PoC-in-GitHub/2020/CVE-2020-1472.json
2025-01-15 15:32:14 +09:00

2103 lines
No EOL
72 KiB
JSON

[
{
"id": 287009597,
"name": "CVE-2020-1472-visualizer",
"full_name": "Tobey123\/CVE-2020-1472-visualizer",
"owner": {
"login": "Tobey123",
"id": 5292815,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5292815?v=4",
"html_url": "https:\/\/github.com\/Tobey123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Tobey123\/CVE-2020-1472-visualizer",
"description": null,
"fork": false,
"created_at": "2020-08-12T12:35:56Z",
"updated_at": "2020-11-05T15:16:46Z",
"pushed_at": "2020-08-06T22:24:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 293756101,
"name": "CVE-2020-1472",
"full_name": "SecuraBV\/CVE-2020-1472",
"owner": {
"login": "SecuraBV",
"id": 46344423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46344423?v=4",
"html_url": "https:\/\/github.com\/SecuraBV",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2020-09-08T08:58:37Z",
"updated_at": "2025-01-13T04:40:43Z",
"pushed_at": "2023-07-20T10:51:42Z",
"stargazers_count": 1747,
"watchers_count": 1747,
"has_discussions": false,
"forks_count": 358,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 358,
"watchers": 1747,
"score": 0,
"subscribers_count": 86
},
{
"id": 295480770,
"name": "CVE-2020-1472",
"full_name": "cube0x0\/CVE-2020-1472",
"owner": {
"login": "cube0x0",
"id": 39370848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
"html_url": "https:\/\/github.com\/cube0x0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-14T16:52:37Z",
"updated_at": "2025-01-13T04:21:38Z",
"pushed_at": "2020-09-14T16:53:07Z",
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 37,
"score": 0,
"subscribers_count": 3
},
{
"id": 295481822,
"name": "CVE-2020-1472",
"full_name": "dirkjanm\/CVE-2020-1472",
"owner": {
"login": "dirkjanm",
"id": 1773762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1773762?v=4",
"html_url": "https:\/\/github.com\/dirkjanm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
"fork": false,
"created_at": "2020-09-14T16:56:51Z",
"updated_at": "2025-01-09T15:51:00Z",
"pushed_at": "2020-11-03T09:45:24Z",
"stargazers_count": 1203,
"watchers_count": 1203,
"has_discussions": false,
"forks_count": 283,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 283,
"watchers": 1203,
"score": 0,
"subscribers_count": 34
},
{
"id": 295482050,
"name": "CVE-2020-1472",
"full_name": "VoidSec\/CVE-2020-1472",
"owner": {
"login": "VoidSec",
"id": 5717603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5717603?v=4",
"html_url": "https:\/\/github.com\/VoidSec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1472",
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2020-09-14T16:57:49Z",
"updated_at": "2024-12-17T20:19:18Z",
"pushed_at": "2020-11-05T16:37:20Z",
"stargazers_count": 382,
"watchers_count": 382,
"has_discussions": false,
"forks_count": 67,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020",
"exploit",
"n-day",
"poc",
"voidsec",
"zerologon"
],
"visibility": "public",
"forks": 67,
"watchers": 382,
"score": 0,
"subscribers_count": 9
},
{
"id": 295515909,
"name": "zerologon",
"full_name": "risksense\/zerologon",
"owner": {
"login": "risksense",
"id": 1999284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1999284?v=4",
"html_url": "https:\/\/github.com\/risksense",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/risksense\/zerologon",
"description": "Exploit for zerologon cve-2020-1472",
"fork": false,
"created_at": "2020-09-14T19:19:07Z",
"updated_at": "2025-01-15T05:57:38Z",
"pushed_at": "2020-10-15T18:31:15Z",
"stargazers_count": 645,
"watchers_count": 645,
"has_discussions": false,
"forks_count": 146,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 146,
"watchers": 645,
"score": 0,
"subscribers_count": 12
},
{
"id": 295517706,
"name": "zer0dump",
"full_name": "bb00\/zer0dump",
"owner": {
"login": "bb00",
"id": 11166320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11166320?v=4",
"html_url": "https:\/\/github.com\/bb00",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bb00\/zer0dump",
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
"fork": false,
"created_at": "2020-09-14T19:27:14Z",
"updated_at": "2024-08-22T06:21:07Z",
"pushed_at": "2023-03-02T19:40:19Z",
"stargazers_count": 176,
"watchers_count": 176,
"has_discussions": false,
"forks_count": 39,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 39,
"watchers": 176,
"score": 0,
"subscribers_count": 7
},
{
"id": 295692006,
"name": "CVE-2020-1472",
"full_name": "0xkami\/CVE-2020-1472",
"owner": {
"login": "0xkami",
"id": 19571618,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19571618?v=4",
"html_url": "https:\/\/github.com\/0xkami",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xkami\/CVE-2020-1472",
"description": "CVE-2020-1472漏洞复现过程",
"fork": false,
"created_at": "2020-09-15T10:25:47Z",
"updated_at": "2021-05-12T02:52:15Z",
"pushed_at": "2020-09-15T10:39:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 295716616,
"name": "CVE-2020-1472",
"full_name": "NAXG\/CVE-2020-1472",
"owner": {
"login": "NAXG",
"id": 28560949,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28560949?v=4",
"html_url": "https:\/\/github.com\/NAXG",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
"description": "CVE-2020-1472复现流程",
"fork": false,
"created_at": "2020-09-15T12:11:49Z",
"updated_at": "2023-06-29T17:25:25Z",
"pushed_at": "2021-04-18T11:22:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 295754317,
"name": "zerologon-CVE-2020-1472",
"full_name": "thatonesecguy\/zerologon-CVE-2020-1472",
"owner": {
"login": "thatonesecguy",
"id": 34110198,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34110198?v=4",
"html_url": "https:\/\/github.com\/thatonesecguy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thatonesecguy\/zerologon-CVE-2020-1472",
"description": "PoC for Zerologon (CVE-2020-1472) - Exploit",
"fork": false,
"created_at": "2020-09-15T14:29:24Z",
"updated_at": "2024-11-13T13:14:22Z",
"pushed_at": "2020-09-16T11:06:19Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 295781919,
"name": "CVE-2020-1472-EXP",
"full_name": "k8gege\/CVE-2020-1472-EXP",
"owner": {
"login": "k8gege",
"id": 42312878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42312878?v=4",
"html_url": "https:\/\/github.com\/k8gege",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/k8gege\/CVE-2020-1472-EXP",
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
"fork": false,
"created_at": "2020-09-15T16:10:21Z",
"updated_at": "2024-08-12T20:05:48Z",
"pushed_at": "2020-09-15T16:40:53Z",
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 21,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 21,
"watchers": 57,
"score": 0,
"subscribers_count": 4
},
{
"id": 295788757,
"name": "CVE-2020-1472",
"full_name": "jiushill\/CVE-2020-1472",
"owner": {
"login": "jiushill",
"id": 29516567,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29516567?v=4",
"html_url": "https:\/\/github.com\/jiushill",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jiushill\/CVE-2020-1472",
"description": "CVE-2020-1472",
"fork": false,
"created_at": "2020-09-15T16:36:40Z",
"updated_at": "2020-09-16T03:58:43Z",
"pushed_at": "2020-09-15T16:38:45Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 295903888,
"name": "zabbix-template-CVE-2020-1472",
"full_name": "McKinnonIT\/zabbix-template-CVE-2020-1472",
"owner": {
"login": "McKinnonIT",
"id": 45773564,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45773564?v=4",
"html_url": "https:\/\/github.com\/McKinnonIT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/McKinnonIT\/zabbix-template-CVE-2020-1472",
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
"fork": false,
"created_at": "2020-09-16T02:37:52Z",
"updated_at": "2024-08-08T07:36:29Z",
"pushed_at": "2020-09-16T02:47:40Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 295915198,
"name": "cve-2020-1472",
"full_name": "mstxq17\/cve-2020-1472",
"owner": {
"login": "mstxq17",
"id": 29624427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
"html_url": "https:\/\/github.com\/mstxq17",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mstxq17\/cve-2020-1472",
"description": "cve-2020-1472 复现利用及其exp",
"fork": false,
"created_at": "2020-09-16T03:40:47Z",
"updated_at": "2024-12-12T02:02:00Z",
"pushed_at": "2020-09-16T15:03:32Z",
"stargazers_count": 107,
"watchers_count": 107,
"has_discussions": false,
"forks_count": 27,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 27,
"watchers": 107,
"score": 0,
"subscribers_count": 3
},
{
"id": 295917575,
"name": "CVE-2020-1472",
"full_name": "Fa1c0n35\/CVE-2020-1472",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T03:54:27Z",
"updated_at": "2024-08-12T20:05:49Z",
"pushed_at": "2020-09-16T03:54:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 295917979,
"name": "SecuraBV-CVE-2020-1472",
"full_name": "Fa1c0n35\/SecuraBV-CVE-2020-1472",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/SecuraBV-CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T03:57:04Z",
"updated_at": "2020-09-25T06:08:29Z",
"pushed_at": "2021-06-18T18:44:05Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 295956141,
"name": "CVE-2020-1472",
"full_name": "CanciuCostin\/CVE-2020-1472",
"owner": {
"login": "CanciuCostin",
"id": 27332434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27332434?v=4",
"html_url": "https:\/\/github.com\/CanciuCostin",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CanciuCostin\/CVE-2020-1472",
"description": "CVE-2020-1472 - Zero Logon vulnerability Python implementation",
"fork": false,
"created_at": "2020-09-16T07:25:22Z",
"updated_at": "2024-08-12T20:05:50Z",
"pushed_at": "2020-09-16T08:39:06Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 295972450,
"name": "cve-2020-1472_Tool-collection",
"full_name": "0xcccc666\/cve-2020-1472_Tool-collection",
"owner": {
"login": "0xcccc666",
"id": 71364553,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71364553?v=4",
"html_url": "https:\/\/github.com\/0xcccc666",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xcccc666\/cve-2020-1472_Tool-collection",
"description": "cve-2020-1472_Tool collection",
"fork": false,
"created_at": "2020-09-16T08:32:52Z",
"updated_at": "2020-11-28T04:59:11Z",
"pushed_at": "2020-09-16T09:13:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 295984599,
"name": "CVE-2020-1472",
"full_name": "murataydemir\/CVE-2020-1472",
"owner": {
"login": "murataydemir",
"id": 16391655,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
"html_url": "https:\/\/github.com\/murataydemir",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-1472",
"description": "[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)",
"fork": false,
"created_at": "2020-09-16T09:22:30Z",
"updated_at": "2024-08-12T20:05:50Z",
"pushed_at": "2020-09-16T20:59:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 295992280,
"name": "CVE-2020-1472",
"full_name": "npocmak\/CVE-2020-1472",
"owner": {
"login": "npocmak",
"id": 33814019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33814019?v=4",
"html_url": "https:\/\/github.com\/npocmak",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/npocmak\/CVE-2020-1472",
"description": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
"fork": false,
"created_at": "2020-09-16T09:54:09Z",
"updated_at": "2024-11-15T14:40:19Z",
"pushed_at": "2020-09-16T09:58:30Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 296056571,
"name": "CVE-2020-1472",
"full_name": "victim10wq3\/CVE-2020-1472",
"owner": {
"login": "victim10wq3",
"id": 46973456,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46973456?v=4",
"html_url": "https:\/\/github.com\/victim10wq3",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/victim10wq3\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-16T14:25:54Z",
"updated_at": "2024-08-12T20:05:51Z",
"pushed_at": "2020-09-16T14:28:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 296388474,
"name": "zerologon",
"full_name": "zeronetworks\/zerologon",
"owner": {
"login": "zeronetworks",
"id": 46243031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46243031?v=4",
"html_url": "https:\/\/github.com\/zeronetworks",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zeronetworks\/zerologon",
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
"fork": false,
"created_at": "2020-09-17T16:53:17Z",
"updated_at": "2024-10-21T12:50:48Z",
"pushed_at": "2023-05-01T21:48:28Z",
"stargazers_count": 57,
"watchers_count": 57,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 57,
"score": 0,
"subscribers_count": 8
},
{
"id": 296468860,
"name": "CVE-2020-1472",
"full_name": "sv3nbeast\/CVE-2020-1472",
"owner": {
"login": "sv3nbeast",
"id": 55974091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
"html_url": "https:\/\/github.com\/sv3nbeast",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1472",
"description": " CVE-2020-1472复现时使用的py文件整理打包",
"fork": false,
"created_at": "2020-09-18T00:02:26Z",
"updated_at": "2024-08-12T20:05:54Z",
"pushed_at": "2022-12-03T01:53:07Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 2
},
{
"id": 296948762,
"name": "CVE-2020-1472-Easy",
"full_name": "midpipps\/CVE-2020-1472-Easy",
"owner": {
"login": "midpipps",
"id": 4256983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4256983?v=4",
"html_url": "https:\/\/github.com\/midpipps",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/midpipps\/CVE-2020-1472-Easy",
"description": "A simple implementation\/code smash of a bunch of other repos",
"fork": false,
"created_at": "2020-09-19T20:44:40Z",
"updated_at": "2023-02-08T11:49:19Z",
"pushed_at": "2020-09-19T21:27:39Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 296966855,
"name": "CVE-2020-1472",
"full_name": "hectorgie\/CVE-2020-1472",
"owner": {
"login": "hectorgie",
"id": 56555336,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56555336?v=4",
"html_url": "https:\/\/github.com\/hectorgie",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hectorgie\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-19T23:15:41Z",
"updated_at": "2020-09-19T23:15:54Z",
"pushed_at": "2020-09-19T23:15:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 297085240,
"name": "zerologon-cve-2020-1472-notes",
"full_name": "johnpathe\/zerologon-cve-2020-1472-notes",
"owner": {
"login": "johnpathe",
"id": 8648275,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8648275?v=4",
"html_url": "https:\/\/github.com\/johnpathe",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/johnpathe\/zerologon-cve-2020-1472-notes",
"description": null,
"fork": false,
"created_at": "2020-09-20T13:44:16Z",
"updated_at": "2020-10-19T06:55:24Z",
"pushed_at": "2020-10-19T06:55:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 297260718,
"name": "CVE-2020-1472",
"full_name": "t31m0\/CVE-2020-1472",
"owner": {
"login": "t31m0",
"id": 13071219,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13071219?v=4",
"html_url": "https:\/\/github.com\/t31m0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/t31m0\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-21T07:24:03Z",
"updated_at": "2020-09-21T07:24:16Z",
"pushed_at": "2020-09-21T07:24:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 298383438,
"name": "CVE-2020-1472",
"full_name": "grupooruss\/CVE-2020-1472",
"owner": {
"login": "grupooruss",
"id": 43943489,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
"html_url": "https:\/\/github.com\/grupooruss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2020-1472",
"description": "CVE 2020-1472 Script de validación ",
"fork": false,
"created_at": "2020-09-24T20:05:21Z",
"updated_at": "2024-04-06T23:46:07Z",
"pushed_at": "2020-09-24T20:08:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 298771178,
"name": "CVE-2020-1472",
"full_name": "striveben\/CVE-2020-1472",
"owner": {
"login": "striveben",
"id": 61238912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61238912?v=4",
"html_url": "https:\/\/github.com\/striveben",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/striveben\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-26T08:31:47Z",
"updated_at": "2021-09-01T09:13:51Z",
"pushed_at": "2020-09-26T08:44:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 299216120,
"name": "CVE-2020-1472-02-",
"full_name": "Fa1c0n35\/CVE-2020-1472-02-",
"owner": {
"login": "Fa1c0n35",
"id": 33335488,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
"html_url": "https:\/\/github.com\/Fa1c0n35",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472-02-",
"description": null,
"fork": false,
"created_at": "2020-09-28T06:53:41Z",
"updated_at": "2020-09-28T06:53:54Z",
"pushed_at": "2021-06-18T18:44:05Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 299264416,
"name": "CVE-2020-1472",
"full_name": "Whippet0\/CVE-2020-1472",
"owner": {
"login": "Whippet0",
"id": 46486374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46486374?v=4",
"html_url": "https:\/\/github.com\/Whippet0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Whippet0\/CVE-2020-1472",
"description": "CVE-2020-1472",
"fork": false,
"created_at": "2020-09-28T09:54:31Z",
"updated_at": "2020-11-17T06:01:36Z",
"pushed_at": "2020-11-17T06:01:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 299708288,
"name": "Zerologon_CVE-2020-1472",
"full_name": "WiIs0n\/Zerologon_CVE-2020-1472",
"owner": {
"login": "WiIs0n",
"id": 40162782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40162782?v=4",
"html_url": "https:\/\/github.com\/WiIs0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WiIs0n\/Zerologon_CVE-2020-1472",
"description": "POC for checking multiple hosts for Zerologon vulnerability",
"fork": false,
"created_at": "2020-09-29T18:45:44Z",
"updated_at": "2024-02-28T14:17:47Z",
"pushed_at": "2020-10-05T07:47:02Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 11,
"score": 0,
"subscribers_count": 2
},
{
"id": 299733711,
"name": "ADZero",
"full_name": "Privia-Security\/ADZero",
"owner": {
"login": "Privia-Security",
"id": 69091374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69091374?v=4",
"html_url": "https:\/\/github.com\/Privia-Security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Privia-Security\/ADZero",
"description": "Zerologon AutoExploit Tool | CVE-2020-1472",
"fork": false,
"created_at": "2020-09-29T20:43:06Z",
"updated_at": "2024-07-04T19:27:50Z",
"pushed_at": "2020-10-02T13:00:21Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 22,
"score": 0,
"subscribers_count": 5
},
{
"id": 299845895,
"name": "cve-2020-1472",
"full_name": "Ken-Abruzzi\/cve-2020-1472",
"owner": {
"login": "Ken-Abruzzi",
"id": 68931768,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68931768?v=4",
"html_url": "https:\/\/github.com\/Ken-Abruzzi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ken-Abruzzi\/cve-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-09-30T07:45:50Z",
"updated_at": "2020-09-30T07:57:36Z",
"pushed_at": "2020-09-30T07:57:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 299977188,
"name": "Set-ZerologonMitigation",
"full_name": "rhymeswithmogul\/Set-ZerologonMitigation",
"owner": {
"login": "rhymeswithmogul",
"id": 19931245,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19931245?v=4",
"html_url": "https:\/\/github.com\/rhymeswithmogul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rhymeswithmogul\/Set-ZerologonMitigation",
"description": "Protect your domain controllers against Zerologon (CVE-2020-1472).",
"fork": false,
"created_at": "2020-09-30T16:10:26Z",
"updated_at": "2020-10-13T15:41:20Z",
"pushed_at": "2020-09-30T16:34:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"active-directory",
"cve-2020-1472",
"netlogon",
"powershell",
"security",
"windows-server",
"zerologon"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 302859573,
"name": "cve-2020-1472",
"full_name": "shanfenglan\/cve-2020-1472",
"owner": {
"login": "shanfenglan",
"id": 49781523,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49781523?v=4",
"html_url": "https:\/\/github.com\/shanfenglan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shanfenglan\/cve-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-10-10T09:00:41Z",
"updated_at": "2020-10-18T05:46:12Z",
"pushed_at": "2020-10-10T09:02:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 304362194,
"name": "zerologon",
"full_name": "maikelnight\/zerologon",
"owner": {
"login": "maikelnight",
"id": 16766265,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16766265?v=4",
"html_url": "https:\/\/github.com\/maikelnight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/maikelnight\/zerologon",
"description": "Check for events that indicate non compatible devices -> CVE-2020-1472",
"fork": false,
"created_at": "2020-10-15T15:02:53Z",
"updated_at": "2020-11-11T09:28:46Z",
"pushed_at": "2020-11-11T09:28:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 304764704,
"name": "CVE-2020-1472_ZeroLogonChecker",
"full_name": "CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-1472_ZeroLogonChecker",
"description": "C# Vulnerability Checker for CVE-2020-1472 Aka Zerologon",
"fork": false,
"created_at": "2020-10-17T00:14:08Z",
"updated_at": "2023-03-07T05:41:42Z",
"pushed_at": "2021-07-20T20:29:55Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 305977168,
"name": "CVE-2020-1472",
"full_name": "puckiestyle\/CVE-2020-1472",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-10-21T09:42:34Z",
"updated_at": "2023-01-10T03:22:06Z",
"pushed_at": "2021-06-18T18:44:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 310337744,
"name": "CVE-2020-1472-visualizer",
"full_name": "mingchen-script\/CVE-2020-1472-visualizer",
"owner": {
"login": "mingchen-script",
"id": 68715366,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68715366?v=4",
"html_url": "https:\/\/github.com\/mingchen-script",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mingchen-script\/CVE-2020-1472-visualizer",
"description": null,
"fork": false,
"created_at": "2020-11-05T15:17:14Z",
"updated_at": "2024-02-19T23:41:35Z",
"pushed_at": "2020-11-05T15:19:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 311800203,
"name": "The_big_Zero",
"full_name": "JayP232\/The_big_Zero",
"owner": {
"login": "JayP232",
"id": 40582783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40582783?v=4",
"html_url": "https:\/\/github.com\/JayP232",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JayP232\/The_big_Zero",
"description": "The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC",
"fork": false,
"created_at": "2020-11-10T22:29:56Z",
"updated_at": "2020-12-04T21:08:46Z",
"pushed_at": "2020-12-04T21:08:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 313376422,
"name": "CVE-2020-1472",
"full_name": "b1ack0wl\/CVE-2020-1472",
"owner": {
"login": "b1ack0wl",
"id": 14972026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14972026?v=4",
"html_url": "https:\/\/github.com\/b1ack0wl",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/b1ack0wl\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-11-16T17:24:25Z",
"updated_at": "2022-11-27T19:24:21Z",
"pushed_at": "2020-11-16T17:38:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 323842467,
"name": "CVE-2020-1472",
"full_name": "SaharAttackit\/CVE-2020-1472",
"owner": {
"login": "SaharAttackit",
"id": 76513483,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76513483?v=4",
"html_url": "https:\/\/github.com\/SaharAttackit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SaharAttackit\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2020-12-23T08:12:21Z",
"updated_at": "2020-12-23T08:24:12Z",
"pushed_at": "2020-12-23T08:13:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 325937253,
"name": "zerologon",
"full_name": "wrathfulDiety\/zerologon",
"owner": {
"login": "wrathfulDiety",
"id": 36190613,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36190613?v=4",
"html_url": "https:\/\/github.com\/wrathfulDiety",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wrathfulDiety\/zerologon",
"description": "zerologon script to exploit CVE-2020-1472 CVSS 10\/10",
"fork": false,
"created_at": "2021-01-01T07:38:58Z",
"updated_at": "2021-01-17T15:08:53Z",
"pushed_at": "2021-01-03T15:43:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 327729919,
"name": "ZeroLogon-Exploitation-Check",
"full_name": "YossiSassi\/ZeroLogon-Exploitation-Check",
"owner": {
"login": "YossiSassi",
"id": 23126190,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23126190?v=4",
"html_url": "https:\/\/github.com\/YossiSassi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/YossiSassi\/ZeroLogon-Exploitation-Check",
"description": "quick'n'dirty automated checks for potential exploitation of CVE-2020-1472 (aka ZeroLogon), using leading artifects in determining an actual exploitation of CVE-2020-1472. requires admin access to the DCs",
"fork": false,
"created_at": "2021-01-07T21:35:16Z",
"updated_at": "2023-09-19T22:49:48Z",
"pushed_at": "2021-01-08T12:14:27Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0,
"subscribers_count": 3
},
{
"id": 331439225,
"name": "zerologon",
"full_name": "sho-luv\/zerologon",
"owner": {
"login": "sho-luv",
"id": 1679089,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1679089?v=4",
"html_url": "https:\/\/github.com\/sho-luv",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sho-luv\/zerologon",
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original state",
"fork": false,
"created_at": "2021-01-20T21:38:47Z",
"updated_at": "2023-11-07T15:34:35Z",
"pushed_at": "2022-04-12T23:27:40Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 16,
"score": 0,
"subscribers_count": 2
},
{
"id": 343288379,
"name": "ZeroLogon-Exploit",
"full_name": "hell-moon\/ZeroLogon-Exploit",
"owner": {
"login": "hell-moon",
"id": 46636809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46636809?v=4",
"html_url": "https:\/\/github.com\/hell-moon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hell-moon\/ZeroLogon-Exploit",
"description": "Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to null",
"fork": false,
"created_at": "2021-03-01T04:21:47Z",
"updated_at": "2022-10-08T19:00:21Z",
"pushed_at": "2021-03-01T19:24:56Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 355036509,
"name": "Zerologon",
"full_name": "Udyz\/Zerologon",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Udyz\/Zerologon",
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
"fork": false,
"created_at": "2021-04-06T02:48:35Z",
"updated_at": "2024-08-12T20:11:53Z",
"pushed_at": "2021-04-07T06:45:04Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 360650643,
"name": "CVE-2020-1472",
"full_name": "itssmikefm\/CVE-2020-1472",
"owner": {
"login": "itssmikefm",
"id": 38843879,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38843879?v=4",
"html_url": "https:\/\/github.com\/itssmikefm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/itssmikefm\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2021-04-22T18:51:09Z",
"updated_at": "2021-04-22T19:03:41Z",
"pushed_at": "2021-04-22T19:03:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 379594309,
"name": "zeroscan",
"full_name": "B34MR\/zeroscan",
"owner": {
"login": "B34MR",
"id": 10254849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10254849?v=4",
"html_url": "https:\/\/github.com\/B34MR",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/B34MR\/zeroscan",
"description": "Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
"fork": false,
"created_at": "2021-06-23T12:23:48Z",
"updated_at": "2024-03-17T09:02:01Z",
"pushed_at": "2022-04-09T12:01:43Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-1472",
"cve-2021-1675",
"domain-controller",
"pentest",
"pentest-tool",
"pentesting",
"python",
"zerologon"
],
"visibility": "public",
"forks": 4,
"watchers": 12,
"score": 0,
"subscribers_count": 2
},
{
"id": 462124353,
"name": "SecuraBV-CVE-2020-1472",
"full_name": "TheJoyOfHacking\/SecuraBV-CVE-2020-1472",
"owner": {
"login": "TheJoyOfHacking",
"id": 99463221,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
"html_url": "https:\/\/github.com\/TheJoyOfHacking",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheJoyOfHacking\/SecuraBV-CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2022-02-22T03:33:24Z",
"updated_at": "2022-02-22T03:33:37Z",
"pushed_at": "2022-02-22T03:33:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 462124410,
"name": "dirkjanm-CVE-2020-1472",
"full_name": "TheJoyOfHacking\/dirkjanm-CVE-2020-1472",
"owner": {
"login": "TheJoyOfHacking",
"id": 99463221,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
"html_url": "https:\/\/github.com\/TheJoyOfHacking",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TheJoyOfHacking\/dirkjanm-CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2022-02-22T03:33:38Z",
"updated_at": "2022-02-22T03:33:49Z",
"pushed_at": "2022-02-22T03:33:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 465532157,
"name": "Zero-day-scanning",
"full_name": "Anonymous-Family\/Zero-day-scanning",
"owner": {
"login": "Anonymous-Family",
"id": 98486038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
"html_url": "https:\/\/github.com\/Anonymous-Family",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Anonymous-Family\/Zero-day-scanning",
"description": "Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
"fork": false,
"created_at": "2022-03-03T01:55:28Z",
"updated_at": "2023-10-14T12:41:31Z",
"pushed_at": "2022-03-03T07:50:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 465533233,
"name": "CVE-2020-1472",
"full_name": "Anonymous-Family\/CVE-2020-1472",
"owner": {
"login": "Anonymous-Family",
"id": 98486038,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
"html_url": "https:\/\/github.com\/Anonymous-Family",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Anonymous-Family\/CVE-2020-1472",
"description": "Test tool for CVE-2020-1472",
"fork": false,
"created_at": "2022-03-03T02:00:21Z",
"updated_at": "2022-03-03T02:01:04Z",
"pushed_at": "2023-05-01T22:24:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 475642504,
"name": "zerologon",
"full_name": "carlos55ml\/zerologon",
"owner": {
"login": "carlos55ml",
"id": 82476093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82476093?v=4",
"html_url": "https:\/\/github.com\/carlos55ml",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/carlos55ml\/zerologon",
"description": "Set of scripts, to test and exploit the zerologon vulnerability (CVE-2020-1472). ",
"fork": false,
"created_at": "2022-03-29T22:43:50Z",
"updated_at": "2022-03-29T21:38:34Z",
"pushed_at": "2022-03-29T22:34:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 530954073,
"name": "ZeroLogon",
"full_name": "Rvn0xsy\/ZeroLogon",
"owner": {
"login": "Rvn0xsy",
"id": 19944759,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
"html_url": "https:\/\/github.com\/Rvn0xsy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Rvn0xsy\/ZeroLogon",
"description": "CVE-2020-1472 C++",
"fork": false,
"created_at": "2022-08-31T06:01:02Z",
"updated_at": "2024-08-12T20:26:38Z",
"pushed_at": "2022-09-02T16:25:01Z",
"stargazers_count": 83,
"watchers_count": 83,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 83,
"score": 0,
"subscribers_count": 5
},
{
"id": 543363896,
"name": "MassZeroLogon",
"full_name": "guglia001\/MassZeroLogon",
"owner": {
"login": "guglia001",
"id": 7321539,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7321539?v=4",
"html_url": "https:\/\/github.com\/guglia001",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/guglia001\/MassZeroLogon",
"description": "Tool for mass testing ZeroLogon vulnerability CVE-2020-1472",
"fork": false,
"created_at": "2022-09-30T00:03:12Z",
"updated_at": "2024-01-10T12:56:49Z",
"pushed_at": "2022-09-30T00:09:13Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 543513500,
"name": "MassZeroLogon",
"full_name": "likeww\/MassZeroLogon",
"owner": {
"login": "likeww",
"id": 51168412,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51168412?v=4",
"html_url": "https:\/\/github.com\/likeww",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/likeww\/MassZeroLogon",
"description": "Tool for mass testing ZeroLogon vulnerability CVE-2020-1472",
"fork": false,
"created_at": "2022-09-30T08:59:31Z",
"updated_at": "2022-09-30T00:09:44Z",
"pushed_at": "2022-09-30T00:09:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 569087060,
"name": "CVE-2020-1472",
"full_name": "dr4g0n23\/CVE-2020-1472",
"owner": {
"login": "dr4g0n23",
"id": 68361881,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68361881?v=4",
"html_url": "https:\/\/github.com\/dr4g0n23",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dr4g0n23\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2022-11-22T03:35:47Z",
"updated_at": "2022-11-22T03:37:43Z",
"pushed_at": "2022-11-25T10:09:13Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 603449630,
"name": "CVE-2020-1472-LAB",
"full_name": "RicYaben\/CVE-2020-1472-LAB",
"owner": {
"login": "RicYaben",
"id": 32867697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32867697?v=4",
"html_url": "https:\/\/github.com\/RicYaben",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RicYaben\/CVE-2020-1472-LAB",
"description": "Lab introduction to ZeroLogon",
"fork": false,
"created_at": "2023-02-18T14:52:17Z",
"updated_at": "2024-11-19T09:17:53Z",
"pushed_at": "2024-02-11T19:40:36Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 634597926,
"name": "CVE-2020-1472",
"full_name": "Akash7350\/CVE-2020-1472",
"owner": {
"login": "Akash7350",
"id": 104816473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/104816473?v=4",
"html_url": "https:\/\/github.com\/Akash7350",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Akash7350\/CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2023-04-30T16:41:55Z",
"updated_at": "2023-05-05T17:34:36Z",
"pushed_at": "2023-04-30T18:10:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 678208074,
"name": "ZeroLogon-to-Shell",
"full_name": "c3rrberu5\/ZeroLogon-to-Shell",
"owner": {
"login": "c3rrberu5",
"id": 109983457,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/109983457?v=4",
"html_url": "https:\/\/github.com\/c3rrberu5",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/c3rrberu5\/ZeroLogon-to-Shell",
"description": "This is a combination of the zerologon_tester.py code (https:\/\/raw.githubusercontent.com\/SecuraBV\/CVE-2020-1472\/master\/zerologon_tester.py) and the tool evil-winrm to get a shell.",
"fork": false,
"created_at": "2023-08-14T02:40:18Z",
"updated_at": "2023-08-14T02:41:31Z",
"pushed_at": "2023-08-14T02:47:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 739960583,
"name": "0logon",
"full_name": "logg-1\/0logon",
"owner": {
"login": "logg-1",
"id": 155867031,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/155867031?v=4",
"html_url": "https:\/\/github.com\/logg-1",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/logg-1\/0logon",
"description": "MS-NRPC (Microsoft NetLogon Remote Protocol)\/CVE-2020-1472",
"fork": false,
"created_at": "2024-01-07T04:27:17Z",
"updated_at": "2024-01-07T04:30:03Z",
"pushed_at": "2024-01-07T04:29:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 748399909,
"name": "Zerologon-Attack-CVE-2020-1472-POC",
"full_name": "whoami-chmod777\/Zerologon-Attack-CVE-2020-1472-POC",
"owner": {
"login": "whoami-chmod777",
"id": 33582093,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33582093?v=4",
"html_url": "https:\/\/github.com\/whoami-chmod777",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/whoami-chmod777\/Zerologon-Attack-CVE-2020-1472-POC",
"description": null,
"fork": false,
"created_at": "2024-01-25T22:11:57Z",
"updated_at": "2024-10-09T08:47:13Z",
"pushed_at": "2024-01-25T22:12:07Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 775297856,
"name": "Zerologon_CVE-2020-1472",
"full_name": "JolynNgSC\/Zerologon_CVE-2020-1472",
"owner": {
"login": "JolynNgSC",
"id": 164031233,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164031233?v=4",
"html_url": "https:\/\/github.com\/JolynNgSC",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JolynNgSC\/Zerologon_CVE-2020-1472",
"description": null,
"fork": false,
"created_at": "2024-03-21T05:52:40Z",
"updated_at": "2024-03-21T05:52:40Z",
"pushed_at": "2024-03-21T07:21:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 811466494,
"name": "zerologon-poc",
"full_name": "blackh00d\/zerologon-poc",
"owner": {
"login": "blackh00d",
"id": 40231726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40231726?v=4",
"html_url": "https:\/\/github.com\/blackh00d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/blackh00d\/zerologon-poc",
"description": "A script to exploit CVE-2020-1472 (Zerologon)",
"fork": false,
"created_at": "2024-06-06T16:44:38Z",
"updated_at": "2024-06-06T16:46:22Z",
"pushed_at": "2024-06-06T16:46:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 909197043,
"name": "ZerologonWithImpacket-CVE2020-1472",
"full_name": "TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
"owner": {
"login": "TuanCui22",
"id": 124656776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/124656776?v=4",
"html_url": "https:\/\/github.com\/TuanCui22",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TuanCui22\/ZerologonWithImpacket-CVE2020-1472",
"description": "This project combines the Zerologon vulnerability exploit (CVE-2020-1472) with Impacket tools for streamlined exploitation and post-exploitation activities. It allows penetration testers to assess and demonstrate the impact of this critical vulnerability in a controlled and authorized environment.",
"fork": false,
"created_at": "2024-12-28T01:58:26Z",
"updated_at": "2024-12-28T02:43:41Z",
"pushed_at": "2024-12-28T02:43:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]