mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
456 lines
No EOL
16 KiB
JSON
456 lines
No EOL
16 KiB
JSON
[
|
|
{
|
|
"id": 246641886,
|
|
"name": "NSE-scripts",
|
|
"full_name": "psc4re\/NSE-scripts",
|
|
"owner": {
|
|
"login": "psc4re",
|
|
"id": 4672886,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
|
|
"html_url": "https:\/\/github.com\/psc4re",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
|
|
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
|
"fork": false,
|
|
"created_at": "2020-03-11T17:51:29Z",
|
|
"updated_at": "2025-01-08T00:43:57Z",
|
|
"pushed_at": "2021-08-16T18:16:20Z",
|
|
"stargazers_count": 162,
|
|
"watchers_count": 162,
|
|
"has_discussions": false,
|
|
"forks_count": 29,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-1350",
|
|
"cve-2021-21972",
|
|
"cve-2021-34473",
|
|
"nmap",
|
|
"nmap-scan-script",
|
|
"nmap-scripts",
|
|
"nse-script",
|
|
"poc",
|
|
"proxyshell",
|
|
"scanner",
|
|
"sigred",
|
|
"smbghost",
|
|
"smbv3",
|
|
"vcenter",
|
|
"vulnerability",
|
|
"vulnerability-detection"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 29,
|
|
"watchers": 162,
|
|
"score": 0,
|
|
"subscribers_count": 10
|
|
},
|
|
{
|
|
"id": 279670211,
|
|
"name": "CVE-2020-1350_HoneyPoC",
|
|
"full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
|
|
"owner": {
|
|
"login": "ZephrFish",
|
|
"id": 5783068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
|
"html_url": "https:\/\/github.com\/ZephrFish",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
|
|
"description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
|
|
"fork": false,
|
|
"created_at": "2020-07-14T19:02:25Z",
|
|
"updated_at": "2024-11-10T12:13:04Z",
|
|
"pushed_at": "2021-06-10T02:46:52Z",
|
|
"stargazers_count": 281,
|
|
"watchers_count": 281,
|
|
"has_discussions": false,
|
|
"forks_count": 72,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-1350",
|
|
"sigred"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 72,
|
|
"watchers": 281,
|
|
"score": 0,
|
|
"subscribers_count": 11
|
|
},
|
|
{
|
|
"id": 279675165,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "mr-r3b00t\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "mr-r3b00t",
|
|
"id": 14963690,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
|
|
"html_url": "https:\/\/github.com\/mr-r3b00t",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-07-14T19:28:46Z",
|
|
"updated_at": "2024-08-12T20:03:44Z",
|
|
"pushed_at": "2020-07-20T06:15:56Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 279701266,
|
|
"name": "Fake_CVE-2020-1350",
|
|
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
|
|
"owner": {
|
|
"login": "zoomerxsec",
|
|
"id": 56858864,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4",
|
|
"html_url": "https:\/\/github.com\/zoomerxsec",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
|
|
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
|
|
"fork": false,
|
|
"created_at": "2020-07-14T21:55:57Z",
|
|
"updated_at": "2024-08-12T20:03:44Z",
|
|
"pushed_at": "2020-07-19T02:29:33Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 279776271,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "T13nn3s\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "T13nn3s",
|
|
"id": 29333776,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
|
|
"html_url": "https:\/\/github.com\/T13nn3s",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
|
|
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T05:46:31Z",
|
|
"updated_at": "2023-04-01T11:46:35Z",
|
|
"pushed_at": "2023-04-01T11:46:03Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 14,
|
|
"score": 0,
|
|
"subscribers_count": 5
|
|
},
|
|
{
|
|
"id": 279778118,
|
|
"name": "SIGRed",
|
|
"full_name": "corelight\/SIGRed",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
|
|
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T05:55:20Z",
|
|
"updated_at": "2024-08-12T20:03:45Z",
|
|
"pushed_at": "2020-07-20T02:20:43Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 5
|
|
},
|
|
{
|
|
"id": 279961698,
|
|
"name": "dRMM-CVE-2020-1350-response",
|
|
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
|
|
"owner": {
|
|
"login": "jmaddington",
|
|
"id": 2353597,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
|
|
"html_url": "https:\/\/github.com\/jmaddington",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
|
|
"description": "Windows registry mitigation response to CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T19:43:39Z",
|
|
"updated_at": "2024-08-12T20:03:47Z",
|
|
"pushed_at": "2020-07-15T19:59:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 279999285,
|
|
"name": "CVE-2020-1350-DoS",
|
|
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
|
|
"owner": {
|
|
"login": "maxpl0it",
|
|
"id": 27973683,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
|
|
"html_url": "https:\/\/github.com\/maxpl0it",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
|
|
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T23:00:00Z",
|
|
"updated_at": "2024-08-12T20:03:47Z",
|
|
"pushed_at": "2020-07-17T13:07:29Z",
|
|
"stargazers_count": 238,
|
|
"watchers_count": 238,
|
|
"has_discussions": false,
|
|
"forks_count": 48,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 48,
|
|
"watchers": 238,
|
|
"score": 0,
|
|
"subscribers_count": 15
|
|
},
|
|
{
|
|
"id": 280207373,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "captainGeech42\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "captainGeech42",
|
|
"id": 4255667,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4",
|
|
"html_url": "https:\/\/github.com\/captainGeech42",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
|
|
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
|
|
"fork": false,
|
|
"created_at": "2020-07-16T16:46:48Z",
|
|
"updated_at": "2024-08-12T20:03:49Z",
|
|
"pushed_at": "2020-07-16T18:32:04Z",
|
|
"stargazers_count": 18,
|
|
"watchers_count": 18,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 18,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 280336928,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "connormcgarr\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "connormcgarr",
|
|
"id": 45445720,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
|
|
"html_url": "https:\/\/github.com\/connormcgarr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
|
|
"description": "CVE-2020-1350 Proof-of-Concept",
|
|
"fork": false,
|
|
"created_at": "2020-07-17T05:41:19Z",
|
|
"updated_at": "2024-11-23T01:56:27Z",
|
|
"pushed_at": "2020-07-27T16:20:06Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 10,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 280665873,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "graph-inc\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "graph-inc",
|
|
"id": 68469953,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4",
|
|
"html_url": "https:\/\/github.com\/graph-inc",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
|
|
"description": "Scanner and Mitigator for CVE 2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-18T13:49:54Z",
|
|
"updated_at": "2024-08-12T20:03:53Z",
|
|
"pushed_at": "2020-07-18T14:05:55Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 280916907,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "CVEmaster\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "CVEmaster",
|
|
"id": 68512490,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
|
|
"html_url": "https:\/\/github.com\/CVEmaster",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
|
|
"description": "DNS Vulnerability - CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-19T17:32:47Z",
|
|
"updated_at": "2024-08-12T20:03:55Z",
|
|
"pushed_at": "2020-07-20T14:25:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 281667659,
|
|
"name": "cve-2020-1350",
|
|
"full_name": "gdwnet\/cve-2020-1350",
|
|
"owner": {
|
|
"login": "gdwnet",
|
|
"id": 19855556,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
|
|
"html_url": "https:\/\/github.com\/gdwnet",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
|
|
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-22T12:11:33Z",
|
|
"updated_at": "2024-08-12T20:04:00Z",
|
|
"pushed_at": "2020-07-22T12:15:00Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 282558950,
|
|
"name": "CVE-2020-1350-Fix",
|
|
"full_name": "simeononsecurity\/CVE-2020-1350-Fix",
|
|
"owner": {
|
|
"login": "simeononsecurity",
|
|
"id": 4913771,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
|
|
"html_url": "https:\/\/github.com\/simeononsecurity",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
|
|
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
|
|
"fork": false,
|
|
"created_at": "2020-07-26T02:12:36Z",
|
|
"updated_at": "2024-08-12T20:04:07Z",
|
|
"pushed_at": "2020-07-26T02:13:24Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
}
|
|
] |