PoC-in-GitHub/2020/CVE-2020-16898.json
2024-12-03 03:32:44 +09:00

455 lines
No EOL
16 KiB
JSON

[
{
"id": 302145941,
"name": "CVE-2020-16898",
"full_name": "advanced-threat-research\/CVE-2020-16898",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898",
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2024-12-02T17:52:16Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 208,
"watchers_count": 208,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"atr",
"bad-neighbor",
"badneighbor",
"buffer-overflow",
"buffer-overflow-vulnerability",
"cve",
"cve-2020-16898",
"icmpv6",
"lua",
"mcafee",
"microsoft",
"neighbor-discovery",
"neighbor-discovery-protocol",
"rce",
"suricata",
"suricata-rule",
"tcpip-stack",
"windows-10"
],
"visibility": "public",
"forks": 31,
"watchers": 208,
"score": 0,
"subscribers_count": 18
},
{
"id": 303891965,
"name": "CVE-2020-16898",
"full_name": "corelight\/CVE-2020-16898",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898",
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
"fork": false,
"created_at": "2020-10-14T03:25:00Z",
"updated_at": "2024-10-12T10:28:29Z",
"pushed_at": "2024-09-03T18:23:10Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 9,
"score": 0,
"subscribers_count": 13
},
{
"id": 304024639,
"name": "CVE-2020-16898_Check",
"full_name": "Maliek\/CVE-2020-16898_Check",
"owner": {
"login": "Maliek",
"id": 8858341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8858341?v=4",
"html_url": "https:\/\/github.com\/Maliek",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check",
"description": "Minor powershell script that checks for vulnerable interfaces.",
"fork": false,
"created_at": "2020-10-14T13:30:38Z",
"updated_at": "2020-10-16T09:20:02Z",
"pushed_at": "2020-10-16T09:20:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 304044860,
"name": "CVE-2020-16898",
"full_name": "ZephrFish\/CVE-2020-16898",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898",
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2023-03-01T05:20:04Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},
{
"id": 304075693,
"name": "cve-2020-16898",
"full_name": "esnet-security\/cve-2020-16898",
"owner": {
"login": "esnet-security",
"id": 46755983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46755983?v=4",
"html_url": "https:\/\/github.com\/esnet-security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898",
"description": "Detects CVE-2020-16898: \"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T16:38:06Z",
"updated_at": "2020-10-15T15:39:52Z",
"pushed_at": "2020-10-15T23:00:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 5
},
{
"id": 304139222,
"name": "CVE-2020-16898-Bad-Neighbor",
"full_name": "initconf\/CVE-2020-16898-Bad-Neighbor",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor",
"description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T21:25:09Z",
"updated_at": "2023-03-21T04:55:12Z",
"pushed_at": "2020-10-22T21:12:03Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 304538917,
"name": "CVE-2020-16898",
"full_name": "Q1984\/CVE-2020-16898",
"owner": {
"login": "Q1984",
"id": 50952023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952023?v=4",
"html_url": "https:\/\/github.com\/Q1984",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
"description": "PoC Bad Neighbor BSOD exploit",
"fork": false,
"created_at": "2020-10-16T06:27:24Z",
"updated_at": "2022-08-21T16:31:19Z",
"pushed_at": "2020-10-16T11:17:22Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 304755825,
"name": "cve-2020-16898",
"full_name": "0xeb-bp\/cve-2020-16898",
"owner": {
"login": "0xeb-bp",
"id": 53204152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4",
"html_url": "https:\/\/github.com\/0xeb-bp",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2024-09-02T07:58:55Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 21,
"score": 0,
"subscribers_count": 3
},
{
"id": 304797048,
"name": "cve-2020-16898",
"full_name": "jiansiting\/cve-2020-16898",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898",
"fork": false,
"created_at": "2020-10-17T04:32:11Z",
"updated_at": "2024-09-02T07:59:28Z",
"pushed_at": "2020-10-17T04:32:19Z",
"stargazers_count": 9,
"watchers_count": 9,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 9,
"score": 0,
"subscribers_count": 2
},
{
"id": 304819444,
"name": "CVE-2020-16898_Workaround",
"full_name": "CPO-EH\/CVE-2020-16898_Workaround",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround",
"description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T07:09:58Z",
"updated_at": "2020-10-21T16:45:04Z",
"pushed_at": "2020-10-21T16:45:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 304851828,
"name": "CVE-2020-16898_Checker",
"full_name": "CPO-EH\/CVE-2020-16898_Checker",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker",
"description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T10:23:56Z",
"updated_at": "2020-10-21T17:45:24Z",
"pushed_at": "2020-10-21T17:45:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 304888543,
"name": "CVE-2020-16898-exp",
"full_name": "momika233\/CVE-2020-16898-exp",
"owner": {
"login": "momika233",
"id": 56291820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
"html_url": "https:\/\/github.com\/momika233",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp",
"description": null,
"fork": false,
"created_at": "2020-10-17T13:52:08Z",
"updated_at": "2024-08-12T20:06:50Z",
"pushed_at": "2020-10-17T13:52:38Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 18,
"score": 0,
"subscribers_count": 1
},
{
"id": 305598825,
"name": "CVE-2020-16898-EXP-POC",
"full_name": "komomon\/CVE-2020-16898-EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-20T05:24:47Z",
"updated_at": "2023-11-08T06:40:28Z",
"pushed_at": "2020-10-28T11:21:00Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 307994197,
"name": "CVE-2020-16898--EXP-POC",
"full_name": "komomon\/CVE-2020-16898--EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-28T11:25:58Z",
"updated_at": "2024-08-12T20:07:09Z",
"pushed_at": "2020-10-28T11:27:17Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 13,
"score": 0,
"subscribers_count": 3
}
]