PoC-in-GitHub/2022/CVE-2022-26923.json
2025-01-13 21:33:40 +09:00

188 lines
No EOL
6.7 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 491338151,
"name": "TryHackMe-CVE-2022-26923",
"full_name": "r1skkam\/TryHackMe-CVE-2022-26923",
"owner": {
"login": "r1skkam",
"id": 58542375,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58542375?v=4",
"html_url": "https:\/\/github.com\/r1skkam",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/r1skkam\/TryHackMe-CVE-2022-26923",
"description": "Walkthrough on the exploitation of CVE-2022-26923, a vulnerability in AD Certificate Services",
"fork": false,
"created_at": "2022-05-12T02:31:50Z",
"updated_at": "2022-08-12T08:03:36Z",
"pushed_at": "2022-05-12T03:24:04Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0,
"subscribers_count": 2
},
{
"id": 492169187,
"name": "CVE-2022-26923_AD-Certificate-Services",
"full_name": "LudovicPatho\/CVE-2022-26923_AD-Certificate-Services",
"owner": {
"login": "LudovicPatho",
"id": 26960886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26960886?v=4",
"html_url": "https:\/\/github.com\/LudovicPatho",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/LudovicPatho\/CVE-2022-26923_AD-Certificate-Services",
"description": "The vulnerability allowed a low-privileged user to escalate privileges to domain administrator in a default Active Directory environment with the Active Directory Certificate Services (AD CS) server role installed.",
"fork": false,
"created_at": "2022-05-14T09:27:06Z",
"updated_at": "2025-01-11T08:49:34Z",
"pushed_at": "2022-05-14T20:56:39Z",
"stargazers_count": 44,
"watchers_count": 44,
"has_discussions": false,
"forks_count": 14,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 14,
"watchers": 44,
"score": 0,
"subscribers_count": 4
},
{
"id": 525955636,
"name": "CVE-2022-26923-Powershell-POC",
"full_name": "lsecqt\/CVE-2022-26923-Powershell-POC",
"owner": {
"login": "lsecqt",
"id": 102690672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102690672?v=4",
"html_url": "https:\/\/github.com\/lsecqt",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lsecqt\/CVE-2022-26923-Powershell-POC",
"description": "A powershell poc to load and automatically run Certify and Rubeus from memory.",
"fork": false,
"created_at": "2022-08-17T21:13:49Z",
"updated_at": "2024-11-21T05:59:54Z",
"pushed_at": "2022-08-17T21:25:20Z",
"stargazers_count": 17,
"watchers_count": 17,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 17,
"score": 0,
"subscribers_count": 1
},
{
"id": 706016211,
"name": "PIGADVulnScanner",
"full_name": "evilashz\/PIGADVulnScanner",
"owner": {
"login": "evilashz",
"id": 50722929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50722929?v=4",
"html_url": "https:\/\/github.com\/evilashz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/evilashz\/PIGADVulnScanner",
"description": "检测域内常见一把梭漏洞包括NoPac、ZeroLogon、CVE-2022-26923、PrintNightMare",
"fork": false,
"created_at": "2023-10-17T06:29:44Z",
"updated_at": "2025-01-06T08:04:10Z",
"pushed_at": "2023-10-23T04:47:11Z",
"stargazers_count": 43,
"watchers_count": 43,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 43,
"score": 0,
"subscribers_count": 2
},
{
"id": 724703848,
"name": "CVE-2022-26923",
"full_name": "Gh-Badr\/CVE-2022-26923",
"owner": {
"login": "Gh-Badr",
"id": 110426701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/110426701?v=4",
"html_url": "https:\/\/github.com\/Gh-Badr",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gh-Badr\/CVE-2022-26923",
"description": "A proof of concept exploiting CVE-2022-26923.",
"fork": false,
"created_at": "2023-11-28T16:13:36Z",
"updated_at": "2023-12-06T21:25:52Z",
"pushed_at": "2023-12-09T23:39:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 850747240,
"name": "CVE-2022-26923",
"full_name": "Yowise\/CVE-2022-26923",
"owner": {
"login": "Yowise",
"id": 42322439,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42322439?v=4",
"html_url": "https:\/\/github.com\/Yowise",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Yowise\/CVE-2022-26923",
"description": null,
"fork": false,
"created_at": "2024-09-01T17:03:27Z",
"updated_at": "2024-09-01T17:04:54Z",
"pushed_at": "2024-09-01T17:04:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]