[ { "id": 186849775, "name": "CVE-2019-0708", "full_name": "k8gege\/CVE-2019-0708", "owner": { "login": "k8gege", "id": 42312878, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4", "html_url": "https:\/\/github.com\/k8gege" }, "html_url": "https:\/\/github.com\/k8gege\/CVE-2019-0708", "description": "3389远程桌面代码执行漏洞CVE-2019-0708批量检测工具(Rdpscan Bluekeep Check)", "fork": false, "created_at": "2019-05-15T15:01:38Z", "updated_at": "2020-07-02T11:31:28Z", "pushed_at": "2019-06-13T13:07:03Z", "stargazers_count": 300, "watchers_count": 300, "forks_count": 177, "forks": 177, "watchers": 300, "score": 0 }, { "id": 186865180, "name": "CVE-2019-0708", "full_name": "thugcrowd\/CVE-2019-0708", "owner": { "login": "thugcrowd", "id": 40207376, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40207376?v=4", "html_url": "https:\/\/github.com\/thugcrowd" }, "html_url": "https:\/\/github.com\/thugcrowd\/CVE-2019-0708", "description": "sup pry0cc :3", "fork": false, "created_at": "2019-05-15T16:33:31Z", "updated_at": "2020-03-24T14:55:02Z", "pushed_at": "2019-08-28T02:51:47Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 0, "forks": 0, "watchers": 6, "score": 0 }, { "id": 187057686, "name": "CVE-2019-0708-Check-Device-Patch-Status", "full_name": "fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status", "owner": { "login": "fourtwizzy", "id": 1735941, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1735941?v=4", "html_url": "https:\/\/github.com\/fourtwizzy" }, "html_url": "https:\/\/github.com\/fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status", "description": "Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5\/14\/19 patches.", "fork": false, "created_at": "2019-05-16T15:47:29Z", "updated_at": "2020-04-22T07:48:42Z", "pushed_at": "2019-08-28T17:14:57Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 8, "forks": 8, "watchers": 18, "score": 0 }, { "id": 187567229, "name": "CVE-2019-0708-", "full_name": "ttsite\/CVE-2019-0708-", "owner": { "login": "ttsite", "id": 43260559, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43260559?v=4", "html_url": "https:\/\/github.com\/ttsite" }, "html_url": "https:\/\/github.com\/ttsite\/CVE-2019-0708-", "description": "Announces fraud", "fork": false, "created_at": "2019-05-20T04:23:58Z", "updated_at": "2019-06-11T14:50:34Z", "pushed_at": "2019-06-11T14:50:33Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 187758878, "name": "CVE-2019-0708", "full_name": "ttsite\/CVE-2019-0708", "owner": { "login": "ttsite", "id": 43260559, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/43260559?v=4", "html_url": "https:\/\/github.com\/ttsite" }, "html_url": "https:\/\/github.com\/ttsite\/CVE-2019-0708", "description": "Report fraud", "fork": false, "created_at": "2019-05-21T04:00:49Z", "updated_at": "2019-07-04T09:25:15Z", "pushed_at": "2019-07-04T09:25:14Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 187931596, "name": "CVE-2019-0708", "full_name": "zerosum0x0\/CVE-2019-0708", "owner": { "login": "zerosum0x0", "id": 3971576, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3971576?v=4", "html_url": "https:\/\/github.com\/zerosum0x0" }, "html_url": "https:\/\/github.com\/zerosum0x0\/CVE-2019-0708", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-05-22T00:08:44Z", "updated_at": "2020-07-02T09:38:18Z", "pushed_at": "2019-10-01T12:23:59Z", "stargazers_count": 1107, "watchers_count": 1107, "forks_count": 373, "forks": 373, "watchers": 1107, "score": 0 }, { "id": 188316989, "name": "rdpscan", "full_name": "robertdavidgraham\/rdpscan", "owner": { "login": "robertdavidgraham", "id": 3814757, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3814757?v=4", "html_url": "https:\/\/github.com\/robertdavidgraham" }, "html_url": "https:\/\/github.com\/robertdavidgraham\/rdpscan", "description": "A quick scanner for the CVE-2019-0708 \"BlueKeep\" vulnerability.", "fork": false, "created_at": "2019-05-23T22:50:12Z", "updated_at": "2020-06-29T06:15:33Z", "pushed_at": "2019-06-22T21:48:45Z", "stargazers_count": 744, "watchers_count": 744, "forks_count": 177, "forks": 177, "watchers": 744, "score": 0 }, { "id": 189265014, "name": "BlueKeep", "full_name": "Ekultek\/BlueKeep", "owner": { "login": "Ekultek", "id": 14183473, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4", "html_url": "https:\/\/github.com\/Ekultek" }, "html_url": "https:\/\/github.com\/Ekultek\/BlueKeep", "description": "Proof of concept for CVE-2019-0708", "fork": false, "created_at": "2019-05-29T16:53:54Z", "updated_at": "2020-07-02T09:48:24Z", "pushed_at": "2019-09-03T20:50:28Z", "stargazers_count": 1033, "watchers_count": 1033, "forks_count": 347, "forks": 347, "watchers": 1033, "score": 0 }, { "id": 189498490, "name": "bluekeep_CVE-2019-0708_poc_to_exploit", "full_name": "algo7\/bluekeep_CVE-2019-0708_poc_to_exploit", "owner": { "login": "algo7", "id": 11154774, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11154774?v=4", "html_url": "https:\/\/github.com\/algo7" }, "html_url": "https:\/\/github.com\/algo7\/bluekeep_CVE-2019-0708_poc_to_exploit", "description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits", "fork": false, "created_at": "2019-05-31T00:04:12Z", "updated_at": "2020-06-30T04:34:11Z", "pushed_at": "2020-05-09T09:49:14Z", "stargazers_count": 330, "watchers_count": 330, "forks_count": 115, "forks": 115, "watchers": 330, "score": 0 }, { "id": 189571928, "name": "CVE-2019-0708", "full_name": "AdministratorGithub\/CVE-2019-0708", "owner": { "login": "AdministratorGithub", "id": 19834937, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/19834937?v=4", "html_url": "https:\/\/github.com\/AdministratorGithub" }, "html_url": "https:\/\/github.com\/AdministratorGithub\/CVE-2019-0708", "description": "CVE-2019-0708批量蓝屏恶搞", "fork": false, "created_at": "2019-05-31T09:59:30Z", "updated_at": "2019-07-09T09:33:49Z", "pushed_at": "2019-07-09T09:33:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 189959275, "name": "detect_bluekeep.py", "full_name": "HynekPetrak\/detect_bluekeep.py", "owner": { "login": "HynekPetrak", "id": 8593983, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8593983?v=4", "html_url": "https:\/\/github.com\/HynekPetrak" }, "html_url": "https:\/\/github.com\/HynekPetrak\/detect_bluekeep.py", "description": "Python script to detect bluekeep vulnerability (CVE-2019-0708) with TLS\/SSL and x509 support", "fork": false, "created_at": "2019-06-03T07:49:26Z", "updated_at": "2020-06-17T18:35:35Z", "pushed_at": "2019-06-12T08:48:17Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 4, "forks": 4, "watchers": 18, "score": 0 }, { "id": 191301322, "name": "CVE-2019-0708", "full_name": "Pa55w0rd\/CVE-2019-0708", "owner": { "login": "Pa55w0rd", "id": 16274549, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/16274549?v=4", "html_url": "https:\/\/github.com\/Pa55w0rd" }, "html_url": "https:\/\/github.com\/Pa55w0rd\/CVE-2019-0708", "description": "CVE-2019-0708批量检测", "fork": false, "created_at": "2019-06-11T05:38:26Z", "updated_at": "2020-04-06T14:16:41Z", "pushed_at": "2019-06-11T06:40:41Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 2, "forks": 2, "watchers": 10, "score": 0 }, { "id": 191340467, "name": "CVE-2019-0708-PoC", "full_name": "at0mik\/CVE-2019-0708-PoC", "owner": { "login": "at0mik", "id": 46066196, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46066196?v=4", "html_url": "https:\/\/github.com\/at0mik" }, "html_url": "https:\/\/github.com\/at0mik\/CVE-2019-0708-PoC", "description": "CVE-2019-0708-PoC Notes and Pseudocodes.", "fork": false, "created_at": "2019-06-11T09:38:36Z", "updated_at": "2020-05-16T19:37:09Z", "pushed_at": "2020-05-16T19:37:06Z", "stargazers_count": 16, "watchers_count": 16, "forks_count": 8, "forks": 8, "watchers": 16, "score": 0 }, { "id": 191491863, "name": "CVE-2019-0708-Msf--", "full_name": "cream492\/CVE-2019-0708-Msf--", "owner": { "login": "cream492", "id": 29266660, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29266660?v=4", "html_url": "https:\/\/github.com\/cream492" }, "html_url": "https:\/\/github.com\/cream492\/CVE-2019-0708-Msf--", "description": "CVE-2019-0708-Msf-验证", "fork": false, "created_at": "2019-06-12T03:37:39Z", "updated_at": "2019-06-12T03:40:17Z", "pushed_at": "2019-06-12T03:38:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 1, "forks": 1, "watchers": 0, "score": 0 }, { "id": 192833438, "name": "CVE-2019-0708", "full_name": "wdfcc\/CVE-2019-0708", "owner": { "login": "wdfcc", "id": 14845586, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14845586?v=4", "html_url": "https:\/\/github.com\/wdfcc" }, "html_url": "https:\/\/github.com\/wdfcc\/CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-06-20T02:19:17Z", "updated_at": "2019-06-20T02:26:29Z", "pushed_at": "2019-06-20T02:26:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 193537193, "name": "cve-2019-0708", "full_name": "cvencoder\/cve-2019-0708", "owner": { "login": "cvencoder", "id": 52171059, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52171059?v=4", "html_url": "https:\/\/github.com\/cvencoder" }, "html_url": "https:\/\/github.com\/cvencoder\/cve-2019-0708", "description": "POC CVE-2019-0708 with python script!", "fork": false, "created_at": "2019-06-24T16:03:08Z", "updated_at": "2019-07-28T09:20:55Z", "pushed_at": "2019-06-24T16:03:58Z", "stargazers_count": 14, "watchers_count": 14, "forks_count": 0, "forks": 0, "watchers": 14, "score": 0 }, { "id": 195150954, "name": "CVE-2019-0708-exp", "full_name": "ze0r\/CVE-2019-0708-exp", "owner": { "login": "ze0r", "id": 43227253, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/43227253?v=4", "html_url": "https:\/\/github.com\/ze0r" }, "html_url": "https:\/\/github.com\/ze0r\/CVE-2019-0708-exp", "description": null, "fork": false, "created_at": "2019-07-04T01:49:22Z", "updated_at": "2020-06-07T11:48:45Z", "pushed_at": "2019-07-25T07:31:57Z", "stargazers_count": 11, "watchers_count": 11, "forks_count": 4, "forks": 4, "watchers": 11, "score": 0 }, { "id": 196871345, "name": "cve-2019-0708", "full_name": "mekhalleh\/cve-2019-0708", "owner": { "login": "mekhalleh", "id": 5225129, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5225129?v=4", "html_url": "https:\/\/github.com\/mekhalleh" }, "html_url": "https:\/\/github.com\/mekhalleh\/cve-2019-0708", "description": "Metasploit module for massive Denial of Service using #Bluekeep vector.", "fork": false, "created_at": "2019-07-14T18:43:48Z", "updated_at": "2020-04-05T04:23:16Z", "pushed_at": "2019-10-01T15:31:26Z", "stargazers_count": 21, "watchers_count": 21, "forks_count": 7, "forks": 7, "watchers": 21, "score": 0 }, { "id": 197547695, "name": "cve-2019-0708", "full_name": "cve-2019-0708-poc\/cve-2019-0708", "owner": { "login": "cve-2019-0708-poc", "id": 53038783, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53038783?v=4", "html_url": "https:\/\/github.com\/cve-2019-0708-poc" }, "html_url": "https:\/\/github.com\/cve-2019-0708-poc\/cve-2019-0708", "description": "CVE-2019-0708 Exploit Tool", "fork": false, "created_at": "2019-07-18T08:41:01Z", "updated_at": "2019-08-29T04:15:45Z", "pushed_at": "2019-07-18T08:44:51Z", "stargazers_count": 18, "watchers_count": 18, "forks_count": 0, "forks": 0, "watchers": 18, "score": 0 }, { "id": 197655376, "name": "CVE-2019-0708", "full_name": "andripwn\/CVE-2019-0708", "owner": { "login": "andripwn", "id": 52893492, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/52893492?v=4", "html_url": "https:\/\/github.com\/andripwn" }, "html_url": "https:\/\/github.com\/andripwn\/CVE-2019-0708", "description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln", "fork": false, "created_at": "2019-07-18T20:53:54Z", "updated_at": "2020-01-24T04:49:58Z", "pushed_at": "2019-07-18T20:57:19Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 198343084, "name": "bluekeep", "full_name": "0xeb-bp\/bluekeep", "owner": { "login": "0xeb-bp", "id": 53204152, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53204152?v=4", "html_url": "https:\/\/github.com\/0xeb-bp" }, "html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep", "description": "Public work for CVE-2019-0708", "fork": false, "created_at": "2019-07-23T03:15:53Z", "updated_at": "2020-06-21T00:05:19Z", "pushed_at": "2019-11-19T02:43:38Z", "stargazers_count": 274, "watchers_count": 274, "forks_count": 89, "forks": 89, "watchers": 274, "score": 0 }, { "id": 198731225, "name": "CVE-2019-0708", "full_name": "ntkernel0\/CVE-2019-0708", "owner": { "login": "ntkernel0", "id": 46866847, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46866847?v=4", "html_url": "https:\/\/github.com\/ntkernel0" }, "html_url": "https:\/\/github.com\/ntkernel0\/CVE-2019-0708", "description": "收集网上CVE-2018-0708的poc和exp(目前没有找到exp)", "fork": false, "created_at": "2019-07-25T01:05:21Z", "updated_at": "2019-12-07T02:05:23Z", "pushed_at": "2019-07-25T01:03:47Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 202911823, "name": "Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "full_name": "dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "owner": { "login": "dorkerdevil", "id": 15796745, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4", "html_url": "https:\/\/github.com\/dorkerdevil" }, "html_url": "https:\/\/github.com\/dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-", "description": "rce exploit , made to work with pocsuite3", "fork": false, "created_at": "2019-08-17T17:23:53Z", "updated_at": "2020-06-24T22:43:12Z", "pushed_at": "2019-08-19T02:52:11Z", "stargazers_count": 108, "watchers_count": 108, "forks_count": 53, "forks": 53, "watchers": 108, "score": 0 }, { "id": 202951481, "name": "bluekeep", "full_name": "turingcompl33t\/bluekeep", "owner": { "login": "turingcompl33t", "id": 19956905, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19956905?v=4", "html_url": "https:\/\/github.com\/turingcompl33t" }, "html_url": "https:\/\/github.com\/turingcompl33t\/bluekeep", "description": "Research Regarding CVE-2019-0708.", "fork": false, "created_at": "2019-08-18T02:34:31Z", "updated_at": "2020-03-09T19:52:03Z", "pushed_at": "2019-11-04T01:15:22Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 3, "forks": 3, "watchers": 3, "score": 0 }, { "id": 203477227, "name": "CVE-2019-0708-test", "full_name": "fade-vivida\/CVE-2019-0708-test", "owner": { "login": "fade-vivida", "id": 38774342, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38774342?v=4", "html_url": "https:\/\/github.com\/fade-vivida" }, "html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test", "description": null, "fork": false, "created_at": "2019-08-21T00:48:55Z", "updated_at": "2020-03-11T13:53:42Z", "pushed_at": "2019-11-28T01:38:56Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 0, "forks": 0, "watchers": 2, "score": 0 }, { "id": 206050892, "name": "CVE-2019-0708", "full_name": "skommando\/CVE-2019-0708", "owner": { "login": "skommando", "id": 22767889, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22767889?v=4", "html_url": "https:\/\/github.com\/skommando" }, "html_url": "https:\/\/github.com\/skommando\/CVE-2019-0708", "description": "CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。", "fork": false, "created_at": "2019-09-03T10:25:48Z", "updated_at": "2019-10-02T17:51:34Z", "pushed_at": "2019-09-12T02:29:03Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 206863569, "name": "msf-module-CVE-2019-0708", "full_name": "RickGeex\/msf-module-CVE-2019-0708", "owner": { "login": "RickGeex", "id": 7975904, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7975904?v=4", "html_url": "https:\/\/github.com\/RickGeex" }, "html_url": "https:\/\/github.com\/RickGeex\/msf-module-CVE-2019-0708", "description": "Metasploit module for CVE-2019-0708 (BlueKeep) - https:\/\/github.com\/rapid7\/metasploit-framework\/tree\/5a0119b04309c8e61b44763ac08811cd3ecbbf8d\/modules\/exploits\/windows\/rdp", "fork": false, "created_at": "2019-09-06T19:46:03Z", "updated_at": "2020-03-25T05:25:37Z", "pushed_at": "2019-09-07T09:41:22Z", "stargazers_count": 9, "watchers_count": 9, "forks_count": 3, "forks": 3, "watchers": 9, "score": 0 }, { "id": 206893335, "name": "CVE-2019-0708", "full_name": "wqsemc\/CVE-2019-0708", "owner": { "login": "wqsemc", "id": 36132717, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36132717?v=4", "html_url": "https:\/\/github.com\/wqsemc" }, "html_url": "https:\/\/github.com\/wqsemc\/CVE-2019-0708", "description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.", "fork": false, "created_at": "2019-09-07T00:28:45Z", "updated_at": "2020-03-25T05:25:08Z", "pushed_at": "2019-09-16T10:35:57Z", "stargazers_count": 10, "watchers_count": 10, "forks_count": 3, "forks": 3, "watchers": 10, "score": 0 }, { "id": 206919373, "name": "CVE-2019-0708-RCE", "full_name": "mai-lang-chai\/CVE-2019-0708-RCE", "owner": { "login": "mai-lang-chai", "id": 36095584, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36095584?v=4", "html_url": "https:\/\/github.com\/mai-lang-chai" }, "html_url": "https:\/\/github.com\/mai-lang-chai\/CVE-2019-0708-RCE", "description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程", "fork": false, "created_at": "2019-09-07T05:15:23Z", "updated_at": "2020-04-06T02:00:19Z", "pushed_at": "2019-09-20T04:53:41Z", "stargazers_count": 37, "watchers_count": 37, "forks_count": 14, "forks": 14, "watchers": 37, "score": 0 }, { "id": 206926531, "name": "CVE-2019-0708RDP-MSF", "full_name": "Micr067\/CVE-2019-0708RDP-MSF", "owner": { "login": "Micr067", "id": 49861012, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/49861012?v=4", "html_url": "https:\/\/github.com\/Micr067" }, "html_url": "https:\/\/github.com\/Micr067\/CVE-2019-0708RDP-MSF", "description": "CVE-2019-0708RDP MSF", "fork": false, "created_at": "2019-09-07T06:32:25Z", "updated_at": "2019-09-07T06:32:25Z", "pushed_at": "2019-09-07T06:32:26Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 206928449, "name": "CVE-2019-0708-BlueKeep", "full_name": "adkinguzi\/CVE-2019-0708-BlueKeep", "owner": { "login": "adkinguzi", "id": 31617622, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4", "html_url": "https:\/\/github.com\/adkinguzi" }, "html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep", "description": null, "fork": false, "created_at": "2019-09-07T06:50:47Z", "updated_at": "2020-03-25T05:24:54Z", "pushed_at": "2019-09-07T07:05:24Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 2, "forks": 2, "watchers": 1, "score": 0 }, { "id": 206932731, "name": "CVE-2019-0708", "full_name": "FrostsaberX\/CVE-2019-0708", "owner": { "login": "FrostsaberX", "id": 24857203, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24857203?v=4", "html_url": "https:\/\/github.com\/FrostsaberX" }, "html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2019-0708", "description": "CVE-2019-0708 With Metasploit-Framework Exploit", "fork": false, "created_at": "2019-09-07T07:32:14Z", "updated_at": "2019-09-09T01:17:19Z", "pushed_at": "2019-09-07T08:50:59Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 1, "forks": 1, "watchers": 3, "score": 0 }, { "id": 206976374, "name": "CVE-2019-0708-EXP-MSF-", "full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-", "owner": { "login": "qinggegeya", "id": 30001685, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4", "html_url": "https:\/\/github.com\/qinggegeya" }, "html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-", "description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708", "fork": false, "created_at": "2019-09-07T14:02:50Z", "updated_at": "2020-03-25T16:07:00Z", "pushed_at": "2019-09-07T15:07:24Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 5, "forks": 5, "watchers": 3, "score": 0 }, { "id": 207703935, "name": "CVE-2019-0708", "full_name": "distance-vector\/CVE-2019-0708", "owner": { "login": "distance-vector", "id": 35881006, "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35881006?v=4", "html_url": "https:\/\/github.com\/distance-vector" }, "html_url": "https:\/\/github.com\/distance-vector\/CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-09-11T02:19:19Z", "updated_at": "2019-09-11T02:23:01Z", "pushed_at": "2019-09-11T02:23:00Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 207790184, "name": "CVE-2019-0708-test", "full_name": "0xFlag\/CVE-2019-0708-test", "owner": { "login": "0xFlag", "id": 54313514, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/54313514?v=4", "html_url": "https:\/\/github.com\/0xFlag" }, "html_url": "https:\/\/github.com\/0xFlag\/CVE-2019-0708-test", "description": "CVE-2019-0708 C#验证漏洞", "fork": false, "created_at": "2019-09-11T10:58:04Z", "updated_at": "2019-09-13T01:46:23Z", "pushed_at": "2019-09-13T01:46:21Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 208964787, "name": "CVE-2019-0708", "full_name": "1aa87148377\/CVE-2019-0708", "owner": { "login": "1aa87148377", "id": 51265955, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51265955?v=4", "html_url": "https:\/\/github.com\/1aa87148377" }, "html_url": "https:\/\/github.com\/1aa87148377\/CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-09-17T05:15:28Z", "updated_at": "2019-09-17T05:17:33Z", "pushed_at": "2019-09-17T05:17:31Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 211623683, "name": "cve-2019-0708_bluekeep_rce", "full_name": "coolboy4me\/cve-2019-0708_bluekeep_rce", "owner": { "login": "coolboy4me", "id": 10040130, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10040130?v=4", "html_url": "https:\/\/github.com\/coolboy4me" }, "html_url": "https:\/\/github.com\/coolboy4me\/cve-2019-0708_bluekeep_rce", "description": "it works on xp (all version sp2 sp3)", "fork": false, "created_at": "2019-09-29T07:38:41Z", "updated_at": "2020-06-24T02:31:24Z", "pushed_at": "2019-09-30T03:44:18Z", "stargazers_count": 63, "watchers_count": 63, "forks_count": 12, "forks": 12, "watchers": 63, "score": 0 }, { "id": 211942417, "name": "ispy", "full_name": "Cyb0r9\/ispy", "owner": { "login": "Cyb0r9", "id": 43474676, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43474676?v=4", "html_url": "https:\/\/github.com\/Cyb0r9" }, "html_url": "https:\/\/github.com\/Cyb0r9\/ispy", "description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )", "fork": false, "created_at": "2019-09-30T19:46:21Z", "updated_at": "2020-06-29T01:30:06Z", "pushed_at": "2019-10-16T01:04:12Z", "stargazers_count": 158, "watchers_count": 158, "forks_count": 55, "forks": 55, "watchers": 158, "score": 0 }, { "id": 214051334, "name": "CVE-2019-0708", "full_name": "shishibabyq\/CVE-2019-0708", "owner": { "login": "shishibabyq", "id": 56372841, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56372841?v=4", "html_url": "https:\/\/github.com\/shishibabyq" }, "html_url": "https:\/\/github.com\/shishibabyq\/CVE-2019-0708", "description": "CVE-2019-0708", "fork": false, "created_at": "2019-10-10T00:34:41Z", "updated_at": "2020-03-25T05:23:01Z", "pushed_at": "2019-10-10T00:50:48Z", "stargazers_count": 3, "watchers_count": 3, "forks_count": 0, "forks": 0, "watchers": 3, "score": 0 }, { "id": 214524140, "name": "Wincrash", "full_name": "pwnhacker0x18\/Wincrash", "owner": { "login": "pwnhacker0x18", "id": 51971493, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51971493?v=4", "html_url": "https:\/\/github.com\/pwnhacker0x18" }, "html_url": "https:\/\/github.com\/pwnhacker0x18\/Wincrash", "description": "Mass exploit for CVE-2019-0708", "fork": false, "created_at": "2019-10-11T20:33:35Z", "updated_at": "2019-11-28T11:38:13Z", "pushed_at": "2019-10-11T20:42:38Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 221436919, "name": "CVE-2019-0708-DOS", "full_name": "R4v3nG\/CVE-2019-0708-DOS", "owner": { "login": "R4v3nG", "id": 43517528, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43517528?v=4", "html_url": "https:\/\/github.com\/R4v3nG" }, "html_url": "https:\/\/github.com\/R4v3nG\/CVE-2019-0708-DOS", "description": "CVE-2019-0708 DOS RDP", "fork": false, "created_at": "2019-11-13T10:49:51Z", "updated_at": "2019-12-01T20:58:13Z", "pushed_at": "2019-12-01T20:58:11Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 0, "forks": 0, "watchers": 1, "score": 0 }, { "id": 223320391, "name": "-2-CVE-2019-0708", "full_name": "ulisesrc\/-2-CVE-2019-0708", "owner": { "login": "ulisesrc", "id": 3741400, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3741400?v=4", "html_url": "https:\/\/github.com\/ulisesrc" }, "html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708", "description": null, "fork": false, "created_at": "2019-11-22T04:00:49Z", "updated_at": "2019-11-22T04:01:11Z", "pushed_at": "2019-11-22T04:01:03Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 226491441, "name": "CVE-2019-0708", "full_name": "worawit\/CVE-2019-0708", "owner": { "login": "worawit", "id": 1352296, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1352296?v=4", "html_url": "https:\/\/github.com\/worawit" }, "html_url": "https:\/\/github.com\/worawit\/CVE-2019-0708", "description": "CVE-2019-0708 (BlueKeep)", "fork": false, "created_at": "2019-12-07T10:13:11Z", "updated_at": "2020-02-19T13:29:15Z", "pushed_at": "2019-12-08T10:09:56Z", "stargazers_count": 71, "watchers_count": 71, "forks_count": 5, "forks": 5, "watchers": 71, "score": 0 }, { "id": 235239045, "name": "CVE-2019-0708-EXP-Windows", "full_name": "cbwang505\/CVE-2019-0708-EXP-Windows", "owner": { "login": "cbwang505", "id": 4487329, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4487329?v=4", "html_url": "https:\/\/github.com\/cbwang505" }, "html_url": "https:\/\/github.com\/cbwang505\/CVE-2019-0708-EXP-Windows", "description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell", "fork": false, "created_at": "2020-01-21T02:22:29Z", "updated_at": "2020-06-30T03:08:27Z", "pushed_at": "2020-01-21T03:15:41Z", "stargazers_count": 50, "watchers_count": 50, "forks_count": 17, "forks": 17, "watchers": 50, "score": 0 }, { "id": 241542314, "name": "CVE-2019-0708-Windows", "full_name": "eastmountyxz\/CVE-2019-0708-Windows", "owner": { "login": "eastmountyxz", "id": 53172375, "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4", "html_url": "https:\/\/github.com\/eastmountyxz" }, "html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows", "description": "这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!", "fork": false, "created_at": "2020-02-19T05:40:22Z", "updated_at": "2020-03-13T12:53:52Z", "pushed_at": "2020-03-13T12:53:50Z", "stargazers_count": 1, "watchers_count": 1, "forks_count": 1, "forks": 1, "watchers": 1, "score": 0 }, { "id": 247883778, "name": "Scanner-CVE-2019-0708", "full_name": "JSec1337\/Scanner-CVE-2019-0708", "owner": { "login": "JSec1337", "id": 62246378, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62246378?v=4", "html_url": "https:\/\/github.com\/JSec1337" }, "html_url": "https:\/\/github.com\/JSec1337\/Scanner-CVE-2019-0708", "description": "Scanner CVE-2019-0708", "fork": false, "created_at": "2020-03-17T05:05:14Z", "updated_at": "2020-03-17T06:50:00Z", "pushed_at": "2020-03-17T06:49:58Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 259169347, "name": "cve-2019-0708", "full_name": "wanghuohuobutailao\/cve-2019-0708", "owner": { "login": "wanghuohuobutailao", "id": 54968227, "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54968227?v=4", "html_url": "https:\/\/github.com\/wanghuohuobutailao" }, "html_url": "https:\/\/github.com\/wanghuohuobutailao\/cve-2019-0708", "description": null, "fork": false, "created_at": "2020-04-27T01:06:29Z", "updated_at": "2020-04-27T01:08:48Z", "pushed_at": "2020-04-27T01:08:46Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 }, { "id": 266412261, "name": "bLuEkEeP-GUI", "full_name": "nochemax\/bLuEkEeP-GUI", "owner": { "login": "nochemax", "id": 8238744, "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8238744?v=4", "html_url": "https:\/\/github.com\/nochemax" }, "html_url": "https:\/\/github.com\/nochemax\/bLuEkEeP-GUI", "description": "vulnerabilidad CVE-2019-0708 testing y explotacion ", "fork": false, "created_at": "2020-05-23T20:15:29Z", "updated_at": "2020-05-23T20:38:41Z", "pushed_at": "2020-05-23T20:38:39Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]