mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
363 lines
No EOL
13 KiB
JSON
363 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 138456315,
|
|
"name": "WinboxPoC",
|
|
"full_name": "BasuCert\/WinboxPoC",
|
|
"owner": {
|
|
"login": "BasuCert",
|
|
"id": 29852431,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
|
"html_url": "https:\/\/github.com\/BasuCert",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
|
|
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
|
"fork": false,
|
|
"created_at": "2018-06-24T05:34:05Z",
|
|
"updated_at": "2025-01-04T08:46:24Z",
|
|
"pushed_at": "2020-10-16T12:09:45Z",
|
|
"stargazers_count": 510,
|
|
"watchers_count": 510,
|
|
"has_discussions": false,
|
|
"forks_count": 453,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 453,
|
|
"watchers": 510,
|
|
"score": 0,
|
|
"subscribers_count": 57
|
|
},
|
|
{
|
|
"id": 148370201,
|
|
"name": "WinboxExploit",
|
|
"full_name": "msterusky\/WinboxExploit",
|
|
"owner": {
|
|
"login": "msterusky",
|
|
"id": 29436829,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
|
|
"html_url": "https:\/\/github.com\/msterusky",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
|
|
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
|
|
"fork": false,
|
|
"created_at": "2018-09-11T19:36:49Z",
|
|
"updated_at": "2024-09-06T05:11:56Z",
|
|
"pushed_at": "2018-09-11T20:12:25Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 152906288,
|
|
"name": "MikroRoot",
|
|
"full_name": "syrex1013\/MikroRoot",
|
|
"owner": {
|
|
"login": "syrex1013",
|
|
"id": 31669127,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
|
|
"html_url": "https:\/\/github.com\/syrex1013",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
|
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
|
"fork": false,
|
|
"created_at": "2018-10-13T19:17:42Z",
|
|
"updated_at": "2021-12-06T20:08:10Z",
|
|
"pushed_at": "2018-10-14T08:39:24Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 15,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 161894724,
|
|
"name": "CVE-2018-14847",
|
|
"full_name": "jas502n\/CVE-2018-14847",
|
|
"owner": {
|
|
"login": "jas502n",
|
|
"id": 16593068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
|
"html_url": "https:\/\/github.com\/jas502n",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
|
|
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
|
|
"fork": false,
|
|
"created_at": "2018-12-15T10:38:26Z",
|
|
"updated_at": "2024-09-11T11:05:40Z",
|
|
"pushed_at": "2018-12-16T04:15:01Z",
|
|
"stargazers_count": 26,
|
|
"watchers_count": 26,
|
|
"has_discussions": false,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 26,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 188679903,
|
|
"name": "mikrotik-beast",
|
|
"full_name": "mahmoodsabir\/mikrotik-beast",
|
|
"owner": {
|
|
"login": "mahmoodsabir",
|
|
"id": 47719250,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
|
|
"html_url": "https:\/\/github.com\/mahmoodsabir",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
|
|
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
|
|
"fork": false,
|
|
"created_at": "2019-05-26T12:26:55Z",
|
|
"updated_at": "2024-09-08T15:06:00Z",
|
|
"pushed_at": "2019-05-26T13:06:01Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 210848831,
|
|
"name": "winboxPOC",
|
|
"full_name": "Tr33-He11\/winboxPOC",
|
|
"owner": {
|
|
"login": "Tr33-He11",
|
|
"id": 18653509,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4",
|
|
"html_url": "https:\/\/github.com\/Tr33-He11",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC",
|
|
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
|
|
"fork": false,
|
|
"created_at": "2019-09-25T13:12:56Z",
|
|
"updated_at": "2023-10-24T21:52:30Z",
|
|
"pushed_at": "2019-02-18T09:51:10Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 211658714,
|
|
"name": "Python-MikrotikLoginExploit",
|
|
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
|
|
"owner": {
|
|
"login": "sinichi449",
|
|
"id": 44680392,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
|
|
"html_url": "https:\/\/github.com\/sinichi449",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
|
|
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
|
|
"fork": false,
|
|
"created_at": "2019-09-29T12:21:16Z",
|
|
"updated_at": "2024-12-04T03:22:50Z",
|
|
"pushed_at": "2019-09-30T04:10:23Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"exploit",
|
|
"mikrotik",
|
|
"python",
|
|
"winbox"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 18,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 259795725,
|
|
"name": "CVE-2018-14847",
|
|
"full_name": "yukar1z0e\/CVE-2018-14847",
|
|
"owner": {
|
|
"login": "yukar1z0e",
|
|
"id": 44317939,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
|
|
"html_url": "https:\/\/github.com\/yukar1z0e",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-04-29T01:40:33Z",
|
|
"updated_at": "2022-12-20T04:50:57Z",
|
|
"pushed_at": "2020-05-18T07:47:58Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 360240266,
|
|
"name": "Mikrotik-router-hack",
|
|
"full_name": "hacker30468\/Mikrotik-router-hack",
|
|
"owner": {
|
|
"login": "hacker30468",
|
|
"id": 82890072,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
|
|
"html_url": "https:\/\/github.com\/hacker30468",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
|
|
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
|
"fork": false,
|
|
"created_at": "2021-04-21T16:42:31Z",
|
|
"updated_at": "2025-01-04T20:24:31Z",
|
|
"pushed_at": "2021-04-21T16:46:37Z",
|
|
"stargazers_count": 50,
|
|
"watchers_count": 50,
|
|
"has_discussions": false,
|
|
"forks_count": 24,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 24,
|
|
"watchers": 50,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 559816350,
|
|
"name": "routeros-CVE-2018-14847-bytheway",
|
|
"full_name": "babyshen\/routeros-CVE-2018-14847-bytheway",
|
|
"owner": {
|
|
"login": "babyshen",
|
|
"id": 11402197,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4",
|
|
"html_url": "https:\/\/github.com\/babyshen",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway",
|
|
"description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:",
|
|
"fork": false,
|
|
"created_at": "2022-10-31T06:38:11Z",
|
|
"updated_at": "2024-11-21T19:54:59Z",
|
|
"pushed_at": "2022-11-17T01:22:12Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 790447827,
|
|
"name": "CVE-2018-14847-EXPLOIT",
|
|
"full_name": "K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
|
|
"owner": {
|
|
"login": "K3ysTr0K3R",
|
|
"id": 70909693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70909693?v=4",
|
|
"html_url": "https:\/\/github.com\/K3ysTr0K3R",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/K3ysTr0K3R\/CVE-2018-14847-EXPLOIT",
|
|
"description": "A PoC exploit for CVE-2018-14847 - MikroTik WinBox File Read",
|
|
"fork": false,
|
|
"created_at": "2024-04-22T22:33:25Z",
|
|
"updated_at": "2024-12-30T16:19:41Z",
|
|
"pushed_at": "2024-05-02T23:52:06Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"credential-disclosure",
|
|
"credentials",
|
|
"cve-2018-14847",
|
|
"directory-traversal",
|
|
"exploit",
|
|
"exploitation",
|
|
"file-read",
|
|
"hacked",
|
|
"mikrotik",
|
|
"poc",
|
|
"proof-of-concept",
|
|
"router",
|
|
"routeros",
|
|
"winbox"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |