[ { "id": 491338151, "name": "TryHackMe-CVE-2022-26923", "full_name": "r1skkam\/TryHackMe-CVE-2022-26923", "owner": { "login": "r1skkam", "id": 58542375, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4", "html_url": "https:\/\/github.com\/r1skkam" }, "html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-CVE-2022-26923", "description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services", "fork": false, "created_at": "2022-05-12T02:31:50Z", "updated_at": "2022-06-15T13:30:30Z", "pushed_at": "2022-05-12T03:24:04Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0 }, { "id": 492169187, "name": "CVE-2022-26923_AD-Certificate-Services", "full_name": "LudovicPatho\/CVE-2022-26923_AD-Certificate-Services", "owner": { "login": "LudovicPatho", "id": 26960886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4", "html_url": "https:\/\/github.com\/LudovicPatho" }, "html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2022-26923_AD-Certificate-Services", "description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.", "fork": false, "created_at": "2022-05-14T09:27:06Z", "updated_at": "2022-07-19T15:50:05Z", "pushed_at": "2022-05-14T20:56:39Z", "stargazers_count": 17, "watchers_count": 17, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 17, "score": 0 } ]