[ { "id": 405152543, "name": "CVE-2021-40444", "full_name": "lockedbyte\/CVE-2021-40444", "owner": { "login": "lockedbyte", "id": 37779789, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4", "html_url": "https:\/\/github.com\/lockedbyte" }, "html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444", "description": "CVE-2021-40444 PoC", "fork": false, "created_at": "2021-09-10T16:55:53Z", "updated_at": "2022-02-08T02:55:55Z", "pushed_at": "2021-12-25T18:31:02Z", "stargazers_count": 1363, "watchers_count": 1363, "forks_count": 447, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 447, "watchers": 1363, "score": 0 }, { "id": 405716870, "name": "CVE-2021-40444_builders", "full_name": "aslitsecurity\/CVE-2021-40444_builders", "owner": { "login": "aslitsecurity", "id": 9478055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4", "html_url": "https:\/\/github.com\/aslitsecurity" }, "html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders", "description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit", "fork": false, "created_at": "2021-09-12T18:05:53Z", "updated_at": "2022-01-30T03:23:07Z", "pushed_at": "2021-10-11T20:53:19Z", "stargazers_count": 162, "watchers_count": 162, "forks_count": 44, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 44, "watchers": 162, "score": 0 }, { "id": 406942491, "name": "CVE-2021-40444", "full_name": "klezVirus\/CVE-2021-40444", "owner": { "login": "klezVirus", "id": 8959898, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4", "html_url": "https:\/\/github.com\/klezVirus" }, "html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444", "description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit", "fork": false, "created_at": "2021-09-15T22:34:35Z", "updated_at": "2022-02-04T20:02:46Z", "pushed_at": "2021-10-12T23:05:07Z", "stargazers_count": 567, "watchers_count": 567, "forks_count": 124, "allow_forking": true, "is_template": false, "topics": [ "0day", "cve-2021-40444", "msword", "office", "rce", "remote-code-execution" ], "visibility": "public", "forks": 124, "watchers": 567, "score": 0 }, { "id": 409931314, "name": "CVE-2021-40444_CAB_archives", "full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives", "owner": { "login": "kal1gh0st", "id": 56889513, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4", "html_url": "https:\/\/github.com\/kal1gh0st" }, "html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives", "description": "CVE 2021 40444 Windows Exploit services.dll", "fork": false, "created_at": "2021-09-24T10:59:34Z", "updated_at": "2021-12-15T00:43:34Z", "pushed_at": "2021-10-21T09:46:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 412946991, "name": "CVE-2021-40444", "full_name": "H0j3n\/CVE-2021-40444", "owner": { "login": "H0j3n", "id": 51261763, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4", "html_url": "https:\/\/github.com\/H0j3n" }, "html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-10-03T01:13:42Z", "updated_at": "2022-01-26T02:35:54Z", "pushed_at": "2021-10-10T06:32:11Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "cve-2021-40444" ], "visibility": "public", "forks": 3, "watchers": 9, "score": 0 }, { "id": 417748789, "name": "TIC4301_Project", "full_name": "factionsypho\/TIC4301_Project", "owner": { "login": "factionsypho", "id": 40175487, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4", "html_url": "https:\/\/github.com\/factionsypho" }, "html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project", "description": "TIC4301 Project - CVE-2021-40444", "fork": false, "created_at": "2021-10-16T07:07:26Z", "updated_at": "2021-12-06T13:36:02Z", "pushed_at": "2021-12-06T13:35:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0 }, { "id": 420818304, "name": "CVE-2021-40444", "full_name": "TiagoSergio\/CVE-2021-40444", "owner": { "login": "TiagoSergio", "id": 24528913, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4", "html_url": "https:\/\/github.com\/TiagoSergio" }, "html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-10-24T23:17:12Z", "updated_at": "2021-10-24T23:17:28Z", "pushed_at": "2021-10-24T23:17:25Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 422246280, "name": "CVE-2021-40444-POC", "full_name": "0xK4gura\/CVE-2021-40444-POC", "owner": { "login": "0xK4gura", "id": 92495243, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4", "html_url": "https:\/\/github.com\/0xK4gura" }, "html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC", "description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.", "fork": false, "created_at": "2021-10-28T14:55:46Z", "updated_at": "2022-01-26T02:46:54Z", "pushed_at": "2021-10-31T08:15:00Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0 }, { "id": 425935080, "name": "word_mshtml", "full_name": "Zeop-CyberSec\/word_mshtml", "owner": { "login": "Zeop-CyberSec", "id": 68154603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4", "html_url": "https:\/\/github.com\/Zeop-CyberSec" }, "html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml", "description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.", "fork": false, "created_at": "2021-11-08T17:38:30Z", "updated_at": "2021-12-11T21:29:07Z", "pushed_at": "2021-11-09T11:12:53Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 }, { "id": 430718153, "name": "CVE-2021-40444", "full_name": "Alexcot25051999\/CVE-2021-40444", "owner": { "login": "Alexcot25051999", "id": 94846095, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4", "html_url": "https:\/\/github.com\/Alexcot25051999" }, "html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444", "description": null, "fork": false, "created_at": "2021-11-22T13:29:20Z", "updated_at": "2021-11-22T13:41:39Z", "pushed_at": "2021-11-22T13:41:36Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 431721742, "name": "CVE-2021-40444-exp", "full_name": "lisinan988\/CVE-2021-40444-exp", "owner": { "login": "lisinan988", "id": 87479262, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4", "html_url": "https:\/\/github.com\/lisinan988" }, "html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp", "description": null, "fork": false, "created_at": "2021-11-25T05:13:05Z", "updated_at": "2021-11-25T05:13:19Z", "pushed_at": "2021-11-25T05:13:14Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 439810103, "name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "owner": { "login": "34zY", "id": 55347142, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4", "html_url": "https:\/\/github.com\/34zY" }, "html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "description": "CVE-2021-40444", "fork": false, "created_at": "2021-12-19T08:16:07Z", "updated_at": "2022-01-25T08:55:47Z", "pushed_at": "2021-12-19T08:27:33Z", "stargazers_count": 53, "watchers_count": 53, "forks_count": 19, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 19, "watchers": 53, "score": 0 }, { "id": 442372306, "name": "CVE-2021-40444", "full_name": "MRacumen\/CVE-2021-40444", "owner": { "login": "MRacumen", "id": 73010693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4", "html_url": "https:\/\/github.com\/MRacumen" }, "html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444", "description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit", "fork": false, "created_at": "2021-12-28T06:33:25Z", "updated_at": "2021-12-28T09:38:18Z", "pushed_at": "2021-12-28T06:44:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 } ]