[ { "id": 103382657, "name": "CVE-2017-8759-Exploit-sample", "full_name": "Voulnet\/CVE-2017-8759-Exploit-sample", "owner": { "login": "Voulnet", "id": 1334847, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1334847?v=4", "html_url": "https:\/\/github.com\/Voulnet" }, "html_url": "https:\/\/github.com\/Voulnet\/CVE-2017-8759-Exploit-sample", "description": "Running CVE-2017-8759 exploit sample.", "fork": false, "created_at": "2017-09-13T09:50:04Z", "updated_at": "2022-05-03T00:15:06Z", "pushed_at": "2020-01-23T06:53:00Z", "stargazers_count": 255, "watchers_count": 255, "forks_count": 110, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 110, "watchers": 255, "score": 0 }, { "id": 103416775, "name": "CVE-2017-8759", "full_name": "nccgroup\/CVE-2017-8759", "owner": { "login": "nccgroup", "id": 4067082, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4", "html_url": "https:\/\/github.com\/nccgroup" }, "html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759", "description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements", "fork": false, "created_at": "2017-09-13T15:24:10Z", "updated_at": "2022-03-14T03:41:53Z", "pushed_at": "2017-09-19T18:06:41Z", "stargazers_count": 97, "watchers_count": 97, "forks_count": 52, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 52, "watchers": 97, "score": 0 }, { "id": 103428172, "name": "CVE-2017-8759", "full_name": "vysecurity\/CVE-2017-8759", "owner": { "login": "vysecurity", "id": 3596242, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4", "html_url": "https:\/\/github.com\/vysecurity" }, "html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759", "description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.", "fork": false, "created_at": "2017-09-13T17:10:18Z", "updated_at": "2022-01-27T19:34:59Z", "pushed_at": "2017-09-14T10:18:40Z", "stargazers_count": 173, "watchers_count": 173, "forks_count": 85, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 85, "watchers": 173, "score": 0 }, { "id": 103447049, "name": "CVE-2017-8759", "full_name": "BasuCert\/CVE-2017-8759", "owner": { "login": "BasuCert", "id": 29852431, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4", "html_url": "https:\/\/github.com\/BasuCert" }, "html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759", "description": "CVE-2017-8759 Research", "fork": false, "created_at": "2017-09-13T20:27:29Z", "updated_at": "2021-12-15T14:32:51Z", "pushed_at": "2017-09-15T13:14:38Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0 }, { "id": 103447404, "name": "CVE-2017-8759-Exploit-sample2", "full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2", "owner": { "login": "tahisaad6", "id": 21042116, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4", "html_url": "https:\/\/github.com\/tahisaad6" }, "html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2", "description": null, "fork": false, "created_at": "2017-09-13T20:31:43Z", "updated_at": "2017-09-13T20:31:43Z", "pushed_at": "2017-09-13T20:31:43Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 103493845, "name": "CVE-2017-8759_-SOAP_WSDL", "full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL", "owner": { "login": "homjxi0e", "id": 25440152, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4", "html_url": "https:\/\/github.com\/homjxi0e" }, "html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL", "description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5", "fork": false, "created_at": "2017-09-14T06:20:28Z", "updated_at": "2018-11-16T12:24:03Z", "pushed_at": "2017-09-21T16:41:37Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 6, "allow_forking": true, "is_template": false, "topics": [ "code", "cve-2017-8759", "execution", "remote" ], "visibility": "public", "forks": 6, "watchers": 1, "score": 0 }, { "id": 103517315, "name": "CVE-2017-8759", "full_name": "bhdresh\/CVE-2017-8759", "owner": { "login": "bhdresh", "id": 8931885, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4", "html_url": "https:\/\/github.com\/bhdresh" }, "html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759", "description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-09-14T10:04:39Z", "updated_at": "2022-05-02T00:22:33Z", "pushed_at": "2018-09-10T16:25:12Z", "stargazers_count": 316, "watchers_count": 316, "forks_count": 124, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 124, "watchers": 316, "score": 0 }, { "id": 103595749, "name": "CVE-2017-8759", "full_name": "Lz1y\/CVE-2017-8759", "owner": { "login": "Lz1y", "id": 23468993, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4", "html_url": "https:\/\/github.com\/Lz1y" }, "html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759", "description": "CVE-2017-8759", "fork": false, "created_at": "2017-09-15T00:36:17Z", "updated_at": "2021-01-08T03:56:13Z", "pushed_at": "2017-12-28T07:16:15Z", "stargazers_count": 84, "watchers_count": 84, "forks_count": 50, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 50, "watchers": 84, "score": 0 }, { "id": 103865283, "name": "CVE-2017-8759", "full_name": "JonasUliana\/CVE-2017-8759", "owner": { "login": "JonasUliana", "id": 29503841, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4", "html_url": "https:\/\/github.com\/JonasUliana" }, "html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759", "description": "Simple C# implementation of CVE-2017-8759", "fork": false, "created_at": "2017-09-17T22:05:56Z", "updated_at": "2018-11-16T12:24:03Z", "pushed_at": "2017-09-17T22:20:36Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 3, "allow_forking": true, "is_template": false, "topics": [ "csharp", "cve-2017-8759", "exploit" ], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 104033989, "name": "CVE-2017-8759-exploits", "full_name": "ashr\/CVE-2017-8759-exploits", "owner": { "login": "ashr", "id": 171286, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4", "html_url": "https:\/\/github.com\/ashr" }, "html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits", "description": "Two versions of CVE-2017-8759 exploits", "fork": false, "created_at": "2017-09-19T06:12:10Z", "updated_at": "2020-04-07T05:43:28Z", "pushed_at": "2017-09-19T06:19:54Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 2, "score": 0 }, { "id": 104625403, "name": "CVE-2017-8759", "full_name": "l0n3rs\/CVE-2017-8759", "owner": { "login": "l0n3rs", "id": 31120718, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4", "html_url": "https:\/\/github.com\/l0n3rs" }, "html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759", "description": null, "fork": false, "created_at": "2017-09-24T06:58:55Z", "updated_at": "2017-09-24T06:58:55Z", "pushed_at": "2017-09-24T06:59:53Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 161397133, "name": "CVE-2017-8759", "full_name": "ChaitanyaHaritash\/CVE-2017-8759", "owner": { "login": "ChaitanyaHaritash", "id": 16261173, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4", "html_url": "https:\/\/github.com\/ChaitanyaHaritash" }, "html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-8759", "description": "Just My ports of CVE-2017-8759", "fork": false, "created_at": "2018-12-11T21:39:39Z", "updated_at": "2020-10-27T03:30:41Z", "pushed_at": "2018-12-11T22:02:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 2, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0 }, { "id": 188365315, "name": "CVE-2017-8759Expoit", "full_name": "smashinu\/CVE-2017-8759Expoit", "owner": { "login": "smashinu", "id": 30433218, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30433218?v=4", "html_url": "https:\/\/github.com\/smashinu" }, "html_url": "https:\/\/github.com\/smashinu\/CVE-2017-8759Expoit", "description": "yehnah", "fork": false, "created_at": "2019-05-24T06:29:45Z", "updated_at": "2019-05-30T02:01:34Z", "pushed_at": "2019-05-30T02:01:32Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 193617602, "name": "CVE-2017-8759", "full_name": "adeljck\/CVE-2017-8759", "owner": { "login": "adeljck", "id": 24542600, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24542600?v=4", "html_url": "https:\/\/github.com\/adeljck" }, "html_url": "https:\/\/github.com\/adeljck\/CVE-2017-8759", "description": "CVE-2017-8759 微软word漏洞利用脚本", "fork": false, "created_at": "2019-06-25T02:17:04Z", "updated_at": "2019-06-25T02:17:51Z", "pushed_at": "2019-06-25T02:17:50Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 231332316, "name": "CVE-2017-8759", "full_name": "zhengkook\/CVE-2017-8759", "owner": { "login": "zhengkook", "id": 32629417, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32629417?v=4", "html_url": "https:\/\/github.com\/zhengkook" }, "html_url": "https:\/\/github.com\/zhengkook\/CVE-2017-8759", "description": "CVE-2017-8759 use file", "fork": false, "created_at": "2020-01-02T07:43:19Z", "updated_at": "2020-01-02T07:45:48Z", "pushed_at": "2020-01-02T07:45:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 263371988, "name": "SNP", "full_name": "varunsaru\/SNP", "owner": { "login": "varunsaru", "id": 39478192, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39478192?v=4", "html_url": "https:\/\/github.com\/varunsaru" }, "html_url": "https:\/\/github.com\/varunsaru\/SNP", "description": "CVE-2017-8759 || report related with execute code vulnerability", "fork": false, "created_at": "2020-05-12T15:11:42Z", "updated_at": "2020-05-12T18:14:25Z", "pushed_at": "2020-05-12T18:14:23Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 }, { "id": 263384480, "name": "OHTS", "full_name": "GayashanM\/OHTS", "owner": { "login": "GayashanM", "id": 42294440, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42294440?v=4", "html_url": "https:\/\/github.com\/GayashanM" }, "html_url": "https:\/\/github.com\/GayashanM\/OHTS", "description": "CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability", "fork": false, "created_at": "2020-05-12T16:00:39Z", "updated_at": "2020-05-13T17:30:30Z", "pushed_at": "2020-05-13T17:30:28Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]