[
    {
        "id": 246641886,
        "name": "NSE-scripts",
        "full_name": "psc4re\/NSE-scripts",
        "owner": {
            "login": "psc4re",
            "id": 4672886,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
            "html_url": "https:\/\/github.com\/psc4re"
        },
        "html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
        "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
        "fork": false,
        "created_at": "2020-03-11T17:51:29Z",
        "updated_at": "2021-11-02T17:51:31Z",
        "pushed_at": "2021-08-16T18:16:20Z",
        "stargazers_count": 96,
        "watchers_count": 96,
        "forks_count": 21,
        "allow_forking": true,
        "is_template": false,
        "topics": [
            "cve-2020-1350",
            "cve-2021-21972",
            "cve-2021-34473",
            "nmap",
            "nmap-scan-script",
            "nmap-scripts",
            "nse-script",
            "poc",
            "proxyshell",
            "scanner",
            "sigred",
            "smbghost",
            "smbv3",
            "vcenter",
            "vulnerability",
            "vulnerability-detection"
        ],
        "visibility": "public",
        "forks": 21,
        "watchers": 96,
        "score": 0
    },
    {
        "id": 279670211,
        "name": "CVE-2020-1350_HoneyPoC",
        "full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
        "owner": {
            "login": "ZephrFish",
            "id": 5783068,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
            "html_url": "https:\/\/github.com\/ZephrFish"
        },
        "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
        "description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
        "fork": false,
        "created_at": "2020-07-14T19:02:25Z",
        "updated_at": "2021-12-15T14:39:48Z",
        "pushed_at": "2021-06-10T02:46:52Z",
        "stargazers_count": 271,
        "watchers_count": 271,
        "forks_count": 79,
        "allow_forking": true,
        "is_template": false,
        "topics": [
            "cve-2020-1350",
            "sigred"
        ],
        "visibility": "public",
        "forks": 79,
        "watchers": 271,
        "score": 0
    },
    {
        "id": 279675165,
        "name": "CVE-2020-1350",
        "full_name": "mr-r3b00t\/CVE-2020-1350",
        "owner": {
            "login": "mr-r3b00t",
            "id": 14963690,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
            "html_url": "https:\/\/github.com\/mr-r3b00t"
        },
        "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
        "description": null,
        "fork": false,
        "created_at": "2020-07-14T19:28:46Z",
        "updated_at": "2021-05-06T11:57:25Z",
        "pushed_at": "2020-07-20T06:15:56Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "forks_count": 6,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 6,
        "watchers": 5,
        "score": 0
    },
    {
        "id": 279701266,
        "name": "Fake_CVE-2020-1350",
        "full_name": "zoomerxsec\/Fake_CVE-2020-1350",
        "owner": {
            "login": "zoomerxsec",
            "id": 56858864,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4",
            "html_url": "https:\/\/github.com\/zoomerxsec"
        },
        "html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
        "description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
        "fork": false,
        "created_at": "2020-07-14T21:55:57Z",
        "updated_at": "2021-07-22T12:14:33Z",
        "pushed_at": "2020-07-19T02:29:33Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 6,
        "score": 0
    },
    {
        "id": 279776271,
        "name": "CVE-2020-1350",
        "full_name": "T13nn3s\/CVE-2020-1350",
        "owner": {
            "login": "T13nn3s",
            "id": 29333776,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
            "html_url": "https:\/\/github.com\/T13nn3s"
        },
        "html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
        "description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
        "fork": false,
        "created_at": "2020-07-15T05:46:31Z",
        "updated_at": "2021-08-12T00:10:26Z",
        "pushed_at": "2020-07-18T06:38:11Z",
        "stargazers_count": 15,
        "watchers_count": 15,
        "forks_count": 10,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 10,
        "watchers": 15,
        "score": 0
    },
    {
        "id": 279778118,
        "name": "SIGRed",
        "full_name": "corelight\/SIGRed",
        "owner": {
            "login": "corelight",
            "id": 21672558,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
            "html_url": "https:\/\/github.com\/corelight"
        },
        "html_url": "https:\/\/github.com\/corelight\/SIGRed",
        "description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
        "fork": false,
        "created_at": "2020-07-15T05:55:20Z",
        "updated_at": "2021-01-14T18:47:12Z",
        "pushed_at": "2020-07-20T02:20:43Z",
        "stargazers_count": 10,
        "watchers_count": 10,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 10,
        "score": 0
    },
    {
        "id": 279961698,
        "name": "dRMM-CVE-2020-1350-response",
        "full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
        "owner": {
            "login": "jmaddington",
            "id": 2353597,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
            "html_url": "https:\/\/github.com\/jmaddington"
        },
        "html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
        "description": "Windows registry mitigation response to CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-15T19:43:39Z",
        "updated_at": "2020-10-10T20:38:31Z",
        "pushed_at": "2020-07-15T19:59:02Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 279999285,
        "name": "CVE-2020-1350-DoS",
        "full_name": "maxpl0it\/CVE-2020-1350-DoS",
        "owner": {
            "login": "maxpl0it",
            "id": 27973683,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
            "html_url": "https:\/\/github.com\/maxpl0it"
        },
        "html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
        "description": "A denial-of-service proof-of-concept for CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-15T23:00:00Z",
        "updated_at": "2021-12-15T14:39:49Z",
        "pushed_at": "2020-07-17T13:07:29Z",
        "stargazers_count": 234,
        "watchers_count": 234,
        "forks_count": 53,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 53,
        "watchers": 234,
        "score": 0
    },
    {
        "id": 280207373,
        "name": "CVE-2020-1350",
        "full_name": "captainGeech42\/CVE-2020-1350",
        "owner": {
            "login": "captainGeech42",
            "id": 4255667,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4",
            "html_url": "https:\/\/github.com\/captainGeech42"
        },
        "html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
        "description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
        "fork": false,
        "created_at": "2020-07-16T16:46:48Z",
        "updated_at": "2021-08-20T09:04:25Z",
        "pushed_at": "2020-07-16T18:32:04Z",
        "stargazers_count": 18,
        "watchers_count": 18,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 18,
        "score": 0
    },
    {
        "id": 280336928,
        "name": "CVE-2020-1350",
        "full_name": "connormcgarr\/CVE-2020-1350",
        "owner": {
            "login": "connormcgarr",
            "id": 45445720,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
            "html_url": "https:\/\/github.com\/connormcgarr"
        },
        "html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
        "description": "CVE-2020-1350 Proof-of-Concept",
        "fork": false,
        "created_at": "2020-07-17T05:41:19Z",
        "updated_at": "2021-09-05T17:57:23Z",
        "pushed_at": "2020-07-27T16:20:06Z",
        "stargazers_count": 8,
        "watchers_count": 8,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 8,
        "score": 0
    },
    {
        "id": 280665873,
        "name": "CVE-2020-1350",
        "full_name": "graph-inc\/CVE-2020-1350",
        "owner": {
            "login": "graph-inc",
            "id": 68469953,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4",
            "html_url": "https:\/\/github.com\/graph-inc"
        },
        "html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
        "description": "Scanner and Mitigator for CVE 2020-1350",
        "fork": false,
        "created_at": "2020-07-18T13:49:54Z",
        "updated_at": "2021-01-27T17:38:05Z",
        "pushed_at": "2020-07-18T14:05:55Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 280916907,
        "name": "CVE-2020-1350",
        "full_name": "CVEmaster\/CVE-2020-1350",
        "owner": {
            "login": "CVEmaster",
            "id": 68512490,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
            "html_url": "https:\/\/github.com\/CVEmaster"
        },
        "html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
        "description": "DNS Vulnerability - CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-19T17:32:47Z",
        "updated_at": "2020-10-10T20:39:05Z",
        "pushed_at": "2020-07-20T14:25:59Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 281069444,
        "name": "CVE-2020-1350-checker.ps1",
        "full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
        "owner": {
            "login": "Secuora-Org",
            "id": 67636594,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67636594?v=4",
            "html_url": "https:\/\/github.com\/Secuora-Org"
        },
        "html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
        "description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
        "fork": false,
        "created_at": "2020-07-20T09:12:07Z",
        "updated_at": "2020-10-10T20:40:44Z",
        "pushed_at": "2020-07-20T09:12:33Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 281667659,
        "name": "cve-2020-1350",
        "full_name": "gdwnet\/cve-2020-1350",
        "owner": {
            "login": "gdwnet",
            "id": 19855556,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
            "html_url": "https:\/\/github.com\/gdwnet"
        },
        "html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
        "description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
        "fork": false,
        "created_at": "2020-07-22T12:11:33Z",
        "updated_at": "2020-10-10T20:40:26Z",
        "pushed_at": "2020-07-22T12:15:00Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 282558950,
        "name": "CVE-2020-1350-Fix",
        "full_name": "simeononsecurity\/CVE-2020-1350-Fix",
        "owner": {
            "login": "simeononsecurity",
            "id": 4913771,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
            "html_url": "https:\/\/github.com\/simeononsecurity"
        },
        "html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
        "description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
        "fork": false,
        "created_at": "2020-07-26T02:12:36Z",
        "updated_at": "2020-10-10T20:40:04Z",
        "pushed_at": "2020-07-26T02:13:24Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0
    }
]