mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
347 lines
No EOL
12 KiB
JSON
347 lines
No EOL
12 KiB
JSON
[
|
||
{
|
||
"id": 387926337,
|
||
"name": "ShadowSteal",
|
||
"full_name": "HuskyHacks\/ShadowSteal",
|
||
"owner": {
|
||
"login": "HuskyHacks",
|
||
"id": 57866415,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
|
||
"html_url": "https:\/\/github.com\/HuskyHacks"
|
||
},
|
||
"html_url": "https:\/\/github.com\/HuskyHacks\/ShadowSteal",
|
||
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
|
||
"fork": false,
|
||
"created_at": "2021-07-20T22:16:49Z",
|
||
"updated_at": "2021-07-28T10:48:38Z",
|
||
"pushed_at": "2021-07-25T15:56:26Z",
|
||
"stargazers_count": 137,
|
||
"watchers_count": 137,
|
||
"forks_count": 27,
|
||
"forks": 27,
|
||
"watchers": 137,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388119730,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "JoranSlingerland\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "JoranSlingerland",
|
||
"id": 32357871,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32357871?v=4",
|
||
"html_url": "https:\/\/github.com\/JoranSlingerland"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JoranSlingerland\/CVE-2021-36934",
|
||
"description": "Fix for the CVE-2021-36934",
|
||
"fork": false,
|
||
"created_at": "2021-07-21T13:06:51Z",
|
||
"updated_at": "2021-07-28T01:44:47Z",
|
||
"pushed_at": "2021-07-23T06:56:06Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388194766,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "n3tsurge\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "n3tsurge",
|
||
"id": 1574741,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574741?v=4",
|
||
"html_url": "https:\/\/github.com\/n3tsurge"
|
||
},
|
||
"html_url": "https:\/\/github.com\/n3tsurge\/CVE-2021-36934",
|
||
"description": "Detection and Mitigation script for CVE-2021-36934 (HiveNightmare aka. SeriousSam)",
|
||
"fork": false,
|
||
"created_at": "2021-07-21T17:24:44Z",
|
||
"updated_at": "2021-07-28T23:07:32Z",
|
||
"pushed_at": "2021-07-22T02:10:56Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388286318,
|
||
"name": "VSSCopy",
|
||
"full_name": "Wh04m1001\/VSSCopy",
|
||
"owner": {
|
||
"login": "Wh04m1001",
|
||
"id": 44291883,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
|
||
"html_url": "https:\/\/github.com\/Wh04m1001"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Wh04m1001\/VSSCopy",
|
||
"description": "Small and dirty PoC for CVE-2021-36934",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T00:55:23Z",
|
||
"updated_at": "2021-07-26T14:35:30Z",
|
||
"pushed_at": "2021-07-22T02:15:27Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388311709,
|
||
"name": "Invoke-HiveNightmare",
|
||
"full_name": "WiredPulse\/Invoke-HiveNightmare",
|
||
"owner": {
|
||
"login": "WiredPulse",
|
||
"id": 19207515,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
|
||
"html_url": "https:\/\/github.com\/WiredPulse"
|
||
},
|
||
"html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveNightmare",
|
||
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T03:07:56Z",
|
||
"updated_at": "2021-07-25T23:47:49Z",
|
||
"pushed_at": "2021-07-22T04:17:47Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388374451,
|
||
"name": "SeriousSam",
|
||
"full_name": "romarroca\/SeriousSam",
|
||
"owner": {
|
||
"login": "romarroca",
|
||
"id": 87074019,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87074019?v=4",
|
||
"html_url": "https:\/\/github.com\/romarroca"
|
||
},
|
||
"html_url": "https:\/\/github.com\/romarroca\/SeriousSam",
|
||
"description": "HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows – CVE-2021-36934",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T07:49:29Z",
|
||
"updated_at": "2021-07-22T20:58:12Z",
|
||
"pushed_at": "2021-07-22T11:39:31Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388449471,
|
||
"name": "Invoke-HiveDreams",
|
||
"full_name": "WiredPulse\/Invoke-HiveDreams",
|
||
"owner": {
|
||
"login": "WiredPulse",
|
||
"id": 19207515,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
|
||
"html_url": "https:\/\/github.com\/WiredPulse"
|
||
},
|
||
"html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveDreams",
|
||
"description": "A capability to identify and remediate CVE-2021-36934 (HiveNightmare)",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T12:10:41Z",
|
||
"updated_at": "2021-07-22T14:42:53Z",
|
||
"pushed_at": "2021-07-22T14:42:51Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388453276,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "tda90\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "tda90",
|
||
"id": 48199685,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48199685?v=4",
|
||
"html_url": "https:\/\/github.com\/tda90"
|
||
},
|
||
"html_url": "https:\/\/github.com\/tda90\/CVE-2021-36934",
|
||
"description": "CVE-2021-36934 PowerShell Fix",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T12:24:24Z",
|
||
"updated_at": "2021-07-22T14:50:52Z",
|
||
"pushed_at": "2021-07-22T14:50:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388499292,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "VertigoRay\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "VertigoRay",
|
||
"id": 792482,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/792482?v=4",
|
||
"html_url": "https:\/\/github.com\/VertigoRay"
|
||
},
|
||
"html_url": "https:\/\/github.com\/VertigoRay\/CVE-2021-36934",
|
||
"description": "Windows Elevation of Privilege Vulnerability (SeriousSAM)",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T14:53:09Z",
|
||
"updated_at": "2021-07-24T12:03:30Z",
|
||
"pushed_at": "2021-07-24T12:03:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 388607076,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "bytesizedalex\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "bytesizedalex",
|
||
"id": 17046773,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17046773?v=4",
|
||
"html_url": "https:\/\/github.com\/bytesizedalex"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bytesizedalex\/CVE-2021-36934",
|
||
"description": "CVE-2021-36934 PowerShell scripts",
|
||
"fork": false,
|
||
"created_at": "2021-07-22T21:54:45Z",
|
||
"updated_at": "2021-07-28T01:48:39Z",
|
||
"pushed_at": "2021-07-23T19:14:19Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 389099085,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "cube0x0\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "cube0x0",
|
||
"id": 39370848,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
|
||
"html_url": "https:\/\/github.com\/cube0x0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-36934",
|
||
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
|
||
"fork": false,
|
||
"created_at": "2021-07-24T12:55:05Z",
|
||
"updated_at": "2021-07-29T01:43:10Z",
|
||
"pushed_at": "2021-07-25T15:41:33Z",
|
||
"stargazers_count": 156,
|
||
"watchers_count": 156,
|
||
"forks_count": 27,
|
||
"forks": 27,
|
||
"watchers": 156,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 389226743,
|
||
"name": "PyNightmare",
|
||
"full_name": "Sp00p64\/PyNightmare",
|
||
"owner": {
|
||
"login": "Sp00p64",
|
||
"id": 59793368,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59793368?v=4",
|
||
"html_url": "https:\/\/github.com\/Sp00p64"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Sp00p64\/PyNightmare",
|
||
"description": "PoC for CVE-2021-36934 Aka HiveNightmare\/SeriousSAM written in python3",
|
||
"fork": false,
|
||
"created_at": "2021-07-25T00:31:11Z",
|
||
"updated_at": "2021-07-25T23:47:47Z",
|
||
"pushed_at": "2021-07-25T01:19:31Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 389410092,
|
||
"name": "Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
|
||
"full_name": "jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
|
||
"owner": {
|
||
"login": "jmaddington",
|
||
"id": 2353597,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
|
||
"html_url": "https:\/\/github.com\/jmaddington"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
|
||
"description": "This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934 https:\/\/kb.cert.org\/vuls\/id\/506989 USE AT YOUR OWN RISK -- BACKUPS MAY BREAK.",
|
||
"fork": false,
|
||
"created_at": "2021-07-25T18:00:35Z",
|
||
"updated_at": "2021-07-25T18:10:18Z",
|
||
"pushed_at": "2021-07-25T18:10:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 389555386,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "0x0D1n\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "0x0D1n",
|
||
"id": 23523771,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23523771?v=4",
|
||
"html_url": "https:\/\/github.com\/0x0D1n"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x0D1n\/CVE-2021-36934",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2021-07-26T08:01:08Z",
|
||
"updated_at": "2021-07-26T08:18:37Z",
|
||
"pushed_at": "2021-07-26T08:18:34Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 389878651,
|
||
"name": "CVE-2021-36934",
|
||
"full_name": "exploitblizzard\/CVE-2021-36934",
|
||
"owner": {
|
||
"login": "exploitblizzard",
|
||
"id": 61627070,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||
},
|
||
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2021-36934",
|
||
"description": "HiveNightmare aka SeriousSAM ",
|
||
"fork": false,
|
||
"created_at": "2021-07-27T06:54:30Z",
|
||
"updated_at": "2021-07-28T23:07:43Z",
|
||
"pushed_at": "2021-07-27T06:56:18Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 2,
|
||
"score": 0
|
||
}
|
||
] |