mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 21:02:22 +01:00
416 lines
No EOL
15 KiB
JSON
416 lines
No EOL
15 KiB
JSON
[
|
|
{
|
|
"id": 103382657,
|
|
"name": "CVE-2017-8759-Exploit-sample",
|
|
"full_name": "Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"owner": {
|
|
"login": "Voulnet",
|
|
"id": 1334847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1334847?v=4",
|
|
"html_url": "https:\/\/github.com\/Voulnet"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"description": "Running CVE-2017-8759 exploit sample.",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T09:50:04Z",
|
|
"updated_at": "2021-02-24T08:50:34Z",
|
|
"pushed_at": "2020-01-23T06:53:00Z",
|
|
"stargazers_count": 259,
|
|
"watchers_count": 259,
|
|
"forks_count": 112,
|
|
"forks": 112,
|
|
"watchers": 259,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103416775,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "nccgroup\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "nccgroup",
|
|
"id": 4067082,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
|
|
"html_url": "https:\/\/github.com\/nccgroup"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759",
|
|
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T15:24:10Z",
|
|
"updated_at": "2021-06-11T19:04:54Z",
|
|
"pushed_at": "2017-09-19T18:06:41Z",
|
|
"stargazers_count": 95,
|
|
"watchers_count": 95,
|
|
"forks_count": 50,
|
|
"forks": 50,
|
|
"watchers": 95,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103428172,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "vysecurity\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "vysecurity",
|
|
"id": 3596242,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
|
"html_url": "https:\/\/github.com\/vysecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T17:10:18Z",
|
|
"updated_at": "2021-06-11T19:17:58Z",
|
|
"pushed_at": "2017-09-14T10:18:40Z",
|
|
"stargazers_count": 172,
|
|
"watchers_count": 172,
|
|
"forks_count": 85,
|
|
"forks": 85,
|
|
"watchers": 172,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103447049,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "BasuCert\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "BasuCert",
|
|
"id": 29852431,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
|
"html_url": "https:\/\/github.com\/BasuCert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 Research",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T20:27:29Z",
|
|
"updated_at": "2020-05-18T10:42:14Z",
|
|
"pushed_at": "2017-09-15T13:14:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103447404,
|
|
"name": "CVE-2017-8759-Exploit-sample2",
|
|
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
|
"owner": {
|
|
"login": "tahisaad6",
|
|
"id": 21042116,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
|
|
"html_url": "https:\/\/github.com\/tahisaad6"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-13T20:31:43Z",
|
|
"updated_at": "2017-09-13T20:31:43Z",
|
|
"pushed_at": "2017-09-13T20:31:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103493845,
|
|
"name": "CVE-2017-8759_-SOAP_WSDL",
|
|
"full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
|
"owner": {
|
|
"login": "homjxi0e",
|
|
"id": 25440152,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
|
"html_url": "https:\/\/github.com\/homjxi0e"
|
|
},
|
|
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
|
"description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5",
|
|
"fork": false,
|
|
"created_at": "2017-09-14T06:20:28Z",
|
|
"updated_at": "2018-11-16T12:24:03Z",
|
|
"pushed_at": "2017-09-21T16:41:37Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103517315,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "bhdresh\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759",
|
|
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-09-14T10:04:39Z",
|
|
"updated_at": "2021-07-02T19:20:00Z",
|
|
"pushed_at": "2018-09-10T16:25:12Z",
|
|
"stargazers_count": 312,
|
|
"watchers_count": 312,
|
|
"forks_count": 122,
|
|
"forks": 122,
|
|
"watchers": 312,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103595749,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "Lz1y\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "Lz1y",
|
|
"id": 23468993,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4",
|
|
"html_url": "https:\/\/github.com\/Lz1y"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-15T00:36:17Z",
|
|
"updated_at": "2021-01-08T03:56:13Z",
|
|
"pushed_at": "2017-12-28T07:16:15Z",
|
|
"stargazers_count": 84,
|
|
"watchers_count": 84,
|
|
"forks_count": 50,
|
|
"forks": 50,
|
|
"watchers": 84,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103865283,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "JonasUliana\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "JonasUliana",
|
|
"id": 29503841,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4",
|
|
"html_url": "https:\/\/github.com\/JonasUliana"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759",
|
|
"description": "Simple C# implementation of CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-17T22:05:56Z",
|
|
"updated_at": "2018-11-16T12:24:03Z",
|
|
"pushed_at": "2017-09-17T22:20:36Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103896322,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "Securitykid\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "Securitykid",
|
|
"id": 30798606,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30798606?v=4",
|
|
"html_url": "https:\/\/github.com\/Securitykid"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Securitykid\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-18T05:35:57Z",
|
|
"updated_at": "2017-09-18T05:35:57Z",
|
|
"pushed_at": "2017-09-18T05:35:58Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104033989,
|
|
"name": "CVE-2017-8759-exploits",
|
|
"full_name": "ashr\/CVE-2017-8759-exploits",
|
|
"owner": {
|
|
"login": "ashr",
|
|
"id": 171286,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4",
|
|
"html_url": "https:\/\/github.com\/ashr"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits",
|
|
"description": "Two versions of CVE-2017-8759 exploits",
|
|
"fork": false,
|
|
"created_at": "2017-09-19T06:12:10Z",
|
|
"updated_at": "2020-04-07T05:43:28Z",
|
|
"pushed_at": "2017-09-19T06:19:54Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104625403,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "l0n3rs\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "l0n3rs",
|
|
"id": 31120718,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
|
|
"html_url": "https:\/\/github.com\/l0n3rs"
|
|
},
|
|
"html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-24T06:58:55Z",
|
|
"updated_at": "2017-09-24T06:58:55Z",
|
|
"pushed_at": "2017-09-24T06:59:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 161397133,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "ChaitanyaHaritash\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "ChaitanyaHaritash",
|
|
"id": 16261173,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16261173?v=4",
|
|
"html_url": "https:\/\/github.com\/ChaitanyaHaritash"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-8759",
|
|
"description": "Just My ports of CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2018-12-11T21:39:39Z",
|
|
"updated_at": "2020-10-27T03:30:41Z",
|
|
"pushed_at": "2018-12-11T22:02:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 188365315,
|
|
"name": "CVE-2017-8759Expoit",
|
|
"full_name": "smashinu\/CVE-2017-8759Expoit",
|
|
"owner": {
|
|
"login": "smashinu",
|
|
"id": 30433218,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30433218?v=4",
|
|
"html_url": "https:\/\/github.com\/smashinu"
|
|
},
|
|
"html_url": "https:\/\/github.com\/smashinu\/CVE-2017-8759Expoit",
|
|
"description": "yehnah",
|
|
"fork": false,
|
|
"created_at": "2019-05-24T06:29:45Z",
|
|
"updated_at": "2019-05-30T02:01:34Z",
|
|
"pushed_at": "2019-05-30T02:01:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 193617602,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "adeljck\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "adeljck",
|
|
"id": 24542600,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24542600?v=4",
|
|
"html_url": "https:\/\/github.com\/adeljck"
|
|
},
|
|
"html_url": "https:\/\/github.com\/adeljck\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 微软word漏洞利用脚本",
|
|
"fork": false,
|
|
"created_at": "2019-06-25T02:17:04Z",
|
|
"updated_at": "2019-06-25T02:17:51Z",
|
|
"pushed_at": "2019-06-25T02:17:50Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 231332316,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "zhengkook\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "zhengkook",
|
|
"id": 32629417,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32629417?v=4",
|
|
"html_url": "https:\/\/github.com\/zhengkook"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zhengkook\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 use file",
|
|
"fork": false,
|
|
"created_at": "2020-01-02T07:43:19Z",
|
|
"updated_at": "2020-01-02T07:45:48Z",
|
|
"pushed_at": "2020-01-02T07:45:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 263371988,
|
|
"name": "SNP",
|
|
"full_name": "varunsaru\/SNP",
|
|
"owner": {
|
|
"login": "varunsaru",
|
|
"id": 39478192,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39478192?v=4",
|
|
"html_url": "https:\/\/github.com\/varunsaru"
|
|
},
|
|
"html_url": "https:\/\/github.com\/varunsaru\/SNP",
|
|
"description": "CVE-2017-8759 || report related with execute code vulnerability",
|
|
"fork": false,
|
|
"created_at": "2020-05-12T15:11:42Z",
|
|
"updated_at": "2020-05-12T18:14:25Z",
|
|
"pushed_at": "2020-05-12T18:14:23Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 263384480,
|
|
"name": "OHTS",
|
|
"full_name": "GayashanM\/OHTS",
|
|
"owner": {
|
|
"login": "GayashanM",
|
|
"id": 42294440,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42294440?v=4",
|
|
"html_url": "https:\/\/github.com\/GayashanM"
|
|
},
|
|
"html_url": "https:\/\/github.com\/GayashanM\/OHTS",
|
|
"description": "CVE-2017-8759 | .NET Framework Remote Code Execution Vulnerability",
|
|
"fork": false,
|
|
"created_at": "2020-05-12T16:00:39Z",
|
|
"updated_at": "2020-05-13T17:30:30Z",
|
|
"pushed_at": "2020-05-13T17:30:28Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |