[ { "id": 88117490, "name": "CVE-2017-0199", "full_name": "ryhanson\/CVE-2017-0199", "owner": { "login": "ryhanson", "id": 3486433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3486433?v=4", "html_url": "https:\/\/github.com\/ryhanson" }, "html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199", "description": null, "fork": false, "created_at": "2017-04-13T02:41:36Z", "updated_at": "2017-04-13T02:41:36Z", "pushed_at": "2017-04-13T02:41:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 88185964, "name": "cve-2017-0199", "full_name": "SyFi\/cve-2017-0199", "owner": { "login": "SyFi", "id": 26314806, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26314806?v=4", "html_url": "https:\/\/github.com\/SyFi" }, "html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199", "description": null, "fork": false, "created_at": "2017-04-13T16:40:27Z", "updated_at": "2024-08-12T19:29:04Z", "pushed_at": "2017-04-13T16:45:10Z", "stargazers_count": 12, "watchers_count": 12, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 12, "score": 0, "subscribers_count": 1 }, { "id": 88486475, "name": "CVE-2017-0199", "full_name": "bhdresh\/CVE-2017-0199", "owner": { "login": "bhdresh", "id": 8931885, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4", "html_url": "https:\/\/github.com\/bhdresh" }, "html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199", "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-17T08:10:07Z", "updated_at": "2024-08-23T04:32:17Z", "pushed_at": "2017-11-19T11:01:16Z", "stargazers_count": 722, "watchers_count": 722, "has_discussions": false, "forks_count": 260, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 260, "watchers": 722, "score": 0, "subscribers_count": 47 }, { "id": 88590374, "name": "CVE-2017-0199-Fix", "full_name": "NotAwful\/CVE-2017-0199-Fix", "owner": { "login": "NotAwful", "id": 25178947, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25178947?v=4", "html_url": "https:\/\/github.com\/NotAwful" }, "html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix", "description": "Quick and dirty fix to OLE2 executing code via .hta", "fork": false, "created_at": "2017-04-18T06:33:45Z", "updated_at": "2023-06-16T16:11:28Z", "pushed_at": "2017-04-24T20:48:36Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2017-0199", "guide", "registry", "windows" ], "visibility": "public", "forks": 2, "watchers": 14, "score": 0, "subscribers_count": 1 }, { "id": 88700030, "name": "CVE-2017-0199-master", "full_name": "haibara3839\/CVE-2017-0199-master", "owner": { "login": "haibara3839", "id": 17246565, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17246565?v=4", "html_url": "https:\/\/github.com\/haibara3839" }, "html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master", "description": "CVE-2017-0199", "fork": false, "created_at": "2017-04-19T04:15:54Z", "updated_at": "2020-08-13T13:59:18Z", "pushed_at": "2017-04-19T04:25:47Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 16, "score": 0, "subscribers_count": 3 }, { "id": 89043209, "name": "CVE-2017-0199", "full_name": "Exploit-install\/CVE-2017-0199", "owner": { "login": "Exploit-install", "id": 13824191, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13824191?v=4", "html_url": "https:\/\/github.com\/Exploit-install" }, "html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199", "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-22T04:01:38Z", "updated_at": "2024-08-12T19:29:17Z", "pushed_at": "2017-04-22T04:01:54Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 14, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 14, "watchers": 7, "score": 0, "subscribers_count": 3 }, { "id": 89065031, "name": "PoC-CVE-2017-0199", "full_name": "mzakyz666\/PoC-CVE-2017-0199", "owner": { "login": "mzakyz666", "id": 22362343, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22362343?v=4", "html_url": "https:\/\/github.com\/mzakyz666" }, "html_url": "https:\/\/github.com\/mzakyz666\/PoC-CVE-2017-0199", "description": "Exploit toolkit for vulnerability RCE Microsoft RTF", "fork": false, "created_at": "2017-04-22T11:32:39Z", "updated_at": "2019-02-02T15:31:28Z", "pushed_at": "2017-04-22T11:35:38Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 89145802, "name": "CVE-2017-0199", "full_name": "n1shant-sinha\/CVE-2017-0199", "owner": { "login": "n1shant-sinha", "id": 8848453, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8848453?v=4", "html_url": "https:\/\/github.com\/n1shant-sinha" }, "html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199", "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.", "fork": false, "created_at": "2017-04-23T13:58:30Z", "updated_at": "2024-08-12T19:29:19Z", "pushed_at": "2017-04-23T14:05:24Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 89296859, "name": "htattack", "full_name": "kn0wm4d\/htattack", "owner": { "login": "kn0wm4d", "id": 15344287, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15344287?v=4", "html_url": "https:\/\/github.com\/kn0wm4d" }, "html_url": "https:\/\/github.com\/kn0wm4d\/htattack", "description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)", "fork": false, "created_at": "2017-04-24T23:44:31Z", "updated_at": "2024-08-12T19:29:22Z", "pushed_at": "2017-04-24T23:45:18Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 89314149, "name": "Cve-2017-0199", "full_name": "joke998\/Cve-2017-0199", "owner": { "login": "joke998", "id": 25948923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25948923?v=4", "html_url": "https:\/\/github.com\/joke998" }, "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199", "description": null, "fork": false, "created_at": "2017-04-25T03:38:15Z", "updated_at": "2017-04-25T03:38:15Z", "pushed_at": "2017-04-25T03:38:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 89314954, "name": "Cve-2017-0199-", "full_name": "joke998\/Cve-2017-0199-", "owner": { "login": "joke998", "id": 25948923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25948923?v=4", "html_url": "https:\/\/github.com\/joke998" }, "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-", "description": "Cve-2017-0199", "fork": false, "created_at": "2017-04-25T03:48:53Z", "updated_at": "2017-04-25T03:48:53Z", "pushed_at": "2017-04-25T03:48:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 95870771, "name": "Microsoft-Word-CVE-2017-0199-", "full_name": "sUbc0ol\/Microsoft-Word-CVE-2017-0199-", "owner": { "login": "sUbc0ol", "id": 24601456, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24601456?v=4", "html_url": "https:\/\/github.com\/sUbc0ol" }, "html_url": "https:\/\/github.com\/sUbc0ol\/Microsoft-Word-CVE-2017-0199-", "description": null, "fork": false, "created_at": "2017-06-30T09:08:40Z", "updated_at": "2024-08-12T19:30:58Z", "pushed_at": "2017-06-30T09:11:27Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 104072875, "name": "CVE-2017-0199", "full_name": "viethdgit\/CVE-2017-0199", "owner": { "login": "viethdgit", "id": 24888568, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24888568?v=4", "html_url": "https:\/\/github.com\/viethdgit" }, "html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199", "description": null, "fork": false, "created_at": "2017-09-19T12:38:47Z", "updated_at": "2017-09-19T12:38:47Z", "pushed_at": "2017-09-19T12:47:49Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 109420190, "name": "RTF-Cleaner", "full_name": "nicpenning\/RTF-Cleaner", "owner": { "login": "nicpenning", "id": 5582679, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4", "html_url": "https:\/\/github.com\/nicpenning" }, "html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner", "description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.", "fork": false, "created_at": "2017-11-03T16:47:16Z", "updated_at": "2019-06-29T16:49:45Z", "pushed_at": "2017-11-03T20:55:20Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 3 }, { "id": 111145351, "name": "2017-11-17-Maldoc-Using-CVE-2017-0199", "full_name": "herbiezimmerman\/2017-11-17-Maldoc-Using-CVE-2017-0199", "owner": { "login": "herbiezimmerman", "id": 12056770, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4", "html_url": "https:\/\/github.com\/herbiezimmerman" }, "html_url": "https:\/\/github.com\/herbiezimmerman\/2017-11-17-Maldoc-Using-CVE-2017-0199", "description": null, "fork": false, "created_at": "2017-11-17T20:00:29Z", "updated_at": "2024-08-12T19:34:09Z", "pushed_at": "2017-11-17T20:00:42Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve2017-0199", "malware-sample" ], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 113558617, "name": "RTF-Cleaner", "full_name": "jacobsoo\/RTF-Cleaner", "owner": { "login": "jacobsoo", "id": 3516693, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3516693?v=4", "html_url": "https:\/\/github.com\/jacobsoo" }, "html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner", "description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759", "fork": false, "created_at": "2017-12-08T09:45:25Z", "updated_at": "2022-06-23T11:59:37Z", "pushed_at": "2017-12-08T09:46:07Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 2 }, { "id": 126305253, "name": "CVE-2017-0199", "full_name": "likescam\/CVE-2017-0199", "owner": { "login": "likescam", "id": 2469038, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4", "html_url": "https:\/\/github.com\/likescam" }, "html_url": "https:\/\/github.com\/likescam\/CVE-2017-0199", "description": null, "fork": false, "created_at": "2018-03-22T08:40:55Z", "updated_at": "2018-03-22T08:41:14Z", "pushed_at": "2018-03-22T08:41:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 305189722, "name": "CVE-2017-0199-PY-KIT", "full_name": "stealth-ronin\/CVE-2017-0199-PY-KIT", "owner": { "login": "stealth-ronin", "id": 65579305, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65579305?v=4", "html_url": "https:\/\/github.com\/stealth-ronin" }, "html_url": "https:\/\/github.com\/stealth-ronin\/CVE-2017-0199-PY-KIT", "description": null, "fork": false, "created_at": "2020-10-18T20:24:38Z", "updated_at": "2020-10-18T20:25:13Z", "pushed_at": "2020-10-18T20:25:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 483583125, "name": "CVE-2017-0199", "full_name": "Phantomlancer123\/CVE-2017-0199", "owner": { "login": "Phantomlancer123", "id": 102849364, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102849364?v=4", "html_url": "https:\/\/github.com\/Phantomlancer123" }, "html_url": "https:\/\/github.com\/Phantomlancer123\/CVE-2017-0199", "description": null, "fork": false, "created_at": "2022-04-20T09:07:52Z", "updated_at": "2022-04-20T10:30:42Z", "pushed_at": "2022-04-20T09:09:01Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": true, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 484544802, "name": "CVE-2017-0199", "full_name": "BRAINIAC22\/CVE-2017-0199", "owner": { "login": "BRAINIAC22", "id": 89447379, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89447379?v=4", "html_url": "https:\/\/github.com\/BRAINIAC22" }, "html_url": "https:\/\/github.com\/BRAINIAC22\/CVE-2017-0199", "description": "A python script\/generator, for generating and exploiting Microsoft vulnerability", "fork": false, "created_at": "2022-04-22T19:10:16Z", "updated_at": "2022-04-22T19:14:36Z", "pushed_at": "2022-04-22T19:14:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 524890302, "name": "CVE-2017-0199-reprofuction", "full_name": "Sunqiz\/CVE-2017-0199-reprofuction", "owner": { "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", "html_url": "https:\/\/github.com\/Sunqiz" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2017-0199-reprofuction", "description": "CVE-2017-0199复现", "fork": false, "created_at": "2022-08-15T07:15:55Z", "updated_at": "2024-08-12T20:26:13Z", "pushed_at": "2022-08-19T02:09:03Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 686431739, "name": "CVE-2017-0199-v5.0", "full_name": "TheCyberWatchers\/CVE-2017-0199-v5.0", "owner": { "login": "TheCyberWatchers", "id": 110695357, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110695357?v=4", "html_url": "https:\/\/github.com\/TheCyberWatchers" }, "html_url": "https:\/\/github.com\/TheCyberWatchers\/CVE-2017-0199-v5.0", "description": null, "fork": false, "created_at": "2023-09-02T19:15:12Z", "updated_at": "2023-09-02T19:17:12Z", "pushed_at": "2023-09-02T19:40:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]