mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
186 lines
No EOL
6.7 KiB
JSON
186 lines
No EOL
6.7 KiB
JSON
[
|
|
{
|
|
"id": 279670211,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "ZephrFish\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "ZephrFish",
|
|
"id": 5783068,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5783068?v=4",
|
|
"html_url": "https:\/\/github.com\/ZephrFish"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350",
|
|
"description": "Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
|
|
"fork": false,
|
|
"created_at": "2020-07-14T19:02:25Z",
|
|
"updated_at": "2020-07-17T20:56:51Z",
|
|
"pushed_at": "2020-07-16T23:42:18Z",
|
|
"stargazers_count": 181,
|
|
"watchers_count": 181,
|
|
"forks_count": 56,
|
|
"forks": 56,
|
|
"watchers": 181,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279675165,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "mr-r3b00t\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "mr-r3b00t",
|
|
"id": 14963690,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/14963690?v=4",
|
|
"html_url": "https:\/\/github.com\/mr-r3b00t"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-07-14T19:28:46Z",
|
|
"updated_at": "2020-07-16T11:00:46Z",
|
|
"pushed_at": "2020-07-15T17:18:47Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 5,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279708493,
|
|
"name": "cve-2020-1350",
|
|
"full_name": "tinkersec\/cve-2020-1350",
|
|
"owner": {
|
|
"login": "tinkersec",
|
|
"id": 35904426,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/35904426?v=4",
|
|
"html_url": "https:\/\/github.com\/tinkersec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tinkersec\/cve-2020-1350",
|
|
"description": "Bash Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2003 up to Windows Server 2019.",
|
|
"fork": false,
|
|
"created_at": "2020-07-14T22:45:48Z",
|
|
"updated_at": "2020-07-17T18:34:13Z",
|
|
"pushed_at": "2020-07-15T13:53:24Z",
|
|
"stargazers_count": 52,
|
|
"watchers_count": 52,
|
|
"forks_count": 19,
|
|
"forks": 19,
|
|
"watchers": 52,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279776271,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "T13nn3s\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "T13nn3s",
|
|
"id": 29333776,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29333776?v=4",
|
|
"html_url": "https:\/\/github.com\/T13nn3s"
|
|
},
|
|
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
|
|
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T05:46:31Z",
|
|
"updated_at": "2020-07-17T18:34:54Z",
|
|
"pushed_at": "2020-07-16T11:24:45Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279778118,
|
|
"name": "SIGRed",
|
|
"full_name": "corelight\/SIGRed",
|
|
"owner": {
|
|
"login": "corelight",
|
|
"id": 21672558,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21672558?v=4",
|
|
"html_url": "https:\/\/github.com\/corelight"
|
|
},
|
|
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
|
|
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T05:55:20Z",
|
|
"updated_at": "2020-07-17T01:20:44Z",
|
|
"pushed_at": "2020-07-17T01:20:41Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279961698,
|
|
"name": "dRMM-CVE-2020-1350-response",
|
|
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
|
|
"owner": {
|
|
"login": "jmaddington",
|
|
"id": 2353597,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2353597?v=4",
|
|
"html_url": "https:\/\/github.com\/jmaddington"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
|
|
"description": "Windows registry mitigation response to CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T19:43:39Z",
|
|
"updated_at": "2020-07-15T19:59:04Z",
|
|
"pushed_at": "2020-07-15T19:59:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279999285,
|
|
"name": "CVE-2020-1350-DoS",
|
|
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
|
|
"owner": {
|
|
"login": "maxpl0it",
|
|
"id": 27973683,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/27973683?v=4",
|
|
"html_url": "https:\/\/github.com\/maxpl0it"
|
|
},
|
|
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
|
|
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-15T23:00:00Z",
|
|
"updated_at": "2020-07-17T20:58:01Z",
|
|
"pushed_at": "2020-07-17T13:07:29Z",
|
|
"stargazers_count": 140,
|
|
"watchers_count": 140,
|
|
"forks_count": 28,
|
|
"forks": 28,
|
|
"watchers": 140,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 280207373,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "captainGeech42\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "captainGeech42",
|
|
"id": 4255667,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/4255667?v=4",
|
|
"html_url": "https:\/\/github.com\/captainGeech42"
|
|
},
|
|
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
|
|
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
|
|
"fork": false,
|
|
"created_at": "2020-07-16T16:46:48Z",
|
|
"updated_at": "2020-07-17T13:50:10Z",
|
|
"pushed_at": "2020-07-16T18:32:04Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
}
|
|
] |