mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
307 lines
No EOL
11 KiB
JSON
307 lines
No EOL
11 KiB
JSON
[
|
|
{
|
|
"id": 138456315,
|
|
"name": "WinboxPoC",
|
|
"full_name": "BasuCert\/WinboxPoC",
|
|
"owner": {
|
|
"login": "BasuCert",
|
|
"id": 29852431,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
|
"html_url": "https:\/\/github.com\/BasuCert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
|
|
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
|
|
"fork": false,
|
|
"created_at": "2018-06-24T05:34:05Z",
|
|
"updated_at": "2023-07-09T06:48:38Z",
|
|
"pushed_at": "2020-10-16T12:09:45Z",
|
|
"stargazers_count": 490,
|
|
"watchers_count": 490,
|
|
"has_discussions": false,
|
|
"forks_count": 474,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 474,
|
|
"watchers": 490,
|
|
"score": 0,
|
|
"subscribers_count": 58
|
|
},
|
|
{
|
|
"id": 148370201,
|
|
"name": "WinboxExploit",
|
|
"full_name": "msterusky\/WinboxExploit",
|
|
"owner": {
|
|
"login": "msterusky",
|
|
"id": 29436829,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
|
|
"html_url": "https:\/\/github.com\/msterusky"
|
|
},
|
|
"html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
|
|
"description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
|
|
"fork": false,
|
|
"created_at": "2018-09-11T19:36:49Z",
|
|
"updated_at": "2023-04-10T14:27:16Z",
|
|
"pushed_at": "2018-09-11T20:12:25Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 152906288,
|
|
"name": "MikroRoot",
|
|
"full_name": "syrex1013\/MikroRoot",
|
|
"owner": {
|
|
"login": "syrex1013",
|
|
"id": 31669127,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
|
|
"html_url": "https:\/\/github.com\/syrex1013"
|
|
},
|
|
"html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
|
|
"description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
|
|
"fork": false,
|
|
"created_at": "2018-10-13T19:17:42Z",
|
|
"updated_at": "2021-12-06T20:08:10Z",
|
|
"pushed_at": "2018-10-14T08:39:24Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 15,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 161894724,
|
|
"name": "CVE-2018-14847",
|
|
"full_name": "jas502n\/CVE-2018-14847",
|
|
"owner": {
|
|
"login": "jas502n",
|
|
"id": 16593068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
|
|
"html_url": "https:\/\/github.com\/jas502n"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
|
|
"description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
|
|
"fork": false,
|
|
"created_at": "2018-12-15T10:38:26Z",
|
|
"updated_at": "2023-05-16T17:55:20Z",
|
|
"pushed_at": "2018-12-16T04:15:01Z",
|
|
"stargazers_count": 24,
|
|
"watchers_count": 24,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 24,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 188679903,
|
|
"name": "mikrotik-beast",
|
|
"full_name": "mahmoodsabir\/mikrotik-beast",
|
|
"owner": {
|
|
"login": "mahmoodsabir",
|
|
"id": 47719250,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
|
|
"html_url": "https:\/\/github.com\/mahmoodsabir"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
|
|
"description": " Mass MikroTik WinBox Exploitation tool, CVE-2018-14847 ",
|
|
"fork": false,
|
|
"created_at": "2019-05-26T12:26:55Z",
|
|
"updated_at": "2023-04-10T14:46:14Z",
|
|
"pushed_at": "2019-05-26T13:06:01Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 210848831,
|
|
"name": "winboxPOC",
|
|
"full_name": "Tr33-He11\/winboxPOC",
|
|
"owner": {
|
|
"login": "Tr33-He11",
|
|
"id": 18653509,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/18653509?v=4",
|
|
"html_url": "https:\/\/github.com\/Tr33-He11"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Tr33-He11\/winboxPOC",
|
|
"description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
|
|
"fork": false,
|
|
"created_at": "2019-09-25T13:12:56Z",
|
|
"updated_at": "2021-12-23T21:35:48Z",
|
|
"pushed_at": "2019-02-18T09:51:10Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 211658714,
|
|
"name": "Python-MikrotikLoginExploit",
|
|
"full_name": "sinichi449\/Python-MikrotikLoginExploit",
|
|
"owner": {
|
|
"login": "sinichi449",
|
|
"id": 44680392,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
|
|
"html_url": "https:\/\/github.com\/sinichi449"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
|
|
"description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
|
|
"fork": false,
|
|
"created_at": "2019-09-29T12:21:16Z",
|
|
"updated_at": "2023-06-20T04:49:48Z",
|
|
"pushed_at": "2019-09-30T04:10:23Z",
|
|
"stargazers_count": 15,
|
|
"watchers_count": 15,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"exploit",
|
|
"mikrotik",
|
|
"python",
|
|
"winbox"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 15,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
},
|
|
{
|
|
"id": 259795725,
|
|
"name": "CVE-2018-14847",
|
|
"full_name": "yukar1z0e\/CVE-2018-14847",
|
|
"owner": {
|
|
"login": "yukar1z0e",
|
|
"id": 44317939,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
|
|
"html_url": "https:\/\/github.com\/yukar1z0e"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-04-29T01:40:33Z",
|
|
"updated_at": "2022-12-20T04:50:57Z",
|
|
"pushed_at": "2020-05-18T07:47:58Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 360240266,
|
|
"name": "Mikrotik-router-hack",
|
|
"full_name": "hacker30468\/Mikrotik-router-hack",
|
|
"owner": {
|
|
"login": "hacker30468",
|
|
"id": 82890072,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
|
|
"html_url": "https:\/\/github.com\/hacker30468"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
|
|
"description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords. The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
|
|
"fork": false,
|
|
"created_at": "2021-04-21T16:42:31Z",
|
|
"updated_at": "2023-07-03T20:43:29Z",
|
|
"pushed_at": "2021-04-21T16:46:37Z",
|
|
"stargazers_count": 19,
|
|
"watchers_count": 19,
|
|
"has_discussions": false,
|
|
"forks_count": 10,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 10,
|
|
"watchers": 19,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 559816350,
|
|
"name": "routeros-CVE-2018-14847-bytheway",
|
|
"full_name": "babyshen\/routeros-CVE-2018-14847-bytheway",
|
|
"owner": {
|
|
"login": "babyshen",
|
|
"id": 11402197,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11402197?v=4",
|
|
"html_url": "https:\/\/github.com\/babyshen"
|
|
},
|
|
"html_url": "https:\/\/github.com\/babyshen\/routeros-CVE-2018-14847-bytheway",
|
|
"description": "By the Way is an exploit that enables a root shell on Mikrotik devices running RouterOS versions:",
|
|
"fork": false,
|
|
"created_at": "2022-10-31T06:38:11Z",
|
|
"updated_at": "2023-06-08T05:19:54Z",
|
|
"pushed_at": "2022-11-17T01:22:12Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
}
|
|
] |