[ { "id": 650215314, "name": "MOVEit_CVE-2023-34362_IOCs", "full_name": "deepinstinct\/MOVEit_CVE-2023-34362_IOCs", "owner": { "login": "deepinstinct", "id": 21313699, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21313699?v=4", "html_url": "https:\/\/github.com\/deepinstinct" }, "html_url": "https:\/\/github.com\/deepinstinct\/MOVEit_CVE-2023-34362_IOCs", "description": "CVE-2023-34362-IOCs. More information on Deep Instinct's blog site.", "fork": false, "created_at": "2023-06-06T15:33:49Z", "updated_at": "2023-08-13T07:22:50Z", "pushed_at": "2023-06-06T15:36:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 651666895, "name": "CVE-2023-34362", "full_name": "horizon3ai\/CVE-2023-34362", "owner": { "login": "horizon3ai", "id": 79593994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79593994?v=4", "html_url": "https:\/\/github.com\/horizon3ai" }, "html_url": "https:\/\/github.com\/horizon3ai\/CVE-2023-34362", "description": "MOVEit CVE-2023-34362", "fork": false, "created_at": "2023-06-09T19:07:32Z", "updated_at": "2024-06-28T01:27:11Z", "pushed_at": "2023-06-26T20:24:32Z", "stargazers_count": 135, "watchers_count": 135, "has_discussions": false, "forks_count": 34, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 34, "watchers": 135, "score": 0, "subscribers_count": 4 }, { "id": 652620311, "name": "CVE-2023-34362", "full_name": "sfewer-r7\/CVE-2023-34362", "owner": { "login": "sfewer-r7", "id": 122022313, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/122022313?v=4", "html_url": "https:\/\/github.com\/sfewer-r7" }, "html_url": "https:\/\/github.com\/sfewer-r7\/CVE-2023-34362", "description": "CVE-2023-34362: MOVEit Transfer Unauthenticated RCE", "fork": false, "created_at": "2023-06-12T12:56:12Z", "updated_at": "2024-05-13T07:06:32Z", "pushed_at": "2024-03-24T00:46:38Z", "stargazers_count": 62, "watchers_count": 62, "has_discussions": false, "forks_count": 22, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 22, "watchers": 62, "score": 0, "subscribers_count": 4 }, { "id": 654356196, "name": "MOVEit-CVE-2023-34362", "full_name": "kenbuckler\/MOVEit-CVE-2023-34362", "owner": { "login": "kenbuckler", "id": 69703097, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69703097?v=4", "html_url": "https:\/\/github.com\/kenbuckler" }, "html_url": "https:\/\/github.com\/kenbuckler\/MOVEit-CVE-2023-34362", "description": "Repository with everything I have tracking the impact of MOVEit CVE-2023-34362", "fork": false, "created_at": "2023-06-16T00:39:37Z", "updated_at": "2023-07-25T20:51:32Z", "pushed_at": "2023-06-19T16:11:47Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 664363660, "name": "CVE-2023-34362", "full_name": "Malwareman007\/CVE-2023-34362", "owner": { "login": "Malwareman007", "id": 86009160, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4", "html_url": "https:\/\/github.com\/Malwareman007" }, "html_url": "https:\/\/github.com\/Malwareman007\/CVE-2023-34362", "description": "POC for CVE-2023-34362 affecting MOVEit Transfer", "fork": false, "created_at": "2023-07-09T18:44:22Z", "updated_at": "2023-08-22T15:04:35Z", "pushed_at": "2023-07-09T18:48:21Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "api", "arbitrary-user", "cve-2023-34362", "moveit", "payload", "rs256", "sql-injection", "sql-injection-exploitation", "sysadmin", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 9, "score": 0, "subscribers_count": 1 }, { "id": 667925831, "name": "moveit-payload-decrypt-CVE-2023-34362", "full_name": "toorandom\/moveit-payload-decrypt-CVE-2023-34362", "owner": { "login": "toorandom", "id": 1768263, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1768263?v=4", "html_url": "https:\/\/github.com\/toorandom" }, "html_url": "https:\/\/github.com\/toorandom\/moveit-payload-decrypt-CVE-2023-34362", "description": "This shellscript given the OrgKey 0 will parse the header of the base64 artifacts found in MOVEit Logs and decrypt the Serialized object used a payload", "fork": false, "created_at": "2023-07-18T15:58:00Z", "updated_at": "2023-07-19T20:43:06Z", "pushed_at": "2023-07-19T17:08:30Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 685546262, "name": "MOVEit-Exploit", "full_name": "errorfiathck\/MOVEit-Exploit", "owner": { "login": "errorfiathck", "id": 110461609, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110461609?v=4", "html_url": "https:\/\/github.com\/errorfiathck" }, "html_url": "https:\/\/github.com\/errorfiathck\/MOVEit-Exploit", "description": "an exploit of POC for CVE-2023-34362 affecting MOVEit Transfer", "fork": false, "created_at": "2023-08-31T13:25:53Z", "updated_at": "2024-01-11T09:26:04Z", "pushed_at": "2023-08-31T13:28:49Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "exploit", "kali-linux", "moveit", "python", "python3" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 737660313, "name": "MOVEit-CVE-2023-34362", "full_name": "Chinyemba-ck\/MOVEit-CVE-2023-34362", "owner": { "login": "Chinyemba-ck", "id": 85675608, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85675608?v=4", "html_url": "https:\/\/github.com\/Chinyemba-ck" }, "html_url": "https:\/\/github.com\/Chinyemba-ck\/MOVEit-CVE-2023-34362", "description": "A video presentation analysing the technical details, scale and lessons to be learned from the MOVEit CVE-2023=3462(CS50 Introduction to Cyber Security Finale Project)", "fork": false, "created_at": "2024-01-01T00:55:07Z", "updated_at": "2024-01-01T00:55:07Z", "pushed_at": "2024-01-01T00:56:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 821497009, "name": "MoveIT-CVE-2023-34362-RCE", "full_name": "glen-pearson\/MoveIT-CVE-2023-34362-RCE", "owner": { "login": "glen-pearson", "id": 49351264, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49351264?v=4", "html_url": "https:\/\/github.com\/glen-pearson" }, "html_url": "https:\/\/github.com\/glen-pearson\/MoveIT-CVE-2023-34362-RCE", "description": "Modified RCE with a remote shell and logging", "fork": false, "created_at": "2024-06-28T17:13:15Z", "updated_at": "2024-06-29T01:41:48Z", "pushed_at": "2024-06-29T01:41:46Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824317369, "name": "MOVEit-CVE-2023-34362", "full_name": "aditibv\/MOVEit-CVE-2023-34362", "owner": { "login": "aditibv", "id": 64188977, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64188977?v=4", "html_url": "https:\/\/github.com\/aditibv" }, "html_url": "https:\/\/github.com\/aditibv\/MOVEit-CVE-2023-34362", "description": "This repository investigates the exploitation of CVE-2023-34362 in the MOVEit file transfer server by the TA505 (Cl0p) ransomware group. It explores the group's tactics and past campaigns targeting file transfer applications, aiming to enhance understanding and defensive measures against such threats. ", "fork": false, "created_at": "2024-07-04T21:13:48Z", "updated_at": "2024-08-07T20:25:25Z", "pushed_at": "2024-07-04T21:17:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]