[ { "id": 246641886, "name": "NSE-scripts", "full_name": "psc4re\/NSE-scripts", "owner": { "login": "psc4re", "id": 4672886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4", "html_url": "https:\/\/github.com\/psc4re", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/psc4re\/NSE-scripts", "description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473", "fork": false, "created_at": "2020-03-11T17:51:29Z", "updated_at": "2025-01-08T00:43:57Z", "pushed_at": "2021-08-16T18:16:20Z", "stargazers_count": 162, "watchers_count": 162, "has_discussions": false, "forks_count": 29, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-1350", "cve-2021-21972", "cve-2021-34473", "nmap", "nmap-scan-script", "nmap-scripts", "nse-script", "poc", "proxyshell", "scanner", "sigred", "smbghost", "smbv3", "vcenter", "vulnerability", "vulnerability-detection" ], "visibility": "public", "forks": 29, "watchers": 162, "score": 0, "subscribers_count": 10 }, { "id": 279670211, "name": "CVE-2020-1350_HoneyPoC", "full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC", "owner": { "login": "ZephrFish", "id": 5783068, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4", "html_url": "https:\/\/github.com\/ZephrFish", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC", "description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.", "fork": false, "created_at": "2020-07-14T19:02:25Z", "updated_at": "2024-11-10T12:13:04Z", "pushed_at": "2021-06-10T02:46:52Z", "stargazers_count": 281, "watchers_count": 281, "has_discussions": false, "forks_count": 72, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2020-1350", "sigred" ], "visibility": "public", "forks": 72, "watchers": 281, "score": 0, "subscribers_count": 11 }, { "id": 279675165, "name": "CVE-2020-1350", "full_name": "mr-r3b00t\/CVE-2020-1350", "owner": { "login": "mr-r3b00t", "id": 14963690, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4", "html_url": "https:\/\/github.com\/mr-r3b00t", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350", "description": null, "fork": false, "created_at": "2020-07-14T19:28:46Z", "updated_at": "2024-08-12T20:03:44Z", "pushed_at": "2020-07-20T06:15:56Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 6, "watchers": 4, "score": 0, "subscribers_count": 4 }, { "id": 279701266, "name": "Fake_CVE-2020-1350", "full_name": "zoomerxsec\/Fake_CVE-2020-1350", "owner": { "login": "zoomerxsec", "id": 56858864, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4", "html_url": "https:\/\/github.com\/zoomerxsec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350", "description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.", "fork": false, "created_at": "2020-07-14T21:55:57Z", "updated_at": "2024-08-12T20:03:44Z", "pushed_at": "2020-07-19T02:29:33Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 6, "score": 0, "subscribers_count": 3 }, { "id": 279776271, "name": "CVE-2020-1350", "full_name": "T13nn3s\/CVE-2020-1350", "owner": { "login": "T13nn3s", "id": 29333776, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4", "html_url": "https:\/\/github.com\/T13nn3s", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350", "description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service", "fork": false, "created_at": "2020-07-15T05:46:31Z", "updated_at": "2023-04-01T11:46:35Z", "pushed_at": "2023-04-01T11:46:03Z", "stargazers_count": 14, "watchers_count": 14, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 14, "score": 0, "subscribers_count": 5 }, { "id": 279778118, "name": "SIGRed", "full_name": "corelight\/SIGRed", "owner": { "login": "corelight", "id": 21672558, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4", "html_url": "https:\/\/github.com\/corelight", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/corelight\/SIGRed", "description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)", "fork": false, "created_at": "2020-07-15T05:55:20Z", "updated_at": "2024-08-12T20:03:45Z", "pushed_at": "2020-07-20T02:20:43Z", "stargazers_count": 9, "watchers_count": 9, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 9, "score": 0, "subscribers_count": 5 }, { "id": 279961698, "name": "dRMM-CVE-2020-1350-response", "full_name": "jmaddington\/dRMM-CVE-2020-1350-response", "owner": { "login": "jmaddington", "id": 2353597, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4", "html_url": "https:\/\/github.com\/jmaddington", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response", "description": "Windows registry mitigation response to CVE-2020-1350", "fork": false, "created_at": "2020-07-15T19:43:39Z", "updated_at": "2024-08-12T20:03:47Z", "pushed_at": "2020-07-15T19:59:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 279999285, "name": "CVE-2020-1350-DoS", "full_name": "maxpl0it\/CVE-2020-1350-DoS", "owner": { "login": "maxpl0it", "id": 27973683, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4", "html_url": "https:\/\/github.com\/maxpl0it", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS", "description": "A denial-of-service proof-of-concept for CVE-2020-1350", "fork": false, "created_at": "2020-07-15T23:00:00Z", "updated_at": "2024-08-12T20:03:47Z", "pushed_at": "2020-07-17T13:07:29Z", "stargazers_count": 238, "watchers_count": 238, "has_discussions": false, "forks_count": 48, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 48, "watchers": 238, "score": 0, "subscribers_count": 15 }, { "id": 280207373, "name": "CVE-2020-1350", "full_name": "captainGeech42\/CVE-2020-1350", "owner": { "login": "captainGeech42", "id": 4255667, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4", "html_url": "https:\/\/github.com\/captainGeech42", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350", "description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)", "fork": false, "created_at": "2020-07-16T16:46:48Z", "updated_at": "2024-08-12T20:03:49Z", "pushed_at": "2020-07-16T18:32:04Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 18, "score": 0, "subscribers_count": 3 }, { "id": 280336928, "name": "CVE-2020-1350", "full_name": "connormcgarr\/CVE-2020-1350", "owner": { "login": "connormcgarr", "id": 45445720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4", "html_url": "https:\/\/github.com\/connormcgarr", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350", "description": "CVE-2020-1350 Proof-of-Concept", "fork": false, "created_at": "2020-07-17T05:41:19Z", "updated_at": "2024-11-23T01:56:27Z", "pushed_at": "2020-07-27T16:20:06Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 10, "score": 0, "subscribers_count": 2 }, { "id": 280665873, "name": "CVE-2020-1350", "full_name": "graph-inc\/CVE-2020-1350", "owner": { "login": "graph-inc", "id": 68469953, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4", "html_url": "https:\/\/github.com\/graph-inc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350", "description": "Scanner and Mitigator for CVE 2020-1350", "fork": false, "created_at": "2020-07-18T13:49:54Z", "updated_at": "2024-08-12T20:03:53Z", "pushed_at": "2020-07-18T14:05:55Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 280916907, "name": "CVE-2020-1350", "full_name": "CVEmaster\/CVE-2020-1350", "owner": { "login": "CVEmaster", "id": 68512490, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4", "html_url": "https:\/\/github.com\/CVEmaster", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350", "description": "DNS Vulnerability - CVE-2020-1350", "fork": false, "created_at": "2020-07-19T17:32:47Z", "updated_at": "2024-08-12T20:03:55Z", "pushed_at": "2020-07-20T14:25:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 281667659, "name": "cve-2020-1350", "full_name": "gdwnet\/cve-2020-1350", "owner": { "login": "gdwnet", "id": 19855556, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4", "html_url": "https:\/\/github.com\/gdwnet", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350", "description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350", "fork": false, "created_at": "2020-07-22T12:11:33Z", "updated_at": "2024-08-12T20:04:00Z", "pushed_at": "2020-07-22T12:15:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 282558950, "name": "CVE-2020-1350-Fix", "full_name": "simeononsecurity\/CVE-2020-1350-Fix", "owner": { "login": "simeononsecurity", "id": 4913771, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4", "html_url": "https:\/\/github.com\/simeononsecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix", "description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.", "fork": false, "created_at": "2020-07-26T02:12:36Z", "updated_at": "2024-08-12T20:04:07Z", "pushed_at": "2020-07-26T02:13:24Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 2 } ]