[ { "id": 402009648, "name": "CVE-2022-26809-RCE", "full_name": "CberryAIRDROP\/CVE-2022-26809-RCE", "owner": { "login": "CberryAIRDROP", "id": 89909217, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89909217?v=4", "html_url": "https:\/\/github.com\/CberryAIRDROP" }, "html_url": "https:\/\/github.com\/CberryAIRDROP\/CVE-2022-26809-RCE", "description": null, "fork": false, "created_at": "2021-09-01T09:48:31Z", "updated_at": "2022-04-22T08:19:40Z", "pushed_at": "2022-04-24T08:49:21Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0 }, { "id": 481455739, "name": "Microsoft-CVE-2022-26809-The-Little-Boy", "full_name": "sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy", "owner": { "login": "sherlocksecurity", "id": 52328067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52328067?v=4", "html_url": "https:\/\/github.com\/sherlocksecurity" }, "html_url": "https:\/\/github.com\/sherlocksecurity\/Microsoft-CVE-2022-26809-The-Little-Boy", "description": "The poc for CVE-2022-26809 RCE via RPC will be updated here. ", "fork": false, "created_at": "2022-04-14T03:41:32Z", "updated_at": "2022-05-19T19:11:46Z", "pushed_at": "2022-04-18T03:28:10Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 18, "score": 0 }, { "id": 481521334, "name": "CVE-2022-26809", "full_name": "websecnl\/CVE-2022-26809", "owner": { "login": "websecnl", "id": 20278695, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20278695?v=4", "html_url": "https:\/\/github.com\/websecnl" }, "html_url": "https:\/\/github.com\/websecnl\/CVE-2022-26809", "description": "Remote Code Execution Exploit in the RPC Library", "fork": false, "created_at": "2022-04-14T08:12:24Z", "updated_at": "2022-05-20T01:42:07Z", "pushed_at": "2022-04-19T17:04:04Z", "stargazers_count": 26, "watchers_count": 26, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-26809" ], "visibility": "public", "forks": 4, "watchers": 26, "score": 0 }, { "id": 481523929, "name": "CVE-2022-26809", "full_name": "auduongxuan\/CVE-2022-26809", "owner": { "login": "auduongxuan", "id": 33758982, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33758982?v=4", "html_url": "https:\/\/github.com\/auduongxuan" }, "html_url": "https:\/\/github.com\/auduongxuan\/CVE-2022-26809", "description": null, "fork": false, "created_at": "2022-04-14T08:21:10Z", "updated_at": "2022-05-19T11:24:41Z", "pushed_at": "2022-04-14T08:23:59Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 5, "score": 0 }, { "id": 481682449, "name": "cve-2022-26809", "full_name": "corelight\/cve-2022-26809", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight" }, "html_url": "https:\/\/github.com\/corelight\/cve-2022-26809", "description": "Detects attempts and successful exploitation of CVE-2022-26809", "fork": false, "created_at": "2022-04-14T16:58:09Z", "updated_at": "2022-05-19T08:17:55Z", "pushed_at": "2022-05-17T15:17:22Z", "stargazers_count": 4, "watchers_count": 4, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 4, "score": 0 }, { "id": 483810303, "name": "CVE-2022-26809-RCE", "full_name": "DESC0N0C1D0\/CVE-2022-26809-RCE", "owner": { "login": "DESC0N0C1D0", "id": 57696252, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57696252?v=4", "html_url": "https:\/\/github.com\/DESC0N0C1D0" }, "html_url": "https:\/\/github.com\/DESC0N0C1D0\/CVE-2022-26809-RCE", "description": "This repository contains a PoC for remote code execution CVE-2022-26809", "fork": false, "created_at": "2022-04-20T20:54:26Z", "updated_at": "2022-05-14T14:48:28Z", "pushed_at": "2022-04-25T20:38:57Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 11, "score": 0 }, { "id": 484389854, "name": "CVE-2022-26809", "full_name": "jones199023\/CVE-2022-26809", "owner": { "login": "jones199023", "id": 104200848, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104200848?v=4", "html_url": "https:\/\/github.com\/jones199023" }, "html_url": "https:\/\/github.com\/jones199023\/CVE-2022-26809", "description": "Python", "fork": false, "created_at": "2022-04-22T10:21:30Z", "updated_at": "2022-04-22T11:02:28Z", "pushed_at": "2022-04-22T10:49:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 484792908, "name": "CVE-2022-26809-RCE", "full_name": "oppongjohn\/CVE-2022-26809-RCE", "owner": { "login": "oppongjohn", "id": 96750321, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/96750321?v=4", "html_url": "https:\/\/github.com\/oppongjohn" }, "html_url": "https:\/\/github.com\/oppongjohn\/CVE-2022-26809-RCE", "description": "CVE-2022-26809-RCE", "fork": false, "created_at": "2022-04-23T16:01:44Z", "updated_at": "2022-04-23T16:01:44Z", "pushed_at": "2022-04-23T16:01:59Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 484793824, "name": "CVE-2022-26809-RCE-POC", "full_name": "roger109\/CVE-2022-26809-RCE-POC", "owner": { "login": "roger109", "id": 79395035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79395035?v=4", "html_url": "https:\/\/github.com\/roger109" }, "html_url": "https:\/\/github.com\/roger109\/CVE-2022-26809-RCE-POC", "description": null, "fork": false, "created_at": "2022-04-23T16:05:36Z", "updated_at": "2022-04-23T16:05:36Z", "pushed_at": "2022-04-23T16:05:48Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 487542806, "name": "CVE-2022-26809", "full_name": "yuanLink\/CVE-2022-26809", "owner": { "login": "yuanLink", "id": 16820130, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16820130?v=4", "html_url": "https:\/\/github.com\/yuanLink" }, "html_url": "https:\/\/github.com\/yuanLink\/CVE-2022-26809", "description": null, "fork": false, "created_at": "2022-05-01T13:19:10Z", "updated_at": "2022-05-20T10:31:34Z", "pushed_at": "2022-05-19T01:23:00Z", "stargazers_count": 25, "watchers_count": 25, "forks_count": 12, "allow_forking": true, "is_template": false, "topics": [ "cve-2022-26809" ], "visibility": "public", "forks": 12, "watchers": 25, "score": 0 }, { "id": 490368128, "name": "CVE-2022-26809-RCE-POC", "full_name": "ExploitPwner\/CVE-2022-26809-RCE-POC", "owner": { "login": "ExploitPwner", "id": 103929208, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103929208?v=4", "html_url": "https:\/\/github.com\/ExploitPwner" }, "html_url": "https:\/\/github.com\/ExploitPwner\/CVE-2022-26809-RCE-POC", "description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ", "fork": false, "created_at": "2022-05-09T16:48:30Z", "updated_at": "2022-05-19T06:42:06Z", "pushed_at": "2022-05-17T15:53:22Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [ "0day", "exploit-scanner", "mass-exploit", "mass-exploiter", "windows-rce", "zero-day" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0 }, { "id": 491265476, "name": "CVE-2022-26809-RCE", "full_name": "seciurdt\/CVE-2022-26809-RCE", "owner": { "login": "seciurdt", "id": 105104248, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4", "html_url": "https:\/\/github.com\/seciurdt" }, "html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-RCE", "description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows ", "fork": false, "created_at": "2022-05-11T20:38:55Z", "updated_at": "2022-05-11T20:41:34Z", "pushed_at": "2022-05-11T20:41:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 491403752, "name": "CVE-2022-26809", "full_name": "Calvitz\/CVE-2022-26809", "owner": { "login": "Calvitz", "id": 105359678, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105359678?v=4", "html_url": "https:\/\/github.com\/Calvitz" }, "html_url": "https:\/\/github.com\/Calvitz\/CVE-2022-26809", "description": "CVE-2022-26809 exp", "fork": false, "created_at": "2022-05-12T07:12:08Z", "updated_at": "2022-05-13T03:18:44Z", "pushed_at": "2022-05-13T03:18:41Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0 }, { "id": 494495424, "name": "CVE-2022-26809", "full_name": "XmasSnowISBACK\/CVE-2022-26809", "owner": { "login": "XmasSnowISBACK", "id": 105931778, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105931778?v=4", "html_url": "https:\/\/github.com\/XmasSnowISBACK" }, "html_url": "https:\/\/github.com\/XmasSnowISBACK\/CVE-2022-26809", "description": "CVE-2022-26809 is a vulnerability in Remote Procedure Call Runtime ", "fork": false, "created_at": "2022-05-20T14:26:38Z", "updated_at": "2022-05-20T20:30:39Z", "pushed_at": "2022-05-20T14:26:55Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0 }, { "id": 494512552, "name": "CVE-2022-26809-MASS", "full_name": "seciurdt\/CVE-2022-26809-MASS", "owner": { "login": "seciurdt", "id": 105104248, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105104248?v=4", "html_url": "https:\/\/github.com\/seciurdt" }, "html_url": "https:\/\/github.com\/seciurdt\/CVE-2022-26809-MASS", "description": "CVE-2022-26809 | is a remote code execution vulnerablity in rpc runtime and affects a wide versions of windows", "fork": false, "created_at": "2022-05-20T15:16:30Z", "updated_at": "2022-05-20T18:50:01Z", "pushed_at": "2022-05-20T15:16:47Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0 } ]