "2020-10-21T16:45:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 304851828, "name": "CVE-2020-16898_Checker", "full_name": "CPO-EH\/CVE-2020-16898_Checker", "owner": { "login": "CPO-EH", "id": 56457033, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4", "html_url": "https:\/\/github.com\/CPO-EH", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker", "description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability", "fork": false, "created_at": "2020-10-17T10:23:56Z", "updated_at": "2020-10-21T17:45:24Z", "pushed_at": "2020-10-21T17:45:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 304888543, "name": "CVE-2020-16898-exp", "full_name": "momika233\/CVE-2020-16898-exp", "owner": { "login": "momika233", "id": 56291820, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4", "html_url": "https:\/\/github.com\/momika233", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp", "description": null, "fork": false, "created_at": "2020-10-17T13:52:08Z", "updated_at": "2024-08-12T20:06:50Z", "pushed_at": "2020-10-17T13:52:38Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 18, "score": 0, "subscribers_count": 1 }, { "id": 305598825, "name": "CVE-2020-16898-EXP-POC", "full_name": "komomon\/CVE-2020-16898-EXP-POC", "owner": { "login": "komomon", "id": 52700174, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4", "html_url": "https:\/\/github.com\/komomon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC", "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-20T05:24:47Z", "updated_at": "2023-11-08T06:40:28Z", "pushed_at": "2020-10-28T11:21:00Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 307994197, "name": "CVE-2020-16898--EXP-POC", "full_name": "komomon\/CVE-2020-16898--EXP-POC", "owner": { "login": "komomon", "id": 52700174, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4", "html_url": "https:\/\/github.com\/komomon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC", "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-28T11:25:58Z", "updated_at": "2024-08-12T20:07:09Z", "pushed_at": "2020-10-28T11:27:17Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 13, "score": 0, "subscribers_count": 3 } ]