mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-29 11:04:12 +01:00
480 lines
No EOL
16 KiB
JSON
480 lines
No EOL
16 KiB
JSON
[
|
||
{
|
||
"id": 404270939,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "ozergoker\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "ozergoker",
|
||
"id": 86879266,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86879266?v=4",
|
||
"html_url": "https:\/\/github.com\/ozergoker"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ozergoker\/CVE-2021-40444",
|
||
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
|
||
"fork": false,
|
||
"created_at": "2021-09-08T08:32:40Z",
|
||
"updated_at": "2022-01-09T21:16:38Z",
|
||
"pushed_at": "2021-09-29T11:39:26Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 18,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 405152543,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "lockedbyte\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "lockedbyte",
|
||
"id": 37779789,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
|
||
"html_url": "https:\/\/github.com\/lockedbyte"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 PoC",
|
||
"fork": false,
|
||
"created_at": "2021-09-10T16:55:53Z",
|
||
"updated_at": "2022-01-26T20:35:23Z",
|
||
"pushed_at": "2021-12-25T18:31:02Z",
|
||
"stargazers_count": 1352,
|
||
"watchers_count": 1352,
|
||
"forks_count": 444,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 444,
|
||
"watchers": 1352,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 405716870,
|
||
"name": "CVE-2021-40444_builders",
|
||
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
|
||
"owner": {
|
||
"login": "aslitsecurity",
|
||
"id": 9478055,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
|
||
"html_url": "https:\/\/github.com\/aslitsecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
|
||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||
"fork": false,
|
||
"created_at": "2021-09-12T18:05:53Z",
|
||
"updated_at": "2022-01-11T07:03:02Z",
|
||
"pushed_at": "2021-10-11T20:53:19Z",
|
||
"stargazers_count": 161,
|
||
"watchers_count": 161,
|
||
"forks_count": 44,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 44,
|
||
"watchers": 161,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 406942491,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "klezVirus\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "klezVirus",
|
||
"id": 8959898,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
|
||
"html_url": "https:\/\/github.com\/klezVirus"
|
||
},
|
||
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||
"fork": false,
|
||
"created_at": "2021-09-15T22:34:35Z",
|
||
"updated_at": "2022-01-26T10:45:46Z",
|
||
"pushed_at": "2021-10-12T23:05:07Z",
|
||
"stargazers_count": 565,
|
||
"watchers_count": 565,
|
||
"forks_count": 124,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"0day",
|
||
"cve-2021-40444",
|
||
"msword",
|
||
"office",
|
||
"rce",
|
||
"remote-code-execution"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 124,
|
||
"watchers": 565,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 407245865,
|
||
"name": "CVE-2021-40444-URL-Extractor",
|
||
"full_name": "gh0stxplt\/CVE-2021-40444-URL-Extractor",
|
||
"owner": {
|
||
"login": "gh0stxplt",
|
||
"id": 87348587,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87348587?v=4",
|
||
"html_url": "https:\/\/github.com\/gh0stxplt"
|
||
},
|
||
"html_url": "https:\/\/github.com\/gh0stxplt\/CVE-2021-40444-URL-Extractor",
|
||
"description": "Python script to extract embedded URLs from doc files (.docx, .docm, .rtf)",
|
||
"fork": false,
|
||
"created_at": "2021-09-16T16:54:50Z",
|
||
"updated_at": "2021-09-20T19:01:48Z",
|
||
"pushed_at": "2021-09-20T19:01:46Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-40444",
|
||
"python"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 408221589,
|
||
"name": "CVE-2021-40444--CABless",
|
||
"full_name": "Edubr2020\/CVE-2021-40444--CABless",
|
||
"owner": {
|
||
"login": "Edubr2020",
|
||
"id": 60452468,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60452468?v=4",
|
||
"html_url": "https:\/\/github.com\/Edubr2020"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Edubr2020\/CVE-2021-40444--CABless",
|
||
"description": "Modified code so that we don´t need to rely on CAB archives",
|
||
"fork": false,
|
||
"created_at": "2021-09-19T19:46:28Z",
|
||
"updated_at": "2022-01-26T02:40:12Z",
|
||
"pushed_at": "2021-09-22T20:07:51Z",
|
||
"stargazers_count": 98,
|
||
"watchers_count": 98,
|
||
"forks_count": 24,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 24,
|
||
"watchers": 98,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 409931314,
|
||
"name": "CVE-2021-40444_CAB_archives",
|
||
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
|
||
"owner": {
|
||
"login": "kal1gh0st",
|
||
"id": 56889513,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
|
||
"html_url": "https:\/\/github.com\/kal1gh0st"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
|
||
"description": "CVE 2021 40444 Windows Exploit services.dll",
|
||
"fork": false,
|
||
"created_at": "2021-09-24T10:59:34Z",
|
||
"updated_at": "2021-12-15T00:43:34Z",
|
||
"pushed_at": "2021-10-21T09:46:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 411631202,
|
||
"name": "Docx-Exploit-2021",
|
||
"full_name": "LazarusReborn\/Docx-Exploit-2021",
|
||
"owner": {
|
||
"login": "LazarusReborn",
|
||
"id": 89079373,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89079373?v=4",
|
||
"html_url": "https:\/\/github.com\/LazarusReborn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/LazarusReborn\/Docx-Exploit-2021",
|
||
"description": "This docx exploit uses res files inside Microsoft .docx file to execute malicious files. This exploit is related to CVE-2021-40444",
|
||
"fork": false,
|
||
"created_at": "2021-09-29T10:35:55Z",
|
||
"updated_at": "2021-11-08T17:41:50Z",
|
||
"pushed_at": "2021-09-29T10:45:43Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"botnet",
|
||
"docx",
|
||
"exploit",
|
||
"payload",
|
||
"rat",
|
||
"rce"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 412946991,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "H0j3n\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "H0j3n",
|
||
"id": 51261763,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
|
||
"html_url": "https:\/\/github.com\/H0j3n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-03T01:13:42Z",
|
||
"updated_at": "2022-01-26T02:35:54Z",
|
||
"pushed_at": "2021-10-10T06:32:11Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 3,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [
|
||
"cve-2021-40444"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 3,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 417748789,
|
||
"name": "TIC4301_Project",
|
||
"full_name": "factionsypho\/TIC4301_Project",
|
||
"owner": {
|
||
"login": "factionsypho",
|
||
"id": 40175487,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4",
|
||
"html_url": "https:\/\/github.com\/factionsypho"
|
||
},
|
||
"html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project",
|
||
"description": "TIC4301 Project - CVE-2021-40444",
|
||
"fork": false,
|
||
"created_at": "2021-10-16T07:07:26Z",
|
||
"updated_at": "2021-12-06T13:36:02Z",
|
||
"pushed_at": "2021-12-06T13:35:59Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 420818304,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "TiagoSergio\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "TiagoSergio",
|
||
"id": 24528913,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
|
||
"html_url": "https:\/\/github.com\/TiagoSergio"
|
||
},
|
||
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-10-24T23:17:12Z",
|
||
"updated_at": "2021-10-24T23:17:28Z",
|
||
"pushed_at": "2021-10-24T23:17:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 422246280,
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "0xK4gura\/CVE-2021-40444-POC",
|
||
"owner": {
|
||
"login": "0xK4gura",
|
||
"id": 92495243,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
|
||
"html_url": "https:\/\/github.com\/0xK4gura"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC",
|
||
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
|
||
"fork": false,
|
||
"created_at": "2021-10-28T14:55:46Z",
|
||
"updated_at": "2022-01-26T02:46:54Z",
|
||
"pushed_at": "2021-10-31T08:15:00Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 425935080,
|
||
"name": "word_mshtml",
|
||
"full_name": "Zeop-CyberSec\/word_mshtml",
|
||
"owner": {
|
||
"login": "Zeop-CyberSec",
|
||
"id": 68154603,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
|
||
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
|
||
"fork": false,
|
||
"created_at": "2021-11-08T17:38:30Z",
|
||
"updated_at": "2021-12-11T21:29:07Z",
|
||
"pushed_at": "2021-11-09T11:12:53Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 430718153,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "Alexcot25051999\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "Alexcot25051999",
|
||
"id": 94846095,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
|
||
"html_url": "https:\/\/github.com\/Alexcot25051999"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-22T13:29:20Z",
|
||
"updated_at": "2021-11-22T13:41:39Z",
|
||
"pushed_at": "2021-11-22T13:41:36Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 431721742,
|
||
"name": "CVE-2021-40444-exp",
|
||
"full_name": "lisinan988\/CVE-2021-40444-exp",
|
||
"owner": {
|
||
"login": "lisinan988",
|
||
"id": 87479262,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
|
||
"html_url": "https:\/\/github.com\/lisinan988"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-11-25T05:13:05Z",
|
||
"updated_at": "2021-11-25T05:13:19Z",
|
||
"pushed_at": "2021-11-25T05:13:14Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 439810103,
|
||
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"owner": {
|
||
"login": "34zY",
|
||
"id": 55347142,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
|
||
"html_url": "https:\/\/github.com\/34zY"
|
||
},
|
||
"html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"description": "CVE-2021-40444",
|
||
"fork": false,
|
||
"created_at": "2021-12-19T08:16:07Z",
|
||
"updated_at": "2022-01-25T08:55:47Z",
|
||
"pushed_at": "2021-12-19T08:27:33Z",
|
||
"stargazers_count": 53,
|
||
"watchers_count": 53,
|
||
"forks_count": 19,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 19,
|
||
"watchers": 53,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 442372306,
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "MRacumen\/CVE-2021-40444",
|
||
"owner": {
|
||
"login": "MRacumen",
|
||
"id": 73010693,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4",
|
||
"html_url": "https:\/\/github.com\/MRacumen"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444",
|
||
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"fork": false,
|
||
"created_at": "2021-12-28T06:33:25Z",
|
||
"updated_at": "2021-12-28T09:38:18Z",
|
||
"pushed_at": "2021-12-28T06:44:19Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
}
|
||
] |