[ { "id": 214392452, "name": "SysTracingPoc", "full_name": "itm4n\/SysTracingPoc", "owner": { "login": "itm4n", "id": 30777390, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30777390?v=4", "html_url": "https:\/\/github.com\/itm4n" }, "html_url": "https:\/\/github.com\/itm4n\/SysTracingPoc", "description": "CVE-2020-0668 - Microsoft Windows Service Tracing Arbitrary File Move Local Privilege Escalation Vulnerability", "fork": false, "created_at": "2019-10-11T09:08:02Z", "updated_at": "2022-12-04T05:19:10Z", "pushed_at": "2020-02-26T09:24:45Z", "stargazers_count": 101, "watchers_count": 101, "has_discussions": false, "forks_count": 25, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 25, "watchers": 101, "score": 0 }, { "id": 241809572, "name": "CVE-2020-0668", "full_name": "RedCursorSecurityConsulting\/CVE-2020-0668", "owner": { "login": "RedCursorSecurityConsulting", "id": 61265565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61265565?v=4", "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting" }, "html_url": "https:\/\/github.com\/RedCursorSecurityConsulting\/CVE-2020-0668", "description": "Use CVE-2020-0668 to perform an arbitrary privileged file move operation.", "fork": false, "created_at": "2020-02-20T06:22:40Z", "updated_at": "2022-11-09T18:06:22Z", "pushed_at": "2020-02-20T11:03:18Z", "stargazers_count": 192, "watchers_count": 192, "has_discussions": false, "forks_count": 54, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 54, "watchers": 192, "score": 0 }, { "id": 243248025, "name": "CVE-2020-0668", "full_name": "Nan3r\/CVE-2020-0668", "owner": { "login": "Nan3r", "id": 16438104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16438104?v=4", "html_url": "https:\/\/github.com\/Nan3r" }, "html_url": "https:\/\/github.com\/Nan3r\/CVE-2020-0668", "description": "CVE-2020-0668", "fork": false, "created_at": "2020-02-26T11:37:29Z", "updated_at": "2022-07-23T07:57:24Z", "pushed_at": "2020-06-02T13:21:26Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 7, "score": 0 }, { "id": 422076432, "name": "CVE-2020-0668", "full_name": "ycdxsb\/CVE-2020-0668", "owner": { "login": "ycdxsb", "id": 32149596, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32149596?v=4", "html_url": "https:\/\/github.com\/ycdxsb" }, "html_url": "https:\/\/github.com\/ycdxsb\/CVE-2020-0668", "description": "Make CVE-2020-0668 exploit work for version < win10 v1903 and version >= win10 v1903", "fork": false, "created_at": "2021-10-28T05:30:14Z", "updated_at": "2022-11-09T18:14:14Z", "pushed_at": "2021-12-07T03:33:56Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 12, "score": 0 }, { "id": 422947746, "name": "CVE-2020-0668", "full_name": "bypazs\/CVE-2020-0668", "owner": { "login": "bypazs", "id": 5837953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837953?v=4", "html_url": "https:\/\/github.com\/bypazs" }, "html_url": "https:\/\/github.com\/bypazs\/CVE-2020-0668", "description": null, "fork": false, "created_at": "2021-10-30T17:28:54Z", "updated_at": "2021-10-30T17:30:17Z", "pushed_at": "2021-10-30T17:30:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0 } ]