PoC-in-GitHub/2021/CVE-2021-36934.json
2021-07-29 12:12:39 +09:00

347 lines
No EOL
12 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 387926337,
"name": "ShadowSteal",
"full_name": "HuskyHacks\/ShadowSteal",
"owner": {
"login": "HuskyHacks",
"id": 57866415,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57866415?v=4",
"html_url": "https:\/\/github.com\/HuskyHacks"
},
"html_url": "https:\/\/github.com\/HuskyHacks\/ShadowSteal",
"description": "Pure Nim implementation for exploiting CVE-2021-36934, the SeriousSAM local privilege escalation",
"fork": false,
"created_at": "2021-07-20T22:16:49Z",
"updated_at": "2021-07-28T10:48:38Z",
"pushed_at": "2021-07-25T15:56:26Z",
"stargazers_count": 137,
"watchers_count": 137,
"forks_count": 27,
"forks": 27,
"watchers": 137,
"score": 0
},
{
"id": 388119730,
"name": "CVE-2021-36934",
"full_name": "JoranSlingerland\/CVE-2021-36934",
"owner": {
"login": "JoranSlingerland",
"id": 32357871,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32357871?v=4",
"html_url": "https:\/\/github.com\/JoranSlingerland"
},
"html_url": "https:\/\/github.com\/JoranSlingerland\/CVE-2021-36934",
"description": "Fix for the CVE-2021-36934",
"fork": false,
"created_at": "2021-07-21T13:06:51Z",
"updated_at": "2021-07-28T01:44:47Z",
"pushed_at": "2021-07-23T06:56:06Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 5,
"forks": 5,
"watchers": 9,
"score": 0
},
{
"id": 388194766,
"name": "CVE-2021-36934",
"full_name": "n3tsurge\/CVE-2021-36934",
"owner": {
"login": "n3tsurge",
"id": 1574741,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574741?v=4",
"html_url": "https:\/\/github.com\/n3tsurge"
},
"html_url": "https:\/\/github.com\/n3tsurge\/CVE-2021-36934",
"description": "Detection and Mitigation script for CVE-2021-36934 (HiveNightmare aka. SeriousSam)",
"fork": false,
"created_at": "2021-07-21T17:24:44Z",
"updated_at": "2021-07-28T23:07:32Z",
"pushed_at": "2021-07-22T02:10:56Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 388286318,
"name": "VSSCopy",
"full_name": "Wh04m1001\/VSSCopy",
"owner": {
"login": "Wh04m1001",
"id": 44291883,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44291883?v=4",
"html_url": "https:\/\/github.com\/Wh04m1001"
},
"html_url": "https:\/\/github.com\/Wh04m1001\/VSSCopy",
"description": "Small and dirty PoC for CVE-2021-36934",
"fork": false,
"created_at": "2021-07-22T00:55:23Z",
"updated_at": "2021-07-26T14:35:30Z",
"pushed_at": "2021-07-22T02:15:27Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 388311709,
"name": "Invoke-HiveNightmare",
"full_name": "WiredPulse\/Invoke-HiveNightmare",
"owner": {
"login": "WiredPulse",
"id": 19207515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
"html_url": "https:\/\/github.com\/WiredPulse"
},
"html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveNightmare",
"description": "PoC for CVE-2021-36934, which enables a standard user to be able to retrieve the SAM, Security, and Software Registry hives in Windows 10 version 1809 or newer",
"fork": false,
"created_at": "2021-07-22T03:07:56Z",
"updated_at": "2021-07-25T23:47:49Z",
"pushed_at": "2021-07-22T04:17:47Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 388374451,
"name": "SeriousSam",
"full_name": "romarroca\/SeriousSam",
"owner": {
"login": "romarroca",
"id": 87074019,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87074019?v=4",
"html_url": "https:\/\/github.com\/romarroca"
},
"html_url": "https:\/\/github.com\/romarroca\/SeriousSam",
"description": "HiveNightmare a.k.a. SeriousSam Local Privilege Escalation in Windows CVE-2021-36934",
"fork": false,
"created_at": "2021-07-22T07:49:29Z",
"updated_at": "2021-07-22T20:58:12Z",
"pushed_at": "2021-07-22T11:39:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 388449471,
"name": "Invoke-HiveDreams",
"full_name": "WiredPulse\/Invoke-HiveDreams",
"owner": {
"login": "WiredPulse",
"id": 19207515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19207515?v=4",
"html_url": "https:\/\/github.com\/WiredPulse"
},
"html_url": "https:\/\/github.com\/WiredPulse\/Invoke-HiveDreams",
"description": "A capability to identify and remediate CVE-2021-36934 (HiveNightmare)",
"fork": false,
"created_at": "2021-07-22T12:10:41Z",
"updated_at": "2021-07-22T14:42:53Z",
"pushed_at": "2021-07-22T14:42:51Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 388453276,
"name": "CVE-2021-36934",
"full_name": "tda90\/CVE-2021-36934",
"owner": {
"login": "tda90",
"id": 48199685,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48199685?v=4",
"html_url": "https:\/\/github.com\/tda90"
},
"html_url": "https:\/\/github.com\/tda90\/CVE-2021-36934",
"description": "CVE-2021-36934 PowerShell Fix",
"fork": false,
"created_at": "2021-07-22T12:24:24Z",
"updated_at": "2021-07-22T14:50:52Z",
"pushed_at": "2021-07-22T14:50:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 388499292,
"name": "CVE-2021-36934",
"full_name": "VertigoRay\/CVE-2021-36934",
"owner": {
"login": "VertigoRay",
"id": 792482,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/792482?v=4",
"html_url": "https:\/\/github.com\/VertigoRay"
},
"html_url": "https:\/\/github.com\/VertigoRay\/CVE-2021-36934",
"description": "Windows Elevation of Privilege Vulnerability (SeriousSAM)",
"fork": false,
"created_at": "2021-07-22T14:53:09Z",
"updated_at": "2021-07-24T12:03:30Z",
"pushed_at": "2021-07-24T12:03:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 388607076,
"name": "CVE-2021-36934",
"full_name": "bytesizedalex\/CVE-2021-36934",
"owner": {
"login": "bytesizedalex",
"id": 17046773,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17046773?v=4",
"html_url": "https:\/\/github.com\/bytesizedalex"
},
"html_url": "https:\/\/github.com\/bytesizedalex\/CVE-2021-36934",
"description": "CVE-2021-36934 PowerShell scripts",
"fork": false,
"created_at": "2021-07-22T21:54:45Z",
"updated_at": "2021-07-28T01:48:39Z",
"pushed_at": "2021-07-23T19:14:19Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 389099085,
"name": "CVE-2021-36934",
"full_name": "cube0x0\/CVE-2021-36934",
"owner": {
"login": "cube0x0",
"id": 39370848,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
"html_url": "https:\/\/github.com\/cube0x0"
},
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-36934",
"description": "C# PoC for CVE-2021-36934\/HiveNightmare\/SeriousSAM",
"fork": false,
"created_at": "2021-07-24T12:55:05Z",
"updated_at": "2021-07-29T01:43:10Z",
"pushed_at": "2021-07-25T15:41:33Z",
"stargazers_count": 156,
"watchers_count": 156,
"forks_count": 27,
"forks": 27,
"watchers": 156,
"score": 0
},
{
"id": 389226743,
"name": "PyNightmare",
"full_name": "Sp00p64\/PyNightmare",
"owner": {
"login": "Sp00p64",
"id": 59793368,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59793368?v=4",
"html_url": "https:\/\/github.com\/Sp00p64"
},
"html_url": "https:\/\/github.com\/Sp00p64\/PyNightmare",
"description": "PoC for CVE-2021-36934 Aka HiveNightmare\/SeriousSAM written in python3",
"fork": false,
"created_at": "2021-07-25T00:31:11Z",
"updated_at": "2021-07-25T23:47:47Z",
"pushed_at": "2021-07-25T01:19:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 389410092,
"name": "Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
"full_name": "jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
"owner": {
"login": "jmaddington",
"id": 2353597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
"html_url": "https:\/\/github.com\/jmaddington"
},
"html_url": "https:\/\/github.com\/jmaddington\/Serious-Sam---CVE-2021-36934-Mitigation-for-Datto-RMM",
"description": "This PowerShell script will take the mitigation measures for CVE-2021-36934 described by Microsoft and the US CERT team. https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-36934 https:\/\/kb.cert.org\/vuls\/id\/506989 USE AT YOUR OWN RISK -- BACKUPS MAY BREAK.",
"fork": false,
"created_at": "2021-07-25T18:00:35Z",
"updated_at": "2021-07-25T18:10:18Z",
"pushed_at": "2021-07-25T18:10:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 389555386,
"name": "CVE-2021-36934",
"full_name": "0x0D1n\/CVE-2021-36934",
"owner": {
"login": "0x0D1n",
"id": 23523771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23523771?v=4",
"html_url": "https:\/\/github.com\/0x0D1n"
},
"html_url": "https:\/\/github.com\/0x0D1n\/CVE-2021-36934",
"description": null,
"fork": false,
"created_at": "2021-07-26T08:01:08Z",
"updated_at": "2021-07-26T08:18:37Z",
"pushed_at": "2021-07-26T08:18:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 389878651,
"name": "CVE-2021-36934",
"full_name": "exploitblizzard\/CVE-2021-36934",
"owner": {
"login": "exploitblizzard",
"id": 61627070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
"html_url": "https:\/\/github.com\/exploitblizzard"
},
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2021-36934",
"description": "HiveNightmare aka SeriousSAM ",
"fork": false,
"created_at": "2021-07-27T06:54:30Z",
"updated_at": "2021-07-28T23:07:43Z",
"pushed_at": "2021-07-27T06:56:18Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"forks": 1,
"watchers": 2,
"score": 0
}
]