[ { "id": 437314230, "name": "sam-the-admin", "full_name": "safebuffer\/sam-the-admin", "owner": { "login": "safebuffer", "id": 20618414, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4", "html_url": "https:\/\/github.com\/safebuffer" }, "html_url": "https:\/\/github.com\/safebuffer\/sam-the-admin", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-11T15:10:30Z", "updated_at": "2024-03-17T07:18:22Z", "pushed_at": "2022-07-10T22:23:13Z", "stargazers_count": 952, "watchers_count": 952, "has_discussions": false, "forks_count": 190, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "active-directory", "exploitation", "redteam", "s4u2self" ], "visibility": "public", "forks": 190, "watchers": 952, "score": 0, "subscribers_count": 26 }, { "id": 437829160, "name": "noPac", "full_name": "Ridter\/noPac", "owner": { "login": "Ridter", "id": 6007471, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4", "html_url": "https:\/\/github.com\/Ridter" }, "html_url": "https:\/\/github.com\/Ridter\/noPac", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ", "fork": false, "created_at": "2021-12-13T10:28:12Z", "updated_at": "2024-03-17T13:46:55Z", "pushed_at": "2023-01-29T03:31:27Z", "stargazers_count": 701, "watchers_count": 701, "has_discussions": false, "forks_count": 114, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 114, "watchers": 701, "score": 0, "subscribers_count": 12 }, { "id": 437924403, "name": "noPac", "full_name": "waterrr\/noPac", "owner": { "login": "waterrr", "id": 15225499, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4", "html_url": "https:\/\/github.com\/waterrr" }, "html_url": "https:\/\/github.com\/waterrr\/noPac", "description": "Exploiting CVE-2021-42278 and CVE-2021-42287", "fork": false, "created_at": "2021-12-13T15:24:59Z", "updated_at": "2024-03-05T09:34:17Z", "pushed_at": "2021-12-13T15:40:14Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 438053162, "name": "Pachine", "full_name": "ly4k\/Pachine", "owner": { "login": "ly4k", "id": 53348818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4", "html_url": "https:\/\/github.com\/ly4k" }, "html_url": "https:\/\/github.com\/ly4k\/Pachine", "description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)", "fork": false, "created_at": "2021-12-13T23:15:05Z", "updated_at": "2024-03-02T19:16:01Z", "pushed_at": "2022-01-13T12:35:19Z", "stargazers_count": 267, "watchers_count": 267, "has_discussions": false, "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-42278" ], "visibility": "public", "forks": 38, "watchers": 267, "score": 0, "subscribers_count": 7 }, { "id": 442163896, "name": "noPac-detection", "full_name": "cybersecurityworks553\/noPac-detection", "owner": { "login": "cybersecurityworks553", "id": 63910792, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4", "html_url": "https:\/\/github.com\/cybersecurityworks553" }, "html_url": "https:\/\/github.com\/cybersecurityworks553\/noPac-detection", "description": "Detection script for CVE-2021-42278 and CVE-2021-42287", "fork": false, "created_at": "2021-12-27T13:10:45Z", "updated_at": "2022-03-30T06:49:25Z", "pushed_at": "2021-12-27T13:27:33Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 1 } ]