mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 05:12:21 +01:00
324 lines
No EOL
11 KiB
JSON
324 lines
No EOL
11 KiB
JSON
[
|
|
{
|
|
"id": 295716616,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "NAXG\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "NAXG",
|
|
"id": 28560949,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28560949?v=4",
|
|
"html_url": "https:\/\/github.com\/NAXG"
|
|
},
|
|
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
|
|
"description": "CVE-2020-1472复现流程",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T12:11:49Z",
|
|
"updated_at": "2021-04-18T11:22:10Z",
|
|
"pushed_at": "2021-04-18T11:22:07Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295743213,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "s0wr0b1ndef\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "s0wr0b1ndef",
|
|
"id": 37288034,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37288034?v=4",
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
|
},
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-15T13:50:01Z",
|
|
"updated_at": "2020-09-20T18:17:37Z",
|
|
"pushed_at": "2021-03-20T05:07:17Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295917979,
|
|
"name": "SecuraBV-CVE-2020-1472",
|
|
"full_name": "Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-16T03:57:04Z",
|
|
"updated_at": "2020-09-25T06:08:29Z",
|
|
"pushed_at": "2021-03-20T05:06:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 296388474,
|
|
"name": "zerologon",
|
|
"full_name": "zeronetworks\/zerologon",
|
|
"owner": {
|
|
"login": "zeronetworks",
|
|
"id": 46243031,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46243031?v=4",
|
|
"html_url": "https:\/\/github.com\/zeronetworks"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zeronetworks\/zerologon",
|
|
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
|
"fork": false,
|
|
"created_at": "2020-09-17T16:53:17Z",
|
|
"updated_at": "2021-03-04T11:53:33Z",
|
|
"pushed_at": "2021-03-20T05:07:11Z",
|
|
"stargazers_count": 41,
|
|
"watchers_count": 41,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 41,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 299216120,
|
|
"name": "CVE-2020-1472-02-",
|
|
"full_name": "Fa1c0n35\/CVE-2020-1472-02-",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472-02-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-28T06:53:41Z",
|
|
"updated_at": "2020-09-28T06:53:54Z",
|
|
"pushed_at": "2021-03-20T05:09:58Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 305977168,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "puckiestyle\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "puckiestyle",
|
|
"id": 57447087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
|
"html_url": "https:\/\/github.com\/puckiestyle"
|
|
},
|
|
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-10-21T09:42:34Z",
|
|
"updated_at": "2020-10-21T09:42:48Z",
|
|
"pushed_at": "2021-03-20T05:18:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 311800203,
|
|
"name": "The_big_Zero",
|
|
"full_name": "JayP232\/The_big_Zero",
|
|
"owner": {
|
|
"login": "JayP232",
|
|
"id": 40582783,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40582783?v=4",
|
|
"html_url": "https:\/\/github.com\/JayP232"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JayP232\/The_big_Zero",
|
|
"description": "The following is the outcome of playing with CVE-2020-1472 and attempting to automate the process of gaining a shell on the DC",
|
|
"fork": false,
|
|
"created_at": "2020-11-10T22:29:56Z",
|
|
"updated_at": "2020-12-04T21:08:46Z",
|
|
"pushed_at": "2020-12-04T21:08:44Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 323842467,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "SaharAttackit\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "SaharAttackit",
|
|
"id": 76513483,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76513483?v=4",
|
|
"html_url": "https:\/\/github.com\/SaharAttackit"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SaharAttackit\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-12-23T08:12:21Z",
|
|
"updated_at": "2020-12-23T08:24:12Z",
|
|
"pushed_at": "2020-12-23T08:13:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 325937253,
|
|
"name": "zerologon",
|
|
"full_name": "wrathfulDiety\/zerologon",
|
|
"owner": {
|
|
"login": "wrathfulDiety",
|
|
"id": 36190613,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36190613?v=4",
|
|
"html_url": "https:\/\/github.com\/wrathfulDiety"
|
|
},
|
|
"html_url": "https:\/\/github.com\/wrathfulDiety\/zerologon",
|
|
"description": "zerologon script to exploit CVE-2020-1472 CVSS 10\/10",
|
|
"fork": false,
|
|
"created_at": "2021-01-01T07:38:58Z",
|
|
"updated_at": "2021-01-17T15:08:53Z",
|
|
"pushed_at": "2021-01-03T15:43:26Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 327729919,
|
|
"name": "ZeroLogon-Exploitation-Check",
|
|
"full_name": "YossiSassi\/ZeroLogon-Exploitation-Check",
|
|
"owner": {
|
|
"login": "YossiSassi",
|
|
"id": 23126190,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23126190?v=4",
|
|
"html_url": "https:\/\/github.com\/YossiSassi"
|
|
},
|
|
"html_url": "https:\/\/github.com\/YossiSassi\/ZeroLogon-Exploitation-Check",
|
|
"description": "quick'n'dirty automated checks for potential exploitation of CVE-2020-1472 (aka ZeroLogon), using leading artifects in determining an actual exploitation of CVE-2020-1472. requires admin access to the DCs",
|
|
"fork": false,
|
|
"created_at": "2021-01-07T21:35:16Z",
|
|
"updated_at": "2021-03-10T17:01:13Z",
|
|
"pushed_at": "2021-01-08T12:14:27Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 5,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 331439225,
|
|
"name": "zerologon",
|
|
"full_name": "sho-luv\/zerologon",
|
|
"owner": {
|
|
"login": "sho-luv",
|
|
"id": 1679089,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1679089?v=4",
|
|
"html_url": "https:\/\/github.com\/sho-luv"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sho-luv\/zerologon",
|
|
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example",
|
|
"fork": false,
|
|
"created_at": "2021-01-20T21:38:47Z",
|
|
"updated_at": "2021-04-09T04:47:53Z",
|
|
"pushed_at": "2021-03-15T12:02:53Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 343288379,
|
|
"name": "ZeroLogon-Exploit",
|
|
"full_name": "hell-moon\/ZeroLogon-Exploit",
|
|
"owner": {
|
|
"login": "hell-moon",
|
|
"id": 46636809,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46636809?v=4",
|
|
"html_url": "https:\/\/github.com\/hell-moon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hell-moon\/ZeroLogon-Exploit",
|
|
"description": "Modified the test PoC from Secura, CVE-2020-1472, to change the machine password to null",
|
|
"fork": false,
|
|
"created_at": "2021-03-01T04:21:47Z",
|
|
"updated_at": "2021-03-01T22:52:15Z",
|
|
"pushed_at": "2021-03-01T19:24:56Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 355036509,
|
|
"name": "Zerologon",
|
|
"full_name": "Udyz\/Zerologon",
|
|
"owner": {
|
|
"login": "Udyz",
|
|
"id": 39673284,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
|
"html_url": "https:\/\/github.com\/Udyz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Udyz\/Zerologon",
|
|
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
|
"fork": false,
|
|
"created_at": "2021-04-06T02:48:35Z",
|
|
"updated_at": "2021-04-07T06:45:06Z",
|
|
"pushed_at": "2021-04-07T06:45:04Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 360650643,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "itssmikefm\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "itssmikefm",
|
|
"id": 38843879,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38843879?v=4",
|
|
"html_url": "https:\/\/github.com\/itssmikefm"
|
|
},
|
|
"html_url": "https:\/\/github.com\/itssmikefm\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-04-22T18:51:09Z",
|
|
"updated_at": "2021-04-22T19:03:41Z",
|
|
"pushed_at": "2021-04-22T19:03:38Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |