mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
401 lines
No EOL
13 KiB
JSON
401 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 367930039,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "0vercl0k\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "0vercl0k",
|
|
"id": 1476421,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
|
|
"html_url": "https:\/\/github.com\/0vercl0k"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
|
|
"description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
|
|
"fork": false,
|
|
"created_at": "2021-05-16T16:15:56Z",
|
|
"updated_at": "2023-09-08T18:22:20Z",
|
|
"pushed_at": "2021-06-12T08:27:09Z",
|
|
"stargazers_count": 823,
|
|
"watchers_count": 823,
|
|
"has_discussions": false,
|
|
"forks_count": 138,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"accept-encoding",
|
|
"cve-2021-31166",
|
|
"http",
|
|
"ulpparsecontentcoding"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 138,
|
|
"watchers": 823,
|
|
"score": 0,
|
|
"subscribers_count": 24
|
|
},
|
|
{
|
|
"id": 368156601,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "zha0gongz1\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "zha0gongz1",
|
|
"id": 41460798,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4",
|
|
"html_url": "https:\/\/github.com\/zha0gongz1"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166",
|
|
"description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T11:12:45Z",
|
|
"updated_at": "2023-08-20T20:40:51Z",
|
|
"pushed_at": "2021-05-17T11:30:26Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"accept-encoding",
|
|
"cve-2021-31166",
|
|
"rce"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 9,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 368306577,
|
|
"name": "CVE-2021-31166-detection-rules",
|
|
"full_name": "mvlnetdev\/CVE-2021-31166-detection-rules",
|
|
"owner": {
|
|
"login": "mvlnetdev",
|
|
"id": 41307333,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4",
|
|
"html_url": "https:\/\/github.com\/mvlnetdev"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules",
|
|
"description": "Different rules to detect if CVE-2021-31166 is being exploited",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T19:55:41Z",
|
|
"updated_at": "2022-07-21T02:50:56Z",
|
|
"pushed_at": "2022-02-26T12:52:37Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 368350830,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "corelight\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166",
|
|
"description": "HTTP Protocol Stack CVE-2021-31166",
|
|
"fork": false,
|
|
"created_at": "2021-05-17T23:54:12Z",
|
|
"updated_at": "2023-01-18T03:26:56Z",
|
|
"pushed_at": "2021-05-28T00:41:52Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 13,
|
|
"score": 0,
|
|
"subscribers_count": 7
|
|
},
|
|
{
|
|
"id": 368786720,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "zecopro\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "zecopro",
|
|
"id": 23106986,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
|
|
"html_url": "https:\/\/github.com\/zecopro"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166",
|
|
"description": "simple bash script for exploit CVE-2021-31166",
|
|
"fork": false,
|
|
"created_at": "2021-05-19T07:50:40Z",
|
|
"updated_at": "2022-05-11T01:47:48Z",
|
|
"pushed_at": "2021-05-19T08:18:56Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 370131263,
|
|
"name": "WIn-CVE-2021-31166",
|
|
"full_name": "bgsilvait\/WIn-CVE-2021-31166",
|
|
"owner": {
|
|
"login": "bgsilvait",
|
|
"id": 38823062,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4",
|
|
"html_url": "https:\/\/github.com\/bgsilvait"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-05-23T18:41:48Z",
|
|
"updated_at": "2021-05-23T19:32:43Z",
|
|
"pushed_at": "2021-05-23T19:32:41Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 370268982,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "Udyz\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "Udyz",
|
|
"id": 39673284,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
|
"html_url": "https:\/\/github.com\/Udyz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166",
|
|
"description": "http.sys remote UAF to Leak Credential",
|
|
"fork": false,
|
|
"created_at": "2021-05-24T07:42:18Z",
|
|
"updated_at": "2022-07-29T01:32:04Z",
|
|
"pushed_at": "2021-05-25T04:03:31Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 382641118,
|
|
"name": "CVE-2021-31166-Exploit",
|
|
"full_name": "y0g3sh-99\/CVE-2021-31166-Exploit",
|
|
"owner": {
|
|
"login": "y0g3sh-99",
|
|
"id": 59962466,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59962466?v=4",
|
|
"html_url": "https:\/\/github.com\/y0g3sh-99"
|
|
},
|
|
"html_url": "https:\/\/github.com\/y0g3sh-99\/CVE-2021-31166-Exploit",
|
|
"description": "Exploit for MS Http Protocol Stack RCE vulnerability (CVE-2021-31166)",
|
|
"fork": false,
|
|
"created_at": "2021-07-03T14:54:59Z",
|
|
"updated_at": "2022-01-18T13:29:37Z",
|
|
"pushed_at": "2021-07-03T15:27:28Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"accept-encoding",
|
|
"cve-2021-31166",
|
|
"dos",
|
|
"exploit",
|
|
"http",
|
|
"kernel",
|
|
"python3",
|
|
"rce",
|
|
"request-header",
|
|
"vulnerability",
|
|
"windows"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 7,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 410758909,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "antx-code\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "antx-code",
|
|
"id": 7877940,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
|
|
"html_url": "https:\/\/github.com\/antx-code"
|
|
},
|
|
"html_url": "https:\/\/github.com\/antx-code\/CVE-2021-31166",
|
|
"description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
|
|
"fork": false,
|
|
"created_at": "2021-09-27T05:56:45Z",
|
|
"updated_at": "2022-12-05T16:51:40Z",
|
|
"pushed_at": "2021-11-04T02:23:11Z",
|
|
"stargazers_count": 21,
|
|
"watchers_count": 21,
|
|
"has_discussions": false,
|
|
"forks_count": 8,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 8,
|
|
"watchers": 21,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
},
|
|
{
|
|
"id": 419230261,
|
|
"name": "CVE-2021-31166-exploit",
|
|
"full_name": "imikoYa\/CVE-2021-31166-exploit",
|
|
"owner": {
|
|
"login": "imikoYa",
|
|
"id": 92157170,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92157170?v=4",
|
|
"html_url": "https:\/\/github.com\/imikoYa"
|
|
},
|
|
"html_url": "https:\/\/github.com\/imikoYa\/CVE-2021-31166-exploit",
|
|
"description": "Just a simple CVE-2021-31166 exploit tool",
|
|
"fork": false,
|
|
"created_at": "2021-10-20T07:37:46Z",
|
|
"updated_at": "2023-08-24T06:19:05Z",
|
|
"pushed_at": "2021-10-20T07:50:52Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 467221883,
|
|
"name": "CVE-2021-31166",
|
|
"full_name": "mauricelambert\/CVE-2021-31166",
|
|
"owner": {
|
|
"login": "mauricelambert",
|
|
"id": 50479118,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
|
"html_url": "https:\/\/github.com\/mauricelambert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166",
|
|
"description": "CVE-2021-31166: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
|
|
"fork": false,
|
|
"created_at": "2022-03-07T18:56:52Z",
|
|
"updated_at": "2023-04-23T11:13:47Z",
|
|
"pushed_at": "2022-03-16T21:21:14Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"bluescreen",
|
|
"crash",
|
|
"cve",
|
|
"cve-2021-31166",
|
|
"denial-of-service",
|
|
"dos",
|
|
"exploit",
|
|
"iis",
|
|
"metasploit",
|
|
"microsoft",
|
|
"nmap",
|
|
"payload",
|
|
"powershell",
|
|
"python3",
|
|
"ruby",
|
|
"vulnerability",
|
|
"webserver"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 569183785,
|
|
"name": "Home-Demolisher",
|
|
"full_name": "0xmaximus\/Home-Demolisher",
|
|
"owner": {
|
|
"login": "0xmaximus",
|
|
"id": 63053441,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63053441?v=4",
|
|
"html_url": "https:\/\/github.com\/0xmaximus"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xmaximus\/Home-Demolisher",
|
|
"description": "PoC for CVE-2021-31166 and CVE-2022-21907",
|
|
"fork": false,
|
|
"created_at": "2022-11-22T09:10:36Z",
|
|
"updated_at": "2023-04-04T20:32:49Z",
|
|
"pushed_at": "2022-12-08T11:05:50Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 3,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
}
|
|
] |