mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-15 20:32:21 +01:00
2716 lines
No EOL
94 KiB
JSON
2716 lines
No EOL
94 KiB
JSON
[
|
||
{
|
||
"id": 498052694,
|
||
"name": "PoC-CVE-2022-30190",
|
||
"full_name": "JMousqueton\/PoC-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "JMousqueton",
|
||
"id": 4148567,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4148567?v=4",
|
||
"html_url": "https:\/\/github.com\/JMousqueton",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JMousqueton\/PoC-CVE-2022-30190",
|
||
"description": "POC CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina",
|
||
"fork": false,
|
||
"created_at": "2022-05-30T18:17:38Z",
|
||
"updated_at": "2024-12-22T19:55:17Z",
|
||
"pushed_at": "2022-06-05T21:06:13Z",
|
||
"stargazers_count": 157,
|
||
"watchers_count": 157,
|
||
"has_discussions": false,
|
||
"forks_count": 55,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve",
|
||
"follina",
|
||
"msoffice",
|
||
"poc",
|
||
"proof-of-concept",
|
||
"rce",
|
||
"vulnerability"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 55,
|
||
"watchers": 157,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 498154711,
|
||
"name": "msdt-follina-office-rce",
|
||
"full_name": "zkl21hoang\/msdt-follina-office-rce",
|
||
"owner": {
|
||
"login": "zkl21hoang",
|
||
"id": 75946931,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75946931?v=4",
|
||
"html_url": "https:\/\/github.com\/zkl21hoang",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zkl21hoang\/msdt-follina-office-rce",
|
||
"description": "CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T02:03:46Z",
|
||
"updated_at": "2022-11-26T08:36:07Z",
|
||
"pushed_at": "2022-06-02T08:20:54Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498218229,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "onecloudemoji\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "onecloudemoji",
|
||
"id": 46857300,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46857300?v=4",
|
||
"html_url": "https:\/\/github.com\/onecloudemoji",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/onecloudemoji\/CVE-2022-30190",
|
||
"description": "CVE-2022-30190 Follina POC",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T06:45:25Z",
|
||
"updated_at": "2024-09-09T11:51:09Z",
|
||
"pushed_at": "2022-05-31T09:35:37Z",
|
||
"stargazers_count": 106,
|
||
"watchers_count": 106,
|
||
"has_discussions": false,
|
||
"forks_count": 27,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 27,
|
||
"watchers": 106,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 498253545,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "2867a0\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "2867a0",
|
||
"id": 42805417,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42805417?v=4",
|
||
"html_url": "https:\/\/github.com\/2867a0",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/2867a0\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-31T08:39:09Z",
|
||
"updated_at": "2022-06-01T23:05:08Z",
|
||
"pushed_at": "2022-05-31T08:43:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 498322212,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "doocop\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "doocop",
|
||
"id": 52679771,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52679771?v=4",
|
||
"html_url": "https:\/\/github.com\/doocop",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/doocop\/CVE-2022-30190",
|
||
"description": "Microsoft Office Word Rce 复现(CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T12:15:18Z",
|
||
"updated_at": "2024-11-25T04:47:09Z",
|
||
"pushed_at": "2022-05-31T12:27:50Z",
|
||
"stargazers_count": 59,
|
||
"watchers_count": 59,
|
||
"has_discussions": false,
|
||
"forks_count": 14,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 14,
|
||
"watchers": 59,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498363809,
|
||
"name": "MSDT_CVE-2022-30190",
|
||
"full_name": "archanchoudhury\/MSDT_CVE-2022-30190",
|
||
"owner": {
|
||
"login": "archanchoudhury",
|
||
"id": 51078911,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51078911?v=4",
|
||
"html_url": "https:\/\/github.com\/archanchoudhury",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/archanchoudhury\/MSDT_CVE-2022-30190",
|
||
"description": "This Repository Talks about the Follina MSDT from Defender Perspective",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T14:10:11Z",
|
||
"updated_at": "2024-12-05T17:20:51Z",
|
||
"pushed_at": "2022-06-02T09:12:54Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"has_discussions": false,
|
||
"forks_count": 10,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 10,
|
||
"watchers": 37,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498379315,
|
||
"name": "cve-2022-30190",
|
||
"full_name": "rickhenderson\/cve-2022-30190",
|
||
"owner": {
|
||
"login": "rickhenderson",
|
||
"id": 4127791,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4127791?v=4",
|
||
"html_url": "https:\/\/github.com\/rickhenderson",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rickhenderson\/cve-2022-30190",
|
||
"description": "Aka Follina = benign POC.",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T14:50:55Z",
|
||
"updated_at": "2022-06-30T03:54:18Z",
|
||
"pushed_at": "2022-05-31T15:59:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498408278,
|
||
"name": "CVE-2022-30190-ASR-Senintel-Process-Pickup",
|
||
"full_name": "DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup",
|
||
"owner": {
|
||
"login": "DOV3Y",
|
||
"id": 89396131,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89396131?v=4",
|
||
"html_url": "https:\/\/github.com\/DOV3Y",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DOV3Y\/CVE-2022-30190-ASR-Senintel-Process-Pickup",
|
||
"description": "Picking up processes that have triggered ASR related to CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T16:11:14Z",
|
||
"updated_at": "2022-05-31T16:11:14Z",
|
||
"pushed_at": "2022-05-31T16:15:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498441804,
|
||
"name": "msdt-CVE-2022-30190",
|
||
"full_name": "kdk2933\/msdt-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "kdk2933",
|
||
"id": 31010136,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31010136?v=4",
|
||
"html_url": "https:\/\/github.com\/kdk2933",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kdk2933\/msdt-CVE-2022-30190",
|
||
"description": "CVE-2022-30190- A Zero-Click RCE Vulnerability In MSDT",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T17:54:20Z",
|
||
"updated_at": "2022-12-16T06:24:23Z",
|
||
"pushed_at": "2022-05-31T17:54:21Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498443788,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "sentinelblue\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "sentinelblue",
|
||
"id": 70291995,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70291995?v=4",
|
||
"html_url": "https:\/\/github.com\/sentinelblue",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sentinelblue\/CVE-2022-30190",
|
||
"description": "Microsoft Sentinel analytic rule and hunting queries in ASIM for activity of MSDT and CVE-2022-30190.",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T18:00:42Z",
|
||
"updated_at": "2024-08-12T20:23:43Z",
|
||
"pushed_at": "2022-06-08T15:18:45Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"alerting",
|
||
"asim",
|
||
"cve-2022-30190",
|
||
"hunting",
|
||
"sentinel"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 498457928,
|
||
"name": "MSDT_CVE-2022-30190-follina-",
|
||
"full_name": "aymankhder\/MSDT_CVE-2022-30190-follina-",
|
||
"owner": {
|
||
"login": "aymankhder",
|
||
"id": 12251266,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12251266?v=4",
|
||
"html_url": "https:\/\/github.com\/aymankhder",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aymankhder\/MSDT_CVE-2022-30190-follina-",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-05-31T18:45:34Z",
|
||
"updated_at": "2022-05-31T18:45:34Z",
|
||
"pushed_at": "2022-05-31T18:51:30Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498528729,
|
||
"name": "cve-2022-30190",
|
||
"full_name": "PaddlingCode\/cve-2022-30190",
|
||
"owner": {
|
||
"login": "PaddlingCode",
|
||
"id": 55930531,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55930531?v=4",
|
||
"html_url": "https:\/\/github.com\/PaddlingCode",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/PaddlingCode\/cve-2022-30190",
|
||
"description": "CVE-2022-30190 remediation via removal of ms-msdt from Windows registry",
|
||
"fork": false,
|
||
"created_at": "2022-05-31T23:32:33Z",
|
||
"updated_at": "2024-08-12T20:23:44Z",
|
||
"pushed_at": "2022-05-31T23:43:02Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 6,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 498663128,
|
||
"name": "gollina",
|
||
"full_name": "dwisiswant0\/gollina",
|
||
"owner": {
|
||
"login": "dwisiswant0",
|
||
"id": 25837540,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
||
"html_url": "https:\/\/github.com\/dwisiswant0",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dwisiswant0\/gollina",
|
||
"description": "Follina MS-MSDT 0-day MS Office RCE (CVE-2022-30190) PoC in Go",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T09:02:00Z",
|
||
"updated_at": "2024-11-16T19:54:57Z",
|
||
"pushed_at": "2022-06-01T09:31:58Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"go",
|
||
"golang",
|
||
"ms-msdt"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 18,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 498686009,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "hscorpion\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "hscorpion",
|
||
"id": 22425159,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22425159?v=4",
|
||
"html_url": "https:\/\/github.com\/hscorpion",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hscorpion\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-01T10:13:16Z",
|
||
"updated_at": "2022-06-06T16:59:02Z",
|
||
"pushed_at": "2022-06-06T17:08:13Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498710957,
|
||
"name": "CVE-2022-30190-follina",
|
||
"full_name": "drgreenthumb93\/CVE-2022-30190-follina",
|
||
"owner": {
|
||
"login": "drgreenthumb93",
|
||
"id": 50826299,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50826299?v=4",
|
||
"html_url": "https:\/\/github.com\/drgreenthumb93",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/drgreenthumb93\/CVE-2022-30190-follina",
|
||
"description": "Just another PoC for the new MSDT-Exploit",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T11:37:08Z",
|
||
"updated_at": "2024-08-12T20:23:45Z",
|
||
"pushed_at": "2023-04-20T20:34:05Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498780691,
|
||
"name": "CVE-2022-30190-POC",
|
||
"full_name": "mitespsoc\/CVE-2022-30190-POC",
|
||
"owner": {
|
||
"login": "mitespsoc",
|
||
"id": 105447645,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/105447645?v=4",
|
||
"html_url": "https:\/\/github.com\/mitespsoc",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mitespsoc\/CVE-2022-30190-POC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-01T14:55:43Z",
|
||
"updated_at": "2024-08-12T20:23:44Z",
|
||
"pushed_at": "2022-06-01T15:41:26Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498808251,
|
||
"name": "MSDT-0-Day-CVE-2022-30190-Poc",
|
||
"full_name": "Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc",
|
||
"owner": {
|
||
"login": "Vaisakhkm2625",
|
||
"id": 68694876,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68694876?v=4",
|
||
"html_url": "https:\/\/github.com\/Vaisakhkm2625",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Vaisakhkm2625\/MSDT-0-Day-CVE-2022-30190-Poc",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-01T16:11:33Z",
|
||
"updated_at": "2024-08-12T20:23:45Z",
|
||
"pushed_at": "2022-06-01T16:48:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498863365,
|
||
"name": "CVE-2022-30190-NSIS",
|
||
"full_name": "rouben\/CVE-2022-30190-NSIS",
|
||
"owner": {
|
||
"login": "rouben",
|
||
"id": 2985666,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2985666?v=4",
|
||
"html_url": "https:\/\/github.com\/rouben",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rouben\/CVE-2022-30190-NSIS",
|
||
"description": "An NSIS script that helps deploy and roll back the mitigation registry patch for CVE-2022-30190 as recommended by Microsoft",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T18:58:07Z",
|
||
"updated_at": "2022-06-07T08:02:05Z",
|
||
"pushed_at": "2022-06-01T22:23:34Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"microsoft",
|
||
"msdt",
|
||
"nsis"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498888452,
|
||
"name": "Follina-Remediation",
|
||
"full_name": "Cosmo121\/Follina-Remediation",
|
||
"owner": {
|
||
"login": "Cosmo121",
|
||
"id": 3526206,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
|
||
"html_url": "https:\/\/github.com\/Cosmo121",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
|
||
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T20:26:56Z",
|
||
"updated_at": "2023-01-27T20:26:21Z",
|
||
"pushed_at": "2022-10-08T23:22:12Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498904586,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "rayorole\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "rayorole",
|
||
"id": 87602506,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87602506?v=4",
|
||
"html_url": "https:\/\/github.com\/rayorole",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rayorole\/CVE-2022-30190",
|
||
"description": "CVE-2022-30190 or \"Follina\" 0day proof of concept",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T21:33:18Z",
|
||
"updated_at": "2022-06-01T21:36:47Z",
|
||
"pushed_at": "2022-06-01T21:36:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498924006,
|
||
"name": "2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||
"full_name": "ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ImproveCybersecurityJaro",
|
||
"id": 106711305,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106711305?v=4",
|
||
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ImproveCybersecurityJaro\/2022_PoC-MSDT-Follina-CVE-2022-30190",
|
||
"description": "Proof of Concept zu MSDT-Follina - CVE-2022-30190. ÜBERPRÜFUNG DER WIRKSAMKEIT VON MICROSOFT DEFNEDER IN DER JEWEILS AKTUELLSTEN WINDOWS 10 VERSION.",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T23:07:26Z",
|
||
"updated_at": "2022-06-01T23:07:26Z",
|
||
"pushed_at": "2022-06-01T23:30:01Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498927734,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "sudoaza\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "sudoaza",
|
||
"id": 555365,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/555365?v=4",
|
||
"html_url": "https:\/\/github.com\/sudoaza",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sudoaza\/CVE-2022-30190",
|
||
"description": "MS-MSDT Follina CVE-2022-30190 PoC document generator",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T23:27:14Z",
|
||
"updated_at": "2024-08-12T20:23:46Z",
|
||
"pushed_at": "2022-06-01T23:30:26Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 498968929,
|
||
"name": "msdt-disable",
|
||
"full_name": "gamingwithevets\/msdt-disable",
|
||
"owner": {
|
||
"login": "gamingwithevets",
|
||
"id": 88830673,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88830673?v=4",
|
||
"html_url": "https:\/\/github.com\/gamingwithevets",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gamingwithevets\/msdt-disable",
|
||
"description": "MSDT protocol disabler (CVE-2022-30190 patch tool)",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T02:47:34Z",
|
||
"updated_at": "2023-01-27T23:35:56Z",
|
||
"pushed_at": "2022-06-26T10:10:37Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499022838,
|
||
"name": "FollinaScanner",
|
||
"full_name": "ErrorNoInternet\/FollinaScanner",
|
||
"owner": {
|
||
"login": "ErrorNoInternet",
|
||
"id": 61157623,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61157623?v=4",
|
||
"html_url": "https:\/\/github.com\/ErrorNoInternet",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ErrorNoInternet\/FollinaScanner",
|
||
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T06:45:19Z",
|
||
"updated_at": "2024-11-16T19:54:48Z",
|
||
"pushed_at": "2022-09-13T10:05:02Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"antivirus",
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"golang",
|
||
"scanner",
|
||
"vulnerability-scanners"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 24,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499027429,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "ITMarcin2211\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ITMarcin2211",
|
||
"id": 60057530,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
|
||
"html_url": "https:\/\/github.com\/ITMarcin2211",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ITMarcin2211\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-02T07:01:19Z",
|
||
"updated_at": "2023-07-26T14:55:24Z",
|
||
"pushed_at": "2022-06-02T07:04:59Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499073115,
|
||
"name": "mitigate-folina",
|
||
"full_name": "derco0n\/mitigate-folina",
|
||
"owner": {
|
||
"login": "derco0n",
|
||
"id": 13888192,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13888192?v=4",
|
||
"html_url": "https:\/\/github.com\/derco0n",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/derco0n\/mitigate-folina",
|
||
"description": "Mitigates the \"Folina\"-ZeroDay (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T09:30:13Z",
|
||
"updated_at": "2022-06-09T12:18:29Z",
|
||
"pushed_at": "2022-06-08T05:57:31Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499127993,
|
||
"name": "CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"full_name": "komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"owner": {
|
||
"login": "komomon",
|
||
"id": 52700174,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
|
||
"html_url": "https:\/\/github.com\/komomon",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T12:33:18Z",
|
||
"updated_at": "2024-12-12T17:05:24Z",
|
||
"pushed_at": "2023-04-13T16:46:26Z",
|
||
"stargazers_count": 396,
|
||
"watchers_count": 396,
|
||
"has_discussions": false,
|
||
"forks_count": 54,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 54,
|
||
"watchers": 396,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 499136019,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "gyaansastra\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "gyaansastra",
|
||
"id": 35690123,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35690123?v=4",
|
||
"html_url": "https:\/\/github.com\/gyaansastra",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gyaansastra\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-02T12:58:24Z",
|
||
"updated_at": "2024-08-12T20:23:47Z",
|
||
"pushed_at": "2022-06-02T13:00:33Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499137152,
|
||
"name": "CVE-2022-30190-Fix",
|
||
"full_name": "swaiist\/CVE-2022-30190-Fix",
|
||
"owner": {
|
||
"login": "swaiist",
|
||
"id": 67833362,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833362?v=4",
|
||
"html_url": "https:\/\/github.com\/swaiist",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/swaiist\/CVE-2022-30190-Fix",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-02T13:01:46Z",
|
||
"updated_at": "2023-01-09T11:28:21Z",
|
||
"pushed_at": "2022-12-16T15:09:34Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499151925,
|
||
"name": "CVE-2022-30190-Follina-Patch",
|
||
"full_name": "suenerve\/CVE-2022-30190-Follina-Patch",
|
||
"owner": {
|
||
"login": "suenerve",
|
||
"id": 91017265,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91017265?v=4",
|
||
"html_url": "https:\/\/github.com\/suenerve",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/suenerve\/CVE-2022-30190-Follina-Patch",
|
||
"description": "The CVE-2022-30190-follina Workarounds Patch",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T13:43:20Z",
|
||
"updated_at": "2022-07-01T22:07:49Z",
|
||
"pushed_at": "2022-06-05T12:37:12Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"administrator",
|
||
"cmd",
|
||
"cve",
|
||
"cve-2022-30190",
|
||
"exe",
|
||
"microsoft",
|
||
"patch",
|
||
"program",
|
||
"py",
|
||
"python",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499192008,
|
||
"name": "ms-msdt-vulnerability-pdq-package",
|
||
"full_name": "castlesmadeofsand\/ms-msdt-vulnerability-pdq-package",
|
||
"owner": {
|
||
"login": "castlesmadeofsand",
|
||
"id": 50452151,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50452151?v=4",
|
||
"html_url": "https:\/\/github.com\/castlesmadeofsand",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/castlesmadeofsand\/ms-msdt-vulnerability-pdq-package",
|
||
"description": "PDQ Package I created for CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T15:33:15Z",
|
||
"updated_at": "2023-01-27T22:19:43Z",
|
||
"pushed_at": "2022-06-08T21:04:55Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499194094,
|
||
"name": "CVE-2022-30190---Follina---Poc-Exploit",
|
||
"full_name": "WesyHub\/CVE-2022-30190---Follina---Poc-Exploit",
|
||
"owner": {
|
||
"login": "WesyHub",
|
||
"id": 35263085,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35263085?v=4",
|
||
"html_url": "https:\/\/github.com\/WesyHub",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/WesyHub\/CVE-2022-30190---Follina---Poc-Exploit",
|
||
"description": "Simple Follina poc exploit",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T15:39:20Z",
|
||
"updated_at": "2022-10-02T00:23:18Z",
|
||
"pushed_at": "2022-06-03T06:49:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499203683,
|
||
"name": "MS-MSDT-Office-RCE-Follina",
|
||
"full_name": "0xflagplz\/MS-MSDT-Office-RCE-Follina",
|
||
"owner": {
|
||
"login": "0xflagplz",
|
||
"id": 59506742,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59506742?v=4",
|
||
"html_url": "https:\/\/github.com\/0xflagplz",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xflagplz\/MS-MSDT-Office-RCE-Follina",
|
||
"description": "CVE-2022-30190 | MS-MSDT Follina One Click",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T16:09:02Z",
|
||
"updated_at": "2025-01-14T03:51:03Z",
|
||
"pushed_at": "2022-06-03T08:14:10Z",
|
||
"stargazers_count": 21,
|
||
"watchers_count": 21,
|
||
"has_discussions": false,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 21,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499205371,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "arozx\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "arozx",
|
||
"id": 87201477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87201477?v=4",
|
||
"html_url": "https:\/\/github.com\/arozx",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/arozx\/CVE-2022-30190",
|
||
"description": "A very simple MSDT \"Follina\" exploit **patched**",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T16:14:13Z",
|
||
"updated_at": "2023-02-14T18:19:06Z",
|
||
"pushed_at": "2022-11-01T16:53:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"exploit",
|
||
"follina",
|
||
"patched",
|
||
"poc",
|
||
"security",
|
||
"vulnerability",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499331391,
|
||
"name": "follina",
|
||
"full_name": "Noxtal\/follina",
|
||
"owner": {
|
||
"login": "Noxtal",
|
||
"id": 44851191,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44851191?v=4",
|
||
"html_url": "https:\/\/github.com\/Noxtal",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Noxtal\/follina",
|
||
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T00:25:37Z",
|
||
"updated_at": "2025-01-13T07:54:46Z",
|
||
"pushed_at": "2022-08-06T01:04:51Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 24,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499395518,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "droidrzrlover\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "droidrzrlover",
|
||
"id": 19541946,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19541946?v=4",
|
||
"html_url": "https:\/\/github.com\/droidrzrlover",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/droidrzrlover\/CVE-2022-30190",
|
||
"description": "This is to patch CVE-2022-30190. Use at your own risk. ",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T05:52:36Z",
|
||
"updated_at": "2022-06-03T05:53:04Z",
|
||
"pushed_at": "2022-06-03T05:53:02Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499410553,
|
||
"name": "cve-2022-30190-mitigate",
|
||
"full_name": "hilt86\/cve-2022-30190-mitigate",
|
||
"owner": {
|
||
"login": "hilt86",
|
||
"id": 441824,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/441824?v=4",
|
||
"html_url": "https:\/\/github.com\/hilt86",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hilt86\/cve-2022-30190-mitigate",
|
||
"description": "Powershell script to mitigate cve-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T06:54:35Z",
|
||
"updated_at": "2022-06-03T06:55:13Z",
|
||
"pushed_at": "2022-06-03T06:55:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499428287,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "SrikeshMaharaj\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "SrikeshMaharaj",
|
||
"id": 24547010,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24547010?v=4",
|
||
"html_url": "https:\/\/github.com\/SrikeshMaharaj",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SrikeshMaharaj\/CVE-2022-30190",
|
||
"description": "Follina POC by John Hammond",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T08:00:01Z",
|
||
"updated_at": "2023-10-27T01:25:17Z",
|
||
"pushed_at": "2022-06-03T08:04:36Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499846982,
|
||
"name": "Follina",
|
||
"full_name": "AbdulRKB\/Follina",
|
||
"owner": {
|
||
"login": "AbdulRKB",
|
||
"id": 82715493,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82715493?v=4",
|
||
"html_url": "https:\/\/github.com\/AbdulRKB",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AbdulRKB\/Follina",
|
||
"description": "Remote Access Shell for Windows (based on cve-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-04T14:18:38Z",
|
||
"updated_at": "2024-08-12T20:23:50Z",
|
||
"pushed_at": "2024-02-09T17:18:42Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"mstd",
|
||
"reverse-shell",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499922590,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "DerZiad\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "DerZiad",
|
||
"id": 40337316,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40337316?v=4",
|
||
"html_url": "https:\/\/github.com\/DerZiad",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DerZiad\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-04T19:48:37Z",
|
||
"updated_at": "2024-08-12T20:23:51Z",
|
||
"pushed_at": "2023-07-25T07:47:33Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": true,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500045782,
|
||
"name": "CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
|
||
"full_name": "tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
|
||
"owner": {
|
||
"login": "tej7gandhi",
|
||
"id": 13482291,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13482291?v=4",
|
||
"html_url": "https:\/\/github.com\/tej7gandhi",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tej7gandhi\/CVE-2022-30190-Zero-Click-Zero-Day-in-msdt",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-05T08:52:11Z",
|
||
"updated_at": "2022-06-05T08:54:30Z",
|
||
"pushed_at": "2022-06-05T08:54:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500111558,
|
||
"name": "Follina-CVE-2022-30190-POC",
|
||
"full_name": "ItsNee\/Follina-CVE-2022-30190-POC",
|
||
"owner": {
|
||
"login": "ItsNee",
|
||
"id": 28183719,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
|
||
"html_url": "https:\/\/github.com\/ItsNee",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ItsNee\/Follina-CVE-2022-30190-POC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-05T13:54:04Z",
|
||
"updated_at": "2023-02-09T18:20:51Z",
|
||
"pushed_at": "2022-07-04T13:27:13Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500366448,
|
||
"name": "msdt-follina",
|
||
"full_name": "IamVSM\/msdt-follina",
|
||
"owner": {
|
||
"login": "IamVSM",
|
||
"id": 5747913,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5747913?v=4",
|
||
"html_url": "https:\/\/github.com\/IamVSM",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/IamVSM\/msdt-follina",
|
||
"description": "Microsoft MS-MSDT Follina (0-day Vulnerability) CVE-2022-30190 Attack Vector",
|
||
"fork": false,
|
||
"created_at": "2022-06-06T09:17:25Z",
|
||
"updated_at": "2022-06-08T05:08:19Z",
|
||
"pushed_at": "2022-06-06T09:17:28Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500508968,
|
||
"name": "FollinaPatcherCLI",
|
||
"full_name": "Rojacur\/FollinaPatcherCLI",
|
||
"owner": {
|
||
"login": "Rojacur",
|
||
"id": 106988270,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106988270?v=4",
|
||
"html_url": "https:\/\/github.com\/Rojacur",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Rojacur\/FollinaPatcherCLI",
|
||
"description": "Désactivation du protocole MSDT URL (CVE-2022-30190) avec gestion des erreurs et de l'exit code pour un déploiement en masse",
|
||
"fork": false,
|
||
"created_at": "2022-06-06T16:25:41Z",
|
||
"updated_at": "2022-06-06T16:52:06Z",
|
||
"pushed_at": "2022-06-07T11:09:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500786615,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "joshuavanderpoll\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "joshuavanderpoll",
|
||
"id": 16516497,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16516497?v=4",
|
||
"html_url": "https:\/\/github.com\/joshuavanderpoll",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/joshuavanderpoll\/CVE-2022-30190",
|
||
"description": "Microsoft Support Diagnostic Tool (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-07T10:07:52Z",
|
||
"updated_at": "2024-08-12T20:23:55Z",
|
||
"pushed_at": "2022-06-07T10:10:39Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500934660,
|
||
"name": "Follina",
|
||
"full_name": "abhirules27\/Follina",
|
||
"owner": {
|
||
"login": "abhirules27",
|
||
"id": 23321239,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23321239?v=4",
|
||
"html_url": "https:\/\/github.com\/abhirules27",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/abhirules27\/Follina",
|
||
"description": "Notes related to CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-07T17:11:57Z",
|
||
"updated_at": "2022-06-07T17:11:57Z",
|
||
"pushed_at": "2022-06-07T17:14:09Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 501026730,
|
||
"name": "follina-spring",
|
||
"full_name": "dsibilio\/follina-spring",
|
||
"owner": {
|
||
"login": "dsibilio",
|
||
"id": 24280982,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24280982?v=4",
|
||
"html_url": "https:\/\/github.com\/dsibilio",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dsibilio\/follina-spring",
|
||
"description": "Server to host\/activate Follina payloads & generator of malicious Word documents exploiting the MS-MSDT protocol. (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-07T22:46:23Z",
|
||
"updated_at": "2024-04-28T12:49:57Z",
|
||
"pushed_at": "2022-06-14T20:30:12Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"cybersecurity",
|
||
"follina",
|
||
"infosec",
|
||
"java",
|
||
"mesdetty",
|
||
"ms-msdt",
|
||
"msdt",
|
||
"spring",
|
||
"spring-boot"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 501212142,
|
||
"name": "Deathnote",
|
||
"full_name": "Malwareman007\/Deathnote",
|
||
"owner": {
|
||
"login": "Malwareman007",
|
||
"id": 86009160,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
|
||
"html_url": "https:\/\/github.com\/Malwareman007",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Malwareman007\/Deathnote",
|
||
"description": "Proof of Concept of CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-08T10:58:23Z",
|
||
"updated_at": "2024-09-08T14:28:01Z",
|
||
"pushed_at": "2022-10-06T14:49:56Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"has_discussions": false,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"microsoft",
|
||
"msdt",
|
||
"msword",
|
||
"vulnerability",
|
||
"zeroday"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 37,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 501283166,
|
||
"name": "Follina-Workaround-CVE-2022-30190",
|
||
"full_name": "sentrium-security\/Follina-Workaround-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "sentrium-security",
|
||
"id": 53477514,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53477514?v=4",
|
||
"html_url": "https:\/\/github.com\/sentrium-security",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sentrium-security\/Follina-Workaround-CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-08T14:20:50Z",
|
||
"updated_at": "2022-06-08T14:29:37Z",
|
||
"pushed_at": "2022-07-14T16:18:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 501589039,
|
||
"name": "Follina_Exploiter_CLI",
|
||
"full_name": "Hrishikesh7665\/Follina_Exploiter_CLI",
|
||
"owner": {
|
||
"login": "Hrishikesh7665",
|
||
"id": 57979686,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57979686?v=4",
|
||
"html_url": "https:\/\/github.com\/Hrishikesh7665",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Hrishikesh7665\/Follina_Exploiter_CLI",
|
||
"description": "Exploit Microsoft Zero-Day Vulnerability Follina (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-09T09:32:10Z",
|
||
"updated_at": "2024-12-31T05:22:20Z",
|
||
"pushed_at": "2022-06-16T07:28:13Z",
|
||
"stargazers_count": 30,
|
||
"watchers_count": 30,
|
||
"has_discussions": false,
|
||
"forks_count": 12,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"exploit",
|
||
"follina",
|
||
"micorsoft-office",
|
||
"microsoft",
|
||
"msdt",
|
||
"rce",
|
||
"remote-code-execution",
|
||
"word"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 12,
|
||
"watchers": 30,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 501598812,
|
||
"name": "Clickstudio-compromised-certificate",
|
||
"full_name": "b401\/Clickstudio-compromised-certificate",
|
||
"owner": {
|
||
"login": "b401",
|
||
"id": 41926529,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41926529?v=4",
|
||
"html_url": "https:\/\/github.com\/b401",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/b401\/Clickstudio-compromised-certificate",
|
||
"description": "Repository containing the compromised certificate seen in recent CVE-2022-30190 (Follina) attacks.",
|
||
"fork": false,
|
||
"created_at": "2022-06-09T10:03:06Z",
|
||
"updated_at": "2024-02-03T15:41:02Z",
|
||
"pushed_at": "2022-06-09T10:06:41Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 501848298,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "k508\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "k508",
|
||
"id": 44594320,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44594320?v=4",
|
||
"html_url": "https:\/\/github.com\/k508",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/k508\/CVE-2022-30190",
|
||
"description": "Mitigation for CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-10T00:23:11Z",
|
||
"updated_at": "2022-06-10T00:25:47Z",
|
||
"pushed_at": "2022-06-10T00:33:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502082566,
|
||
"name": "follina_cve_2022-30190",
|
||
"full_name": "amitniz\/follina_cve_2022-30190",
|
||
"owner": {
|
||
"login": "amitniz",
|
||
"id": 25344020,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25344020?v=4",
|
||
"html_url": "https:\/\/github.com\/amitniz",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/amitniz\/follina_cve_2022-30190",
|
||
"description": "proof of concept to CVE-2022-30190 (follina)",
|
||
"fork": false,
|
||
"created_at": "2022-06-10T14:57:17Z",
|
||
"updated_at": "2024-01-13T07:28:10Z",
|
||
"pushed_at": "2022-06-11T19:12:53Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"exploit",
|
||
"follina",
|
||
"poc",
|
||
"remote-shell"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502110629,
|
||
"name": "CVE-2022-30190-Analysis-With-LetsDefends-Lab",
|
||
"full_name": "Abdibimantara\/CVE-2022-30190-Analysis-With-LetsDefends-Lab",
|
||
"owner": {
|
||
"login": "Abdibimantara",
|
||
"id": 43168046,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43168046?v=4",
|
||
"html_url": "https:\/\/github.com\/Abdibimantara",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Abdibimantara\/CVE-2022-30190-Analysis-With-LetsDefends-Lab",
|
||
"description": "this is my simple article about CVE 2022-30190 (Follina) analysis. I use the lab from Letsdefend.",
|
||
"fork": false,
|
||
"created_at": "2022-06-10T16:29:07Z",
|
||
"updated_at": "2022-06-10T16:29:07Z",
|
||
"pushed_at": "2022-06-10T16:37:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502326888,
|
||
"name": "CVE-2022-30190_Temporary_Fix",
|
||
"full_name": "SrCroqueta\/CVE-2022-30190_Temporary_Fix",
|
||
"owner": {
|
||
"login": "SrCroqueta",
|
||
"id": 32432079,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32432079?v=4",
|
||
"html_url": "https:\/\/github.com\/SrCroqueta",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SrCroqueta\/CVE-2022-30190_Temporary_Fix",
|
||
"description": "These are two Python scripts compiled to easily and quickly apply temporary protection against the CVE-2022-30190 vulnerability (Follina)",
|
||
"fork": false,
|
||
"created_at": "2022-06-11T11:16:56Z",
|
||
"updated_at": "2022-06-15T10:21:00Z",
|
||
"pushed_at": "2022-06-26T17:27:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 502600692,
|
||
"name": "CVE-2022-30190_Temporary_Fix_Source_Code",
|
||
"full_name": "SrCroqueta\/CVE-2022-30190_Temporary_Fix_Source_Code",
|
||
"owner": {
|
||
"login": "SrCroqueta",
|
||
"id": 32432079,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32432079?v=4",
|
||
"html_url": "https:\/\/github.com\/SrCroqueta",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SrCroqueta\/CVE-2022-30190_Temporary_Fix_Source_Code",
|
||
"description": "These are the source codes of the Python scripts to apply the temporary protection against the CVE-2022-30190 vulnerability (Follina)",
|
||
"fork": false,
|
||
"created_at": "2022-06-12T11:48:22Z",
|
||
"updated_at": "2022-06-15T10:20:20Z",
|
||
"pushed_at": "2022-06-21T17:29:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 502803172,
|
||
"name": "Follina-CVE-2022-30190-Unofficial-patch",
|
||
"full_name": "SonicWave21\/Follina-CVE-2022-30190-Unofficial-patch",
|
||
"owner": {
|
||
"login": "SonicWave21",
|
||
"id": 107382379,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107382379?v=4",
|
||
"html_url": "https:\/\/github.com\/SonicWave21",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/SonicWave21\/Follina-CVE-2022-30190-Unofficial-patch",
|
||
"description": "An Unofficial Patch Follina CVE-2022-30190 (patch) by micrisoft Guidelines.",
|
||
"fork": false,
|
||
"created_at": "2022-06-13T04:20:02Z",
|
||
"updated_at": "2024-08-12T20:24:05Z",
|
||
"pushed_at": "2022-06-14T13:32:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"batch",
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"microsoft",
|
||
"ms-msdt",
|
||
"patch",
|
||
"windows-10",
|
||
"windows-11",
|
||
"zero-day"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 502856771,
|
||
"name": "PicusSecurity4.Week.Repo",
|
||
"full_name": "nanaao\/PicusSecurity4.Week.Repo",
|
||
"owner": {
|
||
"login": "nanaao",
|
||
"id": 77666853,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/77666853?v=4",
|
||
"html_url": "https:\/\/github.com\/nanaao",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nanaao\/PicusSecurity4.Week.Repo",
|
||
"description": "CVE-2022-30190 : CVE 0-day MS Offic RCE aka msdt follina ",
|
||
"fork": false,
|
||
"created_at": "2022-06-13T07:46:29Z",
|
||
"updated_at": "2024-08-12T20:24:06Z",
|
||
"pushed_at": "2022-06-12T20:45:42Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 503121339,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "XxToxicScriptxX\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "XxToxicScriptxX",
|
||
"id": 72946006,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72946006?v=4",
|
||
"html_url": "https:\/\/github.com\/XxToxicScriptxX",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/XxToxicScriptxX\/CVE-2022-30190",
|
||
"description": "Python file scanner created in 2021 scanning for known and potential vulns",
|
||
"fork": false,
|
||
"created_at": "2022-06-13T21:32:45Z",
|
||
"updated_at": "2022-06-13T21:36:40Z",
|
||
"pushed_at": "2022-06-13T21:36:37Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503273195,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "ernestak\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ernestak",
|
||
"id": 97414565,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97414565?v=4",
|
||
"html_url": "https:\/\/github.com\/ernestak",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ernestak\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-14T08:29:40Z",
|
||
"updated_at": "2024-08-12T20:24:08Z",
|
||
"pushed_at": "2022-06-14T08:44:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503292025,
|
||
"name": "Sigma-Rule-for-CVE-2022-30190",
|
||
"full_name": "ernestak\/Sigma-Rule-for-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ernestak",
|
||
"id": 97414565,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97414565?v=4",
|
||
"html_url": "https:\/\/github.com\/ernestak",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ernestak\/Sigma-Rule-for-CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-14T09:27:37Z",
|
||
"updated_at": "2022-06-14T09:27:37Z",
|
||
"pushed_at": "2022-06-14T09:27:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503586593,
|
||
"name": "FollinaExtractor",
|
||
"full_name": "MalwareTech\/FollinaExtractor",
|
||
"owner": {
|
||
"login": "MalwareTech",
|
||
"id": 7256561,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7256561?v=4",
|
||
"html_url": "https:\/\/github.com\/MalwareTech",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MalwareTech\/FollinaExtractor",
|
||
"description": "Extract payload URLs from Follina (CVE-2022-30190) docx and rtf files",
|
||
"fork": false,
|
||
"created_at": "2022-06-15T02:22:53Z",
|
||
"updated_at": "2024-10-28T18:14:27Z",
|
||
"pushed_at": "2022-06-15T02:24:00Z",
|
||
"stargazers_count": 31,
|
||
"watchers_count": 31,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 31,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 503694177,
|
||
"name": "follina-CVE-2022-30190",
|
||
"full_name": "notherealhazard\/follina-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "notherealhazard",
|
||
"id": 106530435,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106530435?v=4",
|
||
"html_url": "https:\/\/github.com\/notherealhazard",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/notherealhazard\/follina-CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-15T09:13:05Z",
|
||
"updated_at": "2022-06-15T09:15:12Z",
|
||
"pushed_at": "2022-06-15T11:01:19Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 503944049,
|
||
"name": "follina-CVE-2022-30190",
|
||
"full_name": "Cerebrovinny\/follina-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "Cerebrovinny",
|
||
"id": 52631834,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52631834?v=4",
|
||
"html_url": "https:\/\/github.com\/Cerebrovinny",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cerebrovinny\/follina-CVE-2022-30190",
|
||
"description": "follina zero day vulnerability to help Microsoft to mitigate the attack",
|
||
"fork": false,
|
||
"created_at": "2022-06-15T22:49:21Z",
|
||
"updated_at": "2022-06-16T00:04:19Z",
|
||
"pushed_at": "2022-06-16T00:04:16Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 507979018,
|
||
"name": "go_follina",
|
||
"full_name": "Zitchev\/go_follina",
|
||
"owner": {
|
||
"login": "Zitchev",
|
||
"id": 61007904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007904?v=4",
|
||
"html_url": "https:\/\/github.com\/Zitchev",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zitchev\/go_follina",
|
||
"description": "Follina (CVE-2022-30190) proof-of-concept",
|
||
"fork": false,
|
||
"created_at": "2022-06-27T16:14:34Z",
|
||
"updated_at": "2023-07-26T14:55:32Z",
|
||
"pushed_at": "2023-02-21T19:21:48Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 508614565,
|
||
"name": "CVE-2022-30190_EXP_PowerPoint",
|
||
"full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||
"owner": {
|
||
"login": "Gra3s",
|
||
"id": 76804515,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4",
|
||
"html_url": "https:\/\/github.com\/Gra3s",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||
"description": "This is exploit of CVE-2022-30190 on PowerPoint.",
|
||
"fork": false,
|
||
"created_at": "2022-06-29T08:48:12Z",
|
||
"updated_at": "2024-08-12T20:24:36Z",
|
||
"pushed_at": "2023-03-23T03:18:46Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 516257756,
|
||
"name": "Follina-MSDT-Vulnerability-CVE-2022-30190-",
|
||
"full_name": "EkamSinghWalia\/Follina-MSDT-Vulnerability-CVE-2022-30190-",
|
||
"owner": {
|
||
"login": "EkamSinghWalia",
|
||
"id": 106553324,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106553324?v=4",
|
||
"html_url": "https:\/\/github.com\/EkamSinghWalia",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/EkamSinghWalia\/Follina-MSDT-Vulnerability-CVE-2022-30190-",
|
||
"description": "Detection and Remediation of the Follina MSDT Vulnerability (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-07-21T06:49:44Z",
|
||
"updated_at": "2024-07-04T03:35:20Z",
|
||
"pushed_at": "2022-07-22T15:00:30Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 520189959,
|
||
"name": "five-nights-at-follina-s",
|
||
"full_name": "jeffreybxu\/five-nights-at-follina-s",
|
||
"owner": {
|
||
"login": "jeffreybxu",
|
||
"id": 19352690,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19352690?v=4",
|
||
"html_url": "https:\/\/github.com\/jeffreybxu",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jeffreybxu\/five-nights-at-follina-s",
|
||
"description": "A Fullstack Academy Cybersecurity project examining the full cycle of the Follina (CVE-2022-30190) vulnerability, from exploit to detection and defense.",
|
||
"fork": false,
|
||
"created_at": "2022-08-01T16:47:50Z",
|
||
"updated_at": "2024-09-10T23:02:11Z",
|
||
"pushed_at": "2022-08-05T16:16:13Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 525371313,
|
||
"name": "Follina-CVE-2022-30190-PoC-sample",
|
||
"full_name": "Captain404\/Follina-CVE-2022-30190-PoC-sample",
|
||
"owner": {
|
||
"login": "Captain404",
|
||
"id": 58698256,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58698256?v=4",
|
||
"html_url": "https:\/\/github.com\/Captain404",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Captain404\/Follina-CVE-2022-30190-PoC-sample",
|
||
"description": "Educational Follina PoC Tool",
|
||
"fork": false,
|
||
"created_at": "2022-08-16T12:32:33Z",
|
||
"updated_at": "2022-08-16T12:34:43Z",
|
||
"pushed_at": "2022-08-16T12:48:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 537107690,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "winstxnhdw\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "winstxnhdw",
|
||
"id": 56998716,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56998716?v=4",
|
||
"html_url": "https:\/\/github.com\/winstxnhdw",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
|
||
"description": "A proof of concept for CVE-2022-30190 (Follina).",
|
||
"fork": false,
|
||
"created_at": "2022-09-15T16:12:57Z",
|
||
"updated_at": "2023-08-29T16:29:42Z",
|
||
"pushed_at": "2024-03-01T16:26:36Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-40444",
|
||
"follina",
|
||
"msdt",
|
||
"remote-code-execution",
|
||
"trojan"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 546628423,
|
||
"name": "Follina-attack-CVE-2022-30190-",
|
||
"full_name": "Imeneallouche\/Follina-attack-CVE-2022-30190-",
|
||
"owner": {
|
||
"login": "Imeneallouche",
|
||
"id": 89279264,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89279264?v=4",
|
||
"html_url": "https:\/\/github.com\/Imeneallouche",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Imeneallouche\/Follina-attack-CVE-2022-30190-",
|
||
"description": "this is a demo attack of FOLLINA exploit , a vulnerability that has been discovered in May 2022 and stood unpatched until June 2022",
|
||
"fork": false,
|
||
"created_at": "2022-10-06T11:41:43Z",
|
||
"updated_at": "2022-10-06T15:42:31Z",
|
||
"pushed_at": "2022-10-06T21:22:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": true,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 564441217,
|
||
"name": "CVE-Smackdown",
|
||
"full_name": "mattjmillner\/CVE-Smackdown",
|
||
"owner": {
|
||
"login": "mattjmillner",
|
||
"id": 56142300,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56142300?v=4",
|
||
"html_url": "https:\/\/github.com\/mattjmillner",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mattjmillner\/CVE-Smackdown",
|
||
"description": "Implementation of CVE-2022-30190 in C",
|
||
"fork": false,
|
||
"created_at": "2022-11-10T18:15:57Z",
|
||
"updated_at": "2022-11-10T18:15:57Z",
|
||
"pushed_at": "2022-11-10T18:59:57Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 568186569,
|
||
"name": "FollinaXploit",
|
||
"full_name": "0xAbbarhSF\/FollinaXploit",
|
||
"owner": {
|
||
"login": "0xAbbarhSF",
|
||
"id": 67552744,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67552744?v=4",
|
||
"html_url": "https:\/\/github.com\/0xAbbarhSF",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xAbbarhSF\/FollinaXploit",
|
||
"description": "A Command Line based python tool for exploit Zero-Day vulnerability in MSDT (Microsoft Support Diagnostic Tool) also know as 'Follina' CVE-2022-30190.",
|
||
"fork": false,
|
||
"created_at": "2022-11-19T18:09:47Z",
|
||
"updated_at": "2025-01-04T18:22:36Z",
|
||
"pushed_at": "2022-11-19T18:41:57Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 582283998,
|
||
"name": "Cve-2022-30190",
|
||
"full_name": "michealadams30\/Cve-2022-30190",
|
||
"owner": {
|
||
"login": "michealadams30",
|
||
"id": 113975732,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/113975732?v=4",
|
||
"html_url": "https:\/\/github.com\/michealadams30",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/michealadams30\/Cve-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-12-26T10:29:46Z",
|
||
"updated_at": "2023-07-26T14:55:23Z",
|
||
"pushed_at": "2022-12-26T10:32:31Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 583330434,
|
||
"name": "Enterprise-Cybersecurity",
|
||
"full_name": "melting0256\/Enterprise-Cybersecurity",
|
||
"owner": {
|
||
"login": "melting0256",
|
||
"id": 103974176,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103974176?v=4",
|
||
"html_url": "https:\/\/github.com\/melting0256",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/melting0256\/Enterprise-Cybersecurity",
|
||
"description": "CVE-2022-30190(follina)",
|
||
"fork": false,
|
||
"created_at": "2022-12-29T13:06:16Z",
|
||
"updated_at": "2023-07-26T14:55:21Z",
|
||
"pushed_at": "2022-12-29T13:08:39Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 601379517,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "yrkuo\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "yrkuo",
|
||
"id": 39819798,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39819798?v=4",
|
||
"html_url": "https:\/\/github.com\/yrkuo",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yrkuo\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-02-13T23:58:58Z",
|
||
"updated_at": "2023-12-25T12:02:49Z",
|
||
"pushed_at": "2023-02-14T01:29:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 613736106,
|
||
"name": "FOLLINA-CVE-2022-30190",
|
||
"full_name": "ToxicEnvelope\/FOLLINA-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ToxicEnvelope",
|
||
"id": 23465872,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4",
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope\/FOLLINA-CVE-2022-30190",
|
||
"description": "Implementation of FOLLINA-CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2023-03-14T07:00:47Z",
|
||
"updated_at": "2024-06-20T18:44:33Z",
|
||
"pushed_at": "2023-08-27T09:39:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 635211834,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "hycheng15\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "hycheng15",
|
||
"id": 74200918,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74200918?v=4",
|
||
"html_url": "https:\/\/github.com\/hycheng15",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hycheng15\/CVE-2022-30190",
|
||
"description": "An exploitation of CVE-2022-30190 (Follina)",
|
||
"fork": false,
|
||
"created_at": "2023-05-02T07:56:28Z",
|
||
"updated_at": "2023-07-26T14:55:29Z",
|
||
"pushed_at": "2023-11-14T10:19:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 640555631,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "aminetitrofine\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "aminetitrofine",
|
||
"id": 70074517,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/70074517?v=4",
|
||
"html_url": "https:\/\/github.com\/aminetitrofine",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aminetitrofine\/CVE-2022-30190",
|
||
"description": "Follina (CVE-2022-30190) is a Microsoft Office zero-day vulnerability that has recently been discovered. It’s a high-severity vulnerability that hackers can leverage for remote code execution (RCE) attacks.",
|
||
"fork": false,
|
||
"created_at": "2023-05-14T13:38:43Z",
|
||
"updated_at": "2025-01-05T21:18:32Z",
|
||
"pushed_at": "2023-05-14T13:45:18Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 7,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 667473352,
|
||
"name": "Follina_MSDT_CVE-2022-30190",
|
||
"full_name": "Muhammad-Ali007\/Follina_MSDT_CVE-2022-30190",
|
||
"owner": {
|
||
"login": "Muhammad-Ali007",
|
||
"id": 64638296,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/64638296?v=4",
|
||
"html_url": "https:\/\/github.com\/Muhammad-Ali007",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Muhammad-Ali007\/Follina_MSDT_CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2023-07-17T15:24:54Z",
|
||
"updated_at": "2024-04-20T01:38:09Z",
|
||
"pushed_at": "2023-07-18T20:13:14Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 724428602,
|
||
"name": "AmzWord",
|
||
"full_name": "Jump-Wang-111\/AmzWord",
|
||
"owner": {
|
||
"login": "Jump-Wang-111",
|
||
"id": 69379868,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69379868?v=4",
|
||
"html_url": "https:\/\/github.com\/Jump-Wang-111",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Jump-Wang-111\/AmzWord",
|
||
"description": "An automated attack chain based on CVE-2022-30190, 163 email backdoor, and image steganography.",
|
||
"fork": false,
|
||
"created_at": "2023-11-28T03:47:32Z",
|
||
"updated_at": "2024-09-04T02:59:22Z",
|
||
"pushed_at": "2023-11-28T10:16:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 758899750,
|
||
"name": "ZipScan",
|
||
"full_name": "shri142\/ZipScan",
|
||
"owner": {
|
||
"login": "shri142",
|
||
"id": 81535914,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81535914?v=4",
|
||
"html_url": "https:\/\/github.com\/shri142",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shri142\/ZipScan",
|
||
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2024-02-17T12:10:12Z",
|
||
"updated_at": "2024-02-24T17:59:28Z",
|
||
"pushed_at": "2024-02-24T17:59:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 784462275,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "alien-keric\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "alien-keric",
|
||
"id": 102582785,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102582785?v=4",
|
||
"html_url": "https:\/\/github.com\/alien-keric",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alien-keric\/CVE-2022-30190",
|
||
"description": "The script is from https:\/\/github.com\/JohnHammond\/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link",
|
||
"fork": false,
|
||
"created_at": "2024-04-09T22:40:09Z",
|
||
"updated_at": "2024-04-10T01:26:23Z",
|
||
"pushed_at": "2024-04-09T22:41:53Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 831490675,
|
||
"name": "Follina-CVE-2022-30190-Sample",
|
||
"full_name": "ethicalblue\/Follina-CVE-2022-30190-Sample",
|
||
"owner": {
|
||
"login": "ethicalblue",
|
||
"id": 82314652,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82314652?v=4",
|
||
"html_url": "https:\/\/github.com\/ethicalblue",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ethicalblue\/Follina-CVE-2022-30190-Sample",
|
||
"description": "Educational exploit for CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2024-07-20T17:50:48Z",
|
||
"updated_at": "2024-07-20T19:56:33Z",
|
||
"pushed_at": "2024-07-20T18:23:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |