[ { "id": 186865180, "name": "CVE-2019-0708", "full_name": "thugcrowd\/CVE-2019-0708", "owner": { "login": "thugcrowd", "id": 40207376, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40207376?v=4", "html_url": "https:\/\/github.com\/thugcrowd" }, "html_url": "https:\/\/github.com\/thugcrowd\/CVE-2019-0708", "description": "sup pry0cc :3", "fork": false, "created_at": "2019-05-15T16:33:31Z", "updated_at": "2020-03-24T14:55:02Z", "pushed_at": "2019-08-28T02:51:47Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 0, "forks": 0, "watchers": 6, "score": 0 }, { "id": 187057686, "name": "CVE-2019-0708-Check-Device-Patch-Status", "full_name": "fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status", "owner": { "login": "fourtwizzy", "id": 1735941, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1735941?v=4", "html_url": "https:\/\/github.com\/fourtwizzy" }, "html_url": "https:\/\/github.com\/fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status", "description": "Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5\/14\/19 patches.", "fork": false, "created_at": "2019-05-16T15:47:29Z", "updated_at": "2020-02-13T14:34:03Z", "pushed_at": "2019-08-28T17:14:57Z", "stargazers_count": 17, "watchers_count": 17, "forks_count": 8, "forks": 8, "watchers": 17, "score": 0 }, { "id": 187758878, "name": "CVE-2019-0708", "full_name": "ttsite\/CVE-2019-0708", "owner": { "login": "ttsite", "id": 43260559, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43260559?v=4", "html_url": "https:\/\/github.com\/ttsite" }, "html_url": "https:\/\/github.com\/ttsite\/CVE-2019-0708", "description": "Report fraud", "fork": false, "created_at": "2019-05-21T04:00:49Z", "updated_at": "2019-07-04T09:25:15Z", "pushed_at": "2019-07-04T09:25:14Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 187931596, "name": "CVE-2019-0708", "full_name": "zerosum0x0\/CVE-2019-0708", "owner": { "login": "zerosum0x0", "id": 3971576, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3971576?v=4", "html_url": "https:\/\/github.com\/zerosum0x0" }, "html_url": "https:\/\/github.com\/zerosum0x0\/CVE-2019-0708", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", "updated_at": "2020-04-14T13:18:19Z", "pushed_at": "2019-10-01T12:23:59Z", "stargazers_count": 1098, "watchers_count": 1098, "forks_count": 370, "forks": 370, "watchers": 1098, "score": 0 }, { "id": 188316989, "name": "rdpscan", "full_name": "robertdavidgraham\/rdpscan", "owner": { "login": "robertdavidgraham", "id": 3814757, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3814757?v=4", "html_url": "https:\/\/github.com\/robertdavidgraham" }, "html_url": "https:\/\/github.com\/robertdavidgraham\/rdpscan", "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", "updated_at": "2020-04-18T12:00:13Z", "pushed_at": "2019-06-22T21:48:45Z", "stargazers_count": 708, "watchers_count": 708, "forks_count": 166, "forks": 166, "watchers": 708, "score": 0 }, { "id": 189265014, "name": "BlueKeep", "full_name": "Ekultek\/BlueKeep", "owner": { "login": "Ekultek", "id": 14183473, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4", "html_url": "https:\/\/github.com\/Ekultek" }, "html_url": "https:\/\/github.com\/Ekultek\/BlueKeep", "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", "updated_at": "2020-04-20T17:08:58Z", "pushed_at": "2019-09-03T20:50:28Z", "stargazers_count": 1018, "watchers_count": 1018, "forks_count": 349, "forks": 349, "watchers": 1018, "score": 0 }, { "id": 189498490, "name": "bluekeep_CVE-2019-0708_poc_to_exploit", "full_name": "algo7\/bluekeep_CVE-2019-0708_poc_to_exploit", "owner": { "login": "algo7", "id": 11154774, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11154774?v=4", "html_url": "https:\/\/github.com\/algo7" }, "html_url": "https:\/\/github.com\/algo7\/bluekeep_CVE-2019-0708_poc_to_exploit", "description": "Porting BlueKeep PoC from @Ekultek to actual exploits", "fork": false, "created_at": "2019-05-31T00:04:12Z", "updated_at": "2020-04-01T17:26:10Z", "pushed_at": "2020-03-20T10:50:06Z", "stargazers_count": 323, "watchers_count": 323, "forks_count": 116, "forks": 116, "watchers": 323, "score": 0 }, { "id": 189571928, "name": "CVE-2019-0708", "full_name": "AdministratorGithub\/CVE-2019-0708", "owner": { "login": "AdministratorGithub", "id": 19834937, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19834937?v=4", "html_url": "https:\/\/github.com\/AdministratorGithub" }, "html_url": "https:\/\/github.com\/AdministratorGithub\/CVE-2019-0708", "description": "CVE-2019-0708批量蓝屏恶搞", "fork": false, "created_at": "2019-05-31T09:59:30Z", "updated_at": "2019-07-09T09:33:49Z", "pushed_at": "2019-07-09T09:33:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 191340467, "name": "CVE-2019-0708-PoC", "full_name": "at0mik\/CVE-2019-0708-PoC", "owner": { "login": "at0mik", "id": 46066196, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46066196?v=4", "html_url": "https:\/\/github.com\/at0mik" }, "html_url": "https:\/\/github.com\/at0mik\/CVE-2019-0708-PoC", "description": "CVE-2019-0708-PoC Notes and Pseudocodes.", "fork": false, "created_at": "2019-06-11T09:38:36Z", "updated_at": "2019-11-10T09:38:29Z", "pushed_at": "2019-11-10T09:38:27Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 8, "forks": 8, "watchers": 16, "score": 0 }, { "id": 193537193, "name": "cve-2019-0708", "full_name": "cvencoder\/cve-2019-0708", "owner": { "login": "cvencoder", "id": 52171059, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52171059?v=4", "html_url": "https:\/\/github.com\/cvencoder" }, "html_url": "https:\/\/github.com\/cvencoder\/cve-2019-0708", "description": "POC CVE-2019-0708 with python script!", "fork": false, "created_at": "2019-06-24T16:03:08Z", "updated_at": "2019-07-28T09:20:55Z", "pushed_at": "2019-06-24T16:03:58Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 0, "forks": 0, "watchers": 14, "score": 0 }, { "id": 195150954, "name": "CVE-2019-0708-exp", "full_name": "ze0r\/CVE-2019-0708-exp", "owner": { "login": "ze0r", "id": 43227253, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4", "html_url": "https:\/\/github.com\/ze0r" }, "html_url": "https:\/\/github.com\/ze0r\/CVE-2019-0708-exp", "description": null, "fork": false, "created_at": "2019-07-04T01:49:22Z", "updated_at": "2019-11-12T12:02:00Z", "pushed_at": "2019-07-25T07:31:57Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 4, "forks": 4, "watchers": 10, "score": 0 }, { "id": 196871345, "name": "cve-2019-0708", "full_name": "mekhalleh\/cve-2019-0708", "owner": { "login": "mekhalleh", "id": 5225129, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5225129?v=4", "html_url": "https:\/\/github.com\/mekhalleh" }, "html_url": "https:\/\/github.com\/mekhalleh\/cve-2019-0708", "description": "Metasploit module for massive Denial of Service using #Bluekeep vector.", "fork": false, "created_at": "2019-07-14T18:43:48Z", "updated_at": "2020-04-05T04:23:16Z", "pushed_at": "2019-10-01T15:31:26Z", "stargazers_count": 21, "watchers_count": 21, "forks_count": 7, "forks": 7, "watchers": 21, "score": 0 }, { "id": 197547695, "name": "cve-2019-0708", "full_name": "cve-2019-0708-poc\/cve-2019-0708", "owner": { "login": "cve-2019-0708-poc", "id": 53038783, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53038783?v=4", "html_url": "https:\/\/github.com\/cve-2019-0708-poc" }, "html_url": "https:\/\/github.com\/cve-2019-0708-poc\/cve-2019-0708", "description": "CVE-2019-0708 Exploit Tool", "fork": false, "created_at": "2019-07-18T08:41:01Z", "updated_at": "2019-08-29T04:15:45Z", "pushed_at": "2019-07-18T08:44:51Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 0, "forks": 0, "watchers": 18, "score": 0 }, { "id": 197655376, "name": "CVE-2019-0708", "full_name": "andripwn\/CVE-2019-0708", "owner": { "login": "andripwn", "id": 52893492, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52893492?v=4", "html_url": "https:\/\/github.com\/andripwn" }, "html_url": "https:\/\/github.com\/andripwn\/CVE-2019-0708", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-07-18T20:53:54Z", "updated_at": "2020-01-24T04:49:58Z", "pushed_at": "2019-07-18T20:57:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 198343084, "name": "bluekeep", "full_name": "0xeb-bp\/bluekeep", "owner": { "login": "0xeb-bp", "id": 53204152, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53204152?v=4", "html_url": "https:\/\/github.com\/0xeb-bp" }, "html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep", "description": "Public work for CVE-2019-0708", "fork": false, "created_at": "2019-07-23T03:15:53Z", "updated_at": "2020-04-09T15:21:42Z", "pushed_at": "2019-11-19T02:43:38Z", "stargazers_count": 268, "watchers_count": 268, "forks_count": 89, "forks": 89, "watchers": 268, "score": 0 }, { "id": 198731225, "name": "CVE-2019-0708", "full_name": "ntkernel0\/CVE-2019-0708", "owner": { "login": "ntkernel0", "id": 46866847, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46866847?v=4", "html_url": "https:\/\/github.com\/ntkernel0" }, "html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708", "description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)", "fork": false, "created_at": "2019-07-25T01:05:21Z", "updated_at": "2019-12-07T02:05:23Z", "pushed_at": "2019-07-25T01:03:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 202911823, "name": "Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "full_name": "dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "owner": { "login": "dorkerdevil", "id": 15796745, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4", "html_url": "https:\/\/github.com\/dorkerdevil" }, "html_url": "https:\/\/github.com\/dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "description": "rce exploit , made to work with pocsuite3", "fork": false, "created_at": "2019-08-17T17:23:53Z", "updated_at": "2020-04-17T13:27:25Z", "pushed_at": "2019-08-19T02:52:11Z", "stargazers_count": 106, "watchers_count": 106, "forks_count": 52, "forks": 52, "watchers": 106, "score": 0 }, { "id": 202951481, "name": "bluekeep", "full_name": "turingcompl33t\/bluekeep", "owner": { "login": "turingcompl33t", "id": 19956905, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19956905?v=4", "html_url": "https:\/\/github.com\/turingcompl33t" }, "html_url": "https:\/\/github.com\/turingcompl33t\/bluekeep", "description": "Research Regarding CVE-2019-0708.", "fork": false, "created_at": "2019-08-18T02:34:31Z", "updated_at": "2020-03-09T19:52:03Z", "pushed_at": "2019-11-04T01:15:22Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "forks": 3, "watchers": 3, "score": 0 }, { "id": 203477227, "name": "CVE-2019-0708-test", "full_name": "fade-vivida\/CVE-2019-0708-test", "owner": { "login": "fade-vivida", "id": 38774342, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38774342?v=4", "html_url": "https:\/\/github.com\/fade-vivida" }, "html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test", "description": null, "fork": false, "created_at": "2019-08-21T00:48:55Z", "updated_at": "2020-03-11T13:53:42Z", "pushed_at": "2019-11-28T01:38:56Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 206050892, "name": "CVE-2019-0708", "full_name": "skommando\/CVE-2019-0708", "owner": { "login": "skommando", "id": 22767889, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22767889?v=4", "html_url": "https:\/\/github.com\/skommando" }, "html_url": "https:\/\/github.com\/skommando\/CVE-2019-0708", "description": "CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。", "fork": false, "created_at": "2019-09-03T10:25:48Z", "updated_at": "2019-10-02T17:51:34Z", "pushed_at": "2019-09-12T02:29:03Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 206863569, "name": "msf-module-CVE-2019-0708", "full_name": "RickGeex\/msf-module-CVE-2019-0708", "owner": { "login": "RickGeex", "id": 7975904, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7975904?v=4", "html_url": "https:\/\/github.com\/RickGeex" }, "html_url": "https:\/\/github.com\/RickGeex\/msf-module-CVE-2019-0708", "description": "Metasploit module for CVE-2019-0708 (BlueKeep) - https:\/\/github.com\/rapid7\/metasploit-framework\/tree\/5a0119b04309c8e61b44763ac08811cd3ecbbf8d\/modules\/exploits\/windows\/rdp", "fork": false, "created_at": "2019-09-06T19:46:03Z", "updated_at": "2020-03-25T05:25:37Z", "pushed_at": "2019-09-07T09:41:22Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 3, "forks": 3, "watchers": 9, "score": 0 }, { "id": 206893335, "name": "CVE-2019-0708", "full_name": "wqsemc\/CVE-2019-0708", "owner": { "login": "wqsemc", "id": 36132717, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36132717?v=4", "html_url": "https:\/\/github.com\/wqsemc" }, "html_url": "https:\/\/github.com\/wqsemc\/CVE-2019-0708", "description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.", "fork": false, "created_at": "2019-09-07T00:28:45Z", "updated_at": "2020-03-25T05:25:08Z", "pushed_at": "2019-09-16T10:35:57Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 4, "forks": 4, "watchers": 10, "score": 0 }, { "id": 206919373, "name": "CVE-2019-0708-RCE", "full_name": "mai-lang-chai\/CVE-2019-0708-RCE", "owner": { "login": "mai-lang-chai", "id": 36095584, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36095584?v=4", "html_url": "https:\/\/github.com\/mai-lang-chai" }, "html_url": "https:\/\/github.com\/mai-lang-chai\/CVE-2019-0708-RCE", "description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程", "fork": false, "created_at": "2019-09-07T05:15:23Z", "updated_at": "2020-04-06T02:00:19Z", "pushed_at": "2019-09-20T04:53:41Z", "stargazers_count": 37, "watchers_count": 37, "forks_count": 15, "forks": 15, "watchers": 37, "score": 0 }, { "id": 206926531, "name": "CVE-2019-0708RDP-MSF", "full_name": "Micr067\/CVE-2019-0708RDP-MSF", "owner": { "login": "Micr067", "id": 49861012, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/49861012?v=4", "html_url": "https:\/\/github.com\/Micr067" }, "html_url": "https:\/\/github.com\/Micr067\/CVE-2019-0708RDP-MSF", "description": "CVE-2019-0708RDP MSF", "fork": false, "created_at": "2019-09-07T06:32:25Z", "updated_at": "2019-09-07T06:32:25Z", "pushed_at": "2019-09-07T06:32:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 206928449, "name": "CVE-2019-0708-BlueKeep", "full_name": "adkinguzi\/CVE-2019-0708-BlueKeep", "owner": { "login": "adkinguzi", "id": 31617622, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4", "html_url": "https:\/\/github.com\/adkinguzi" }, "html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep", "description": null, "fork": false, "created_at": "2019-09-07T06:50:47Z", "updated_at": "2020-03-25T05:24:54Z", "pushed_at": "2019-09-07T07:05:24Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "forks": 2, "watchers": 1, "score": 0 }, { "id": 206932731, "name": "CVE-2019-0708", "full_name": "FrostsaberX\/CVE-2019-0708", "owner": { "login": "FrostsaberX", "id": 24857203, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24857203?v=4", "html_url": "https:\/\/github.com\/FrostsaberX" }, "html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2019-0708", "description": "CVE-2019-0708 With Metasploit-Framework Exploit", "fork": false, "created_at": "2019-09-07T07:32:14Z", "updated_at": "2019-09-09T01:17:19Z", "pushed_at": "2019-09-07T08:50:59Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "forks": 1, "watchers": 3, "score": 0 }, { "id": 206976374, "name": "CVE-2019-0708-EXP-MSF-", "full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-", "owner": { "login": "qinggegeya", "id": 30001685, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4", "html_url": "https:\/\/github.com\/qinggegeya" }, "html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-", "description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708", "fork": false, "created_at": "2019-09-07T14:02:50Z", "updated_at": "2020-03-25T16:07:00Z", "pushed_at": "2019-09-07T15:07:24Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 5, "forks": 5, "watchers": 3, "score": 0 }, { "id": 207703935, "name": "CVE-2019-0708", "full_name": "Straight-wood\/CVE-2019-0708", "owner": { "login": "Straight-wood", "id": 35881006, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35881006?v=4", "html_url": "https:\/\/github.com\/Straight-wood" }, "html_url": "https:\/\/github.com\/Straight-wood\/CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-09-11T02:19:19Z", "updated_at": "2019-09-11T02:23:01Z", "pushed_at": "2019-09-11T02:23:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 207790184, "name": "CVE-2019-0708-test", "full_name": "0xFlag\/CVE-2019-0708-test", "owner": { "login": "0xFlag", "id": 54313514, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/54313514?v=4", "html_url": "https:\/\/github.com\/0xFlag" }, "html_url": "https:\/\/github.com\/0xFlag\/CVE-2019-0708-test", "description": "CVE-2019-0708 C#验证漏洞", "fork": false, "created_at": "2019-09-11T10:58:04Z", "updated_at": "2019-09-13T01:46:23Z", "pushed_at": "2019-09-13T01:46:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 208964787, "name": "CVE-2019-0708", "full_name": "1aa87148377\/CVE-2019-0708", "owner": { "login": "1aa87148377", "id": 51265955, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51265955?v=4", "html_url": "https:\/\/github.com\/1aa87148377" }, "html_url": "https:\/\/github.com\/1aa87148377\/CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-09-17T05:15:28Z", "updated_at": "2019-09-17T05:17:33Z", "pushed_at": "2019-09-17T05:17:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 211623683, "name": "cve-2019-0708_bluekeep_rce", "full_name": "coolboy4me\/cve-2019-0708_bluekeep_rce", "owner": { "login": "coolboy4me", "id": 10040130, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10040130?v=4", "html_url": "https:\/\/github.com\/coolboy4me" }, "html_url": "https:\/\/github.com\/coolboy4me\/cve-2019-0708_bluekeep_rce", "description": "it works on xp (all version sp2 sp3)", "fork": false, "created_at": "2019-09-29T07:38:41Z", "updated_at": "2020-03-25T05:30:55Z", "pushed_at": "2019-09-30T03:44:18Z", "stargazers_count": 63, "watchers_count": 63, "forks_count": 12, "forks": 12, "watchers": 63, "score": 0 }, { "id": 211942417, "name": "ispy", "full_name": "Cyb0r9\/ispy", "owner": { "login": "Cyb0r9", "id": 43474676, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43474676?v=4", "html_url": "https:\/\/github.com\/Cyb0r9" }, "html_url": "https:\/\/github.com\/Cyb0r9\/ispy", "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", "updated_at": "2020-04-18T04:57:33Z", "pushed_at": "2019-10-16T01:04:12Z", "stargazers_count": 150, "watchers_count": 150, "forks_count": 46, "forks": 46, "watchers": 150, "score": 0 }, { "id": 214051334, "name": "CVE-2019-0708", "full_name": "shishibabyq\/CVE-2019-0708", "owner": { "login": "shishibabyq", "id": 56372841, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56372841?v=4", "html_url": "https:\/\/github.com\/shishibabyq" }, "html_url": "https:\/\/github.com\/shishibabyq\/CVE-2019-0708", "description": "CVE-2019-0708", "fork": false, "created_at": "2019-10-10T00:34:41Z", "updated_at": "2020-03-25T05:23:01Z", "pushed_at": "2019-10-10T00:50:48Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "forks": 0, "watchers": 3, "score": 0 }, { "id": 214524140, "name": "Wincrash", "full_name": "pwnhacker0x18\/Wincrash", "owner": { "login": "pwnhacker0x18", "id": 51971493, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51971493?v=4", "html_url": "https:\/\/github.com\/pwnhacker0x18" }, "html_url": "https:\/\/github.com\/pwnhacker0x18\/Wincrash", "description": "Mass exploit for CVE-2019-0708", "fork": false, "created_at": "2019-10-11T20:33:35Z", "updated_at": "2019-11-28T11:38:13Z", "pushed_at": "2019-10-11T20:42:38Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 221436919, "name": "CVE-2019-0708-DOS", "full_name": "R4v3nG\/CVE-2019-0708-DOS", "owner": { "login": "R4v3nG", "id": 43517528, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43517528?v=4", "html_url": "https:\/\/github.com\/R4v3nG" }, "html_url": "https:\/\/github.com\/R4v3nG\/CVE-2019-0708-DOS", "description": "CVE-2019-0708 DOS RDP", "fork": false, "created_at": "2019-11-13T10:49:51Z", "updated_at": "2019-12-01T20:58:13Z", "pushed_at": "2019-12-01T20:58:11Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 223320391, "name": "-2-CVE-2019-0708", "full_name": "ulisesrc\/-2-CVE-2019-0708", "owner": { "login": "ulisesrc", "id": 3741400, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3741400?v=4", "html_url": "https:\/\/github.com\/ulisesrc" }, "html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-11-22T04:00:49Z", "updated_at": "2019-11-22T04:01:11Z", "pushed_at": "2019-11-22T04:01:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 226491441, "name": "CVE-2019-0708", "full_name": "worawit\/CVE-2019-0708", "owner": { "login": "worawit", "id": 1352296, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1352296?v=4", "html_url": "https:\/\/github.com\/worawit" }, "html_url": "https:\/\/github.com\/worawit\/CVE-2019-0708", "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", "updated_at": "2020-02-19T13:29:15Z", "pushed_at": "2019-12-08T10:09:56Z", "stargazers_count": 71, "watchers_count": 71, "forks_count": 5, "forks": 5, "watchers": 71, "score": 0 }, { "id": 235239045, "name": "CVE-2019-0708-EXP-Windows", "full_name": "cbwang505\/CVE-2019-0708-EXP-Windows", "owner": { "login": "cbwang505", "id": 4487329, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4487329?v=4", "html_url": "https:\/\/github.com\/cbwang505" }, "html_url": "https:\/\/github.com\/cbwang505\/CVE-2019-0708-EXP-Windows", "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", "updated_at": "2020-03-25T08:42:59Z", "pushed_at": "2020-01-21T03:15:41Z", "stargazers_count": 5, "watchers_count": 5, "forks_count": 5, "forks": 5, "watchers": 5, "score": 0 }, { "id": 241542314, "name": "CVE-2019-0708-Windows", "full_name": "eastmountyxz\/CVE-2019-0708-Windows", "owner": { "login": "eastmountyxz", "id": 53172375, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4", "html_url": "https:\/\/github.com\/eastmountyxz" }, "html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows", "description": "这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!", "fork": false, "created_at": "2020-02-19T05:40:22Z", "updated_at": "2020-03-13T12:53:52Z", "pushed_at": "2020-03-13T12:53:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 247883778, "name": "Scanner-CVE-2019-0708", "full_name": "JSec1337\/Scanner-CVE-2019-0708", "owner": { "login": "JSec1337", "id": 62246378, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62246378?v=4", "html_url": "https:\/\/github.com\/JSec1337" }, "html_url": "https:\/\/github.com\/JSec1337\/Scanner-CVE-2019-0708", "description": "Scanner CVE-2019-0708", "fork": false, "created_at": "2020-03-17T05:05:14Z", "updated_at": "2020-03-17T06:50:00Z", "pushed_at": "2020-03-17T06:49:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]