[
    {
        "id": 246641886,
        "name": "NSE-scripts",
        "full_name": "psc4re\/NSE-scripts",
        "owner": {
            "login": "psc4re",
            "id": 4672886,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
            "html_url": "https:\/\/github.com\/psc4re"
        },
        "html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
        "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
        "fork": false,
        "created_at": "2020-03-11T17:51:29Z",
        "updated_at": "2022-11-23T23:55:39Z",
        "pushed_at": "2021-08-16T18:16:20Z",
        "stargazers_count": 140,
        "watchers_count": 140,
        "has_discussions": false,
        "forks_count": 27,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2020-1350",
            "cve-2021-21972",
            "cve-2021-34473",
            "nmap",
            "nmap-scan-script",
            "nmap-scripts",
            "nse-script",
            "poc",
            "proxyshell",
            "scanner",
            "sigred",
            "smbghost",
            "smbv3",
            "vcenter",
            "vulnerability",
            "vulnerability-detection"
        ],
        "visibility": "public",
        "forks": 27,
        "watchers": 140,
        "score": 0
    },
    {
        "id": 279670211,
        "name": "CVE-2020-1350_HoneyPoC",
        "full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
        "owner": {
            "login": "ZephrFish",
            "id": 5783068,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
            "html_url": "https:\/\/github.com\/ZephrFish"
        },
        "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
        "description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
        "fork": false,
        "created_at": "2020-07-14T19:02:25Z",
        "updated_at": "2022-11-29T03:32:04Z",
        "pushed_at": "2021-06-10T02:46:52Z",
        "stargazers_count": 272,
        "watchers_count": 272,
        "has_discussions": false,
        "forks_count": 77,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2020-1350",
            "sigred"
        ],
        "visibility": "public",
        "forks": 77,
        "watchers": 272,
        "score": 0
    },
    {
        "id": 280336928,
        "name": "CVE-2020-1350",
        "full_name": "connormcgarr\/CVE-2020-1350",
        "owner": {
            "login": "connormcgarr",
            "id": 45445720,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
            "html_url": "https:\/\/github.com\/connormcgarr"
        },
        "html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
        "description": "CVE-2020-1350 Proof-of-Concept",
        "fork": false,
        "created_at": "2020-07-17T05:41:19Z",
        "updated_at": "2022-08-29T16:44:17Z",
        "pushed_at": "2020-07-27T16:20:06Z",
        "stargazers_count": 10,
        "watchers_count": 10,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 10,
        "score": 0
    },
    {
        "id": 280916907,
        "name": "CVE-2020-1350",
        "full_name": "CVEmaster\/CVE-2020-1350",
        "owner": {
            "login": "CVEmaster",
            "id": 68512490,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
            "html_url": "https:\/\/github.com\/CVEmaster"
        },
        "html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
        "description": "DNS Vulnerability - CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-19T17:32:47Z",
        "updated_at": "2020-10-10T20:39:05Z",
        "pushed_at": "2020-07-20T14:25:59Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 281667659,
        "name": "cve-2020-1350",
        "full_name": "gdwnet\/cve-2020-1350",
        "owner": {
            "login": "gdwnet",
            "id": 19855556,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
            "html_url": "https:\/\/github.com\/gdwnet"
        },
        "html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
        "description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-22T12:11:33Z",
        "updated_at": "2020-10-10T20:40:26Z",
        "pushed_at": "2020-07-22T12:15:00Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 282558950,
        "name": "CVE-2020-1350-Fix",
        "full_name": "simeononsecurity\/CVE-2020-1350-Fix",
        "owner": {
            "login": "simeononsecurity",
            "id": 4913771,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
            "html_url": "https:\/\/github.com\/simeononsecurity"
        },
        "html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
        "description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
        "fork": false,
        "created_at": "2020-07-26T02:12:36Z",
        "updated_at": "2020-10-10T20:40:04Z",
        "pushed_at": "2020-07-26T02:13:24Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 2,
        "score": 0
    }
]