[ { "id": 367930039, "name": "CVE-2021-31166", "full_name": "0vercl0k\/CVE-2021-31166", "owner": { "login": "0vercl0k", "id": 1476421, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4", "html_url": "https:\/\/github.com\/0vercl0k", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166", "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.", "fork": false, "created_at": "2021-05-16T16:15:56Z", "updated_at": "2024-11-06T11:55:26Z", "pushed_at": "2021-06-12T08:27:09Z", "stargazers_count": 821, "watchers_count": 821, "has_discussions": false, "forks_count": 139, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "accept-encoding", "cve-2021-31166", "http", "ulpparsecontentcoding" ], "visibility": "public", "forks": 139, "watchers": 821, "score": 0, "subscribers_count": 23 }, { "id": 368156601, "name": "CVE-2021-31166", "full_name": "zha0gongz1\/CVE-2021-31166", "owner": { "login": "zha0gongz1", "id": 41460798, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4", "html_url": "https:\/\/github.com\/zha0gongz1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166", "description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.", "fork": false, "created_at": "2021-05-17T11:12:45Z", "updated_at": "2024-08-12T20:13:05Z", "pushed_at": "2021-05-17T11:30:26Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "accept-encoding", "cve-2021-31166", "rce" ], "visibility": "public", "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 368306577, "name": "CVE-2021-31166-detection-rules", "full_name": "mvlnetdev\/CVE-2021-31166-detection-rules", "owner": { "login": "mvlnetdev", "id": 41307333, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4", "html_url": "https:\/\/github.com\/mvlnetdev", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules", "description": "Different rules to detect if CVE-2021-31166 is being exploited", "fork": false, "created_at": "2021-05-17T19:55:41Z", "updated_at": "2022-07-21T02:50:56Z", "pushed_at": "2022-02-26T12:52:37Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 368350830, "name": "CVE-2021-31166", "full_name": "corelight\/CVE-2021-31166", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166", "description": "HTTP Protocol Stack CVE-2021-31166", "fork": false, "created_at": "2021-05-17T23:54:12Z", "updated_at": "2024-10-18T12:05:37Z", "pushed_at": "2024-10-17T04:45:50Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 13, "score": 0, "subscribers_count": 12 }, { "id": 368786720, "name": "CVE-2021-31166", "full_name": "zecopro\/CVE-2021-31166", "owner": { "login": "zecopro", "id": 23106986, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4", "html_url": "https:\/\/github.com\/zecopro", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166", "description": "simple bash script for exploit CVE-2021-31166", "fork": false, "created_at": "2021-05-19T07:50:40Z", "updated_at": "2023-10-11T14:36:15Z", "pushed_at": "2021-05-19T08:18:56Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 370131263, "name": "WIn-CVE-2021-31166", "full_name": "bgsilvait\/WIn-CVE-2021-31166", "owner": { "login": "bgsilvait", "id": 38823062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4", "html_url": "https:\/\/github.com\/bgsilvait", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166", "description": null, "fork": false, "created_at": "2021-05-23T18:41:48Z", "updated_at": "2021-05-23T19:32:43Z", "pushed_at": "2021-05-23T19:32:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 382641118, "name": "CVE-2021-31166-Exploit", "full_name": "y0g3sh-99\/CVE-2021-31166-Exploit", "owner": { "login": "y0g3sh-99", "id": 59962466, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4", "html_url": "https:\/\/github.com\/y0g3sh-99", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit", "description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)", "fork": false, "created_at": "2021-07-03T14:54:59Z", "updated_at": "2022-01-18T13:29:37Z", "pushed_at": "2021-07-03T15:27:28Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "accept-encoding", "cve-2021-31166", "dos", "exploit", "http", "kernel", "python3", "rce", "request-header", "vulnerability", "windows" ], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 410758909, "name": "CVE-2021-31166", "full_name": "ZZ-SOCMAP\/CVE-2021-31166", "owner": { "login": "ZZ-SOCMAP", "id": 98105412, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98105412?v=4", "html_url": "https:\/\/github.com\/ZZ-SOCMAP", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ZZ-SOCMAP\/CVE-2021-31166", "description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166", "fork": false, "created_at": "2021-09-27T05:56:45Z", "updated_at": "2024-09-19T01:56:46Z", "pushed_at": "2021-11-04T02:23:11Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 19, "score": 0, "subscribers_count": 1 }, { "id": 419230261, "name": "CVE-2021-31166-exploit", "full_name": "imikoYa\/CVE-2021-31166-exploit", "owner": { "login": "imikoYa", "id": 92157170, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92157170?v=4", "html_url": "https:\/\/github.com\/imikoYa", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imikoYa\/CVE-2021-31166-exploit", "description": "Just a simple CVE-2021-31166 exploit tool", "fork": false, "created_at": "2021-10-20T07:37:46Z", "updated_at": "2023-08-24T06:19:05Z", "pushed_at": "2021-10-20T07:50:52Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 467221883, "name": "CVE-2021-31166", "full_name": "mauricelambert\/CVE-2021-31166", "owner": { "login": "mauricelambert", "id": 50479118, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4", "html_url": "https:\/\/github.com\/mauricelambert", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166", "description": "CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.", "fork": false, "created_at": "2022-03-07T18:56:52Z", "updated_at": "2023-04-23T11:13:47Z", "pushed_at": "2022-03-16T21:21:14Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bluescreen", "crash", "cve", "cve-2021-31166", "denial-of-service", "dos", "exploit", "iis", "metasploit", "microsoft", "nmap", "payload", "powershell", "python3", "ruby", "vulnerability", "webserver" ], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 569183785, "name": "Home-Demolisher", "full_name": "0xmaximus\/Home-Demolisher", "owner": { "login": "0xmaximus", "id": 63053441, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4", "html_url": "https:\/\/github.com\/0xmaximus", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xmaximus\/Home-Demolisher", "description": "PoC for CVE-2021-31166 and CVE-2022-21907", "fork": false, "created_at": "2022-11-22T09:10:36Z", "updated_at": "2024-10-03T05:16:45Z", "pushed_at": "2022-12-08T11:05:50Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 3 } ]