[ { "id": 302145941, "name": "CVE-2020-16898", "full_name": "advanced-threat-research\/CVE-2020-16898", "owner": { "login": "advanced-threat-research", "id": 27901279, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/27901279?v=4", "html_url": "https:\/\/github.com\/advanced-threat-research" }, "html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898", "description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule", "fork": false, "created_at": "2020-10-07T19:56:09Z", "updated_at": "2020-12-28T16:52:35Z", "pushed_at": "2020-10-26T10:15:32Z", "stargazers_count": 207, "watchers_count": 207, "forks_count": 29, "forks": 29, "watchers": 207, "score": 0 }, { "id": 303891965, "name": "CVE-2020-16898", "full_name": "corelight\/CVE-2020-16898", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898", "description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)", "fork": false, "created_at": "2020-10-14T03:25:00Z", "updated_at": "2020-11-06T02:34:58Z", "pushed_at": "2020-10-22T15:22:55Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "forks": 1, "watchers": 7, "score": 0 }, { "id": 304024639, "name": "CVE-2020-16898_Check", "full_name": "Maliek\/CVE-2020-16898_Check", "owner": { "login": "Maliek", "id": 8858341, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8858341?v=4", "html_url": "https:\/\/github.com\/Maliek" }, "html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check", "description": "Minor powershell script that checks for vulnerable interfaces.", "fork": false, "created_at": "2020-10-14T13:30:38Z", "updated_at": "2020-10-16T09:20:02Z", "pushed_at": "2020-10-16T09:20:00Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "forks": 3, "watchers": 2, "score": 0 }, { "id": 304044860, "name": "CVE-2020-16898", "full_name": "ZephrFish\/CVE-2020-16898", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898", "description": "Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).", "fork": false, "created_at": "2020-10-14T14:42:52Z", "updated_at": "2020-12-06T12:01:03Z", "pushed_at": "2020-10-14T16:56:04Z", "stargazers_count": 20, "watchers_count": 20, "forks_count": 6, "forks": 6, "watchers": 20, "score": 0 }, { "id": 304075693, "name": "cve-2020-16898", "full_name": "esnet-security\/cve-2020-16898", "owner": { "login": "esnet-security", "id": 46755983, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46755983?v=4", "html_url": "https:\/\/github.com\/esnet-security" }, "html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898", "description": "Detects CVE-2020-16898: \"Bad Neighbor\"", "fork": false, "created_at": "2020-10-14T16:38:06Z", "updated_at": "2020-10-15T15:39:52Z", "pushed_at": "2020-10-15T23:00:53Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 304139222, "name": "CVE-2020-16898-Bad-Neighbor", "full_name": "initconf\/CVE-2020-16898-Bad-Neighbor", "owner": { "login": "initconf", "id": 4044729, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/4044729?v=4", "html_url": "https:\/\/github.com\/initconf" }, "html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor", "description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"", "fork": false, "created_at": "2020-10-14T21:25:09Z", "updated_at": "2020-10-22T21:12:06Z", "pushed_at": "2020-10-22T21:12:03Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 304538917, "name": "CVE-2020-16898", "full_name": "Q1984\/CVE-2020-16898", "owner": { "login": "Q1984", "id": 50952023, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/50952023?v=4", "html_url": "https:\/\/github.com\/Q1984" }, "html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898", "description": "PoC Bad Neighbor BSOD exploit", "fork": false, "created_at": "2020-10-16T06:27:24Z", "updated_at": "2020-10-16T11:17:23Z", "pushed_at": "2020-10-16T11:17:22Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 304755825, "name": "cve-2020-16898", "full_name": "0xeb-bp\/cve-2020-16898", "owner": { "login": "0xeb-bp", "id": 53204152, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53204152?v=4", "html_url": "https:\/\/github.com\/0xeb-bp" }, "html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898", "description": "PoC BSOD for CVE-2020-16898 (badneighbor)", "fork": false, "created_at": "2020-10-16T23:03:15Z", "updated_at": "2020-12-24T15:23:30Z", "pushed_at": "2020-10-16T23:12:52Z", "stargazers_count": 17, "watchers_count": 17, "forks_count": 4, "forks": 4, "watchers": 17, "score": 0 }, { "id": 304797048, "name": "cve-2020-16898", "full_name": "jiansiting\/cve-2020-16898", "owner": { "login": "jiansiting", "id": 28823754, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/28823754?v=4", "html_url": "https:\/\/github.com\/jiansiting" }, "html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898", "description": "PoC BSOD for CVE-2020-16898", "fork": false, "created_at": "2020-10-17T04:32:11Z", "updated_at": "2020-10-28T03:38:27Z", "pushed_at": "2020-10-17T04:32:19Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 3, "forks": 3, "watchers": 6, "score": 0 }, { "id": 304819444, "name": "CVE-2020-16898_Workaround", "full_name": "CPO-EH\/CVE-2020-16898_Workaround", "owner": { "login": "CPO-EH", "id": 56457033, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56457033?v=4", "html_url": "https:\/\/github.com\/CPO-EH" }, "html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround", "description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability", "fork": false, "created_at": "2020-10-17T07:09:58Z", "updated_at": "2020-10-21T16:45:04Z", "pushed_at": "2020-10-21T16:45:01Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 304851828, "name": "CVE-2020-16898_Checker", "full_name": "CPO-EH\/CVE-2020-16898_Checker", "owner": { "login": "CPO-EH", "id": 56457033, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56457033?v=4", "html_url": "https:\/\/github.com\/CPO-EH" }, "html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker", "description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability", "fork": false, "created_at": "2020-10-17T10:23:56Z", "updated_at": "2020-10-21T17:45:24Z", "pushed_at": "2020-10-21T17:45:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 304888543, "name": "CVE-2020-16898-exp", "full_name": "momika233\/CVE-2020-16898-exp", "owner": { "login": "momika233", "id": 56291820, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/56291820?v=4", "html_url": "https:\/\/github.com\/momika233" }, "html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp", "description": null, "fork": false, "created_at": "2020-10-17T13:52:08Z", "updated_at": "2020-12-04T06:25:41Z", "pushed_at": "2020-10-17T13:52:38Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 8, "forks": 8, "watchers": 14, "score": 0 }, { "id": 305598825, "name": "CVE-2020-16898-EXP-POC", "full_name": "komomon\/CVE-2020-16898-EXP-POC", "owner": { "login": "komomon", "id": 52700174, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/52700174?v=4", "html_url": "https:\/\/github.com\/komomon" }, "html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC", "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-20T05:24:47Z", "updated_at": "2020-12-23T19:00:26Z", "pushed_at": "2020-10-28T11:21:00Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "forks": 1, "watchers": 3, "score": 0 }, { "id": 306899847, "name": "CVE-2020-16898", "full_name": "Passive\/CVE-2020-16898", "owner": { "login": "Passive", "id": 40716556, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40716556?v=4", "html_url": "https:\/\/github.com\/Passive" }, "html_url": "https:\/\/github.com\/Passive\/CVE-2020-16898", "description": null, "fork": false, "created_at": "2020-10-24T14:21:14Z", "updated_at": "2020-10-24T14:23:22Z", "pushed_at": "2020-10-24T14:23:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 307994197, "name": "CVE-2020-16898--EXP-POC", "full_name": "komomon\/CVE-2020-16898--EXP-POC", "owner": { "login": "komomon", "id": 52700174, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/52700174?v=4", "html_url": "https:\/\/github.com\/komomon" }, "html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC", "description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC", "fork": false, "created_at": "2020-10-28T11:25:58Z", "updated_at": "2020-12-04T07:33:49Z", "pushed_at": "2020-10-28T11:27:17Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 6, "forks": 6, "watchers": 6, "score": 0 } ]