PoC-in-GitHub/2019/CVE-2019-0708.json
2020-08-14 06:06:27 +09:00

255 lines
No EOL
9.2 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 189498490,
"name": "bluekeep_CVE-2019-0708_poc_to_exploit",
"full_name": "algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
"owner": {
"login": "algo7",
"id": 11154774,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11154774?v=4",
"html_url": "https:\/\/github.com\/algo7"
},
"html_url": "https:\/\/github.com\/algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-08-10T05:50:22Z",
"pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 332,
"watchers_count": 332,
"forks_count": 116,
"forks": 116,
"watchers": 332,
"score": 0
},
{
"id": 191340467,
"name": "CVE-2019-0708-PoC",
"full_name": "at0mik\/CVE-2019-0708-PoC",
"owner": {
"login": "at0mik",
"id": 46066196,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46066196?v=4",
"html_url": "https:\/\/github.com\/at0mik"
},
"html_url": "https:\/\/github.com\/at0mik\/CVE-2019-0708-PoC",
"description": "CVE-2019-0708-PoC Notes and Pseudocodes.",
"fork": false,
"created_at": "2019-06-11T09:38:36Z",
"updated_at": "2020-07-30T12:08:10Z",
"pushed_at": "2020-05-16T19:37:06Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"watchers": 15,
"score": 0
},
{
"id": 203477227,
"name": "CVE-2019-0708-test",
"full_name": "fade-vivida\/CVE-2019-0708-test",
"owner": {
"login": "fade-vivida",
"id": 38774342,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38774342?v=4",
"html_url": "https:\/\/github.com\/fade-vivida"
},
"html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test",
"description": null,
"fork": false,
"created_at": "2019-08-21T00:48:55Z",
"updated_at": "2020-03-11T13:53:42Z",
"pushed_at": "2019-11-28T01:38:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 221436919,
"name": "CVE-2019-0708-DOS",
"full_name": "R4v3nG\/CVE-2019-0708-DOS",
"owner": {
"login": "R4v3nG",
"id": 43517528,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43517528?v=4",
"html_url": "https:\/\/github.com\/R4v3nG"
},
"html_url": "https:\/\/github.com\/R4v3nG\/CVE-2019-0708-DOS",
"description": "CVE-2019-0708 DOS RDP",
"fork": false,
"created_at": "2019-11-13T10:49:51Z",
"updated_at": "2019-12-01T20:58:13Z",
"pushed_at": "2019-12-01T20:58:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 222191780,
"name": "sudoku.py",
"full_name": "lwtz\/sudoku.py",
"owner": {
"login": "lwtz",
"id": 25403119,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25403119?v=4",
"html_url": "https:\/\/github.com\/lwtz"
},
"html_url": "https:\/\/github.com\/lwtz\/sudoku.py",
"description": "CVE-2019-0708",
"fork": false,
"created_at": "2019-11-17T03:28:28Z",
"updated_at": "2020-07-19T00:58:26Z",
"pushed_at": "2020-07-19T00:58:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 223320391,
"name": "-2-CVE-2019-0708",
"full_name": "ulisesrc\/-2-CVE-2019-0708",
"owner": {
"login": "ulisesrc",
"id": 3741400,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3741400?v=4",
"html_url": "https:\/\/github.com\/ulisesrc"
},
"html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708",
"description": null,
"fork": false,
"created_at": "2019-11-22T04:00:49Z",
"updated_at": "2019-11-22T04:01:11Z",
"pushed_at": "2019-11-22T04:01:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 226491441,
"name": "CVE-2019-0708",
"full_name": "worawit\/CVE-2019-0708",
"owner": {
"login": "worawit",
"id": 1352296,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1352296?v=4",
"html_url": "https:\/\/github.com\/worawit"
},
"html_url": "https:\/\/github.com\/worawit\/CVE-2019-0708",
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2020-07-22T16:10:47Z",
"pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 6,
"forks": 6,
"watchers": 72,
"score": 0
},
{
"id": 235239045,
"name": "CVE-2019-0708-EXP-Windows",
"full_name": "cbwang505\/CVE-2019-0708-EXP-Windows",
"owner": {
"login": "cbwang505",
"id": 4487329,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4487329?v=4",
"html_url": "https:\/\/github.com\/cbwang505"
},
"html_url": "https:\/\/github.com\/cbwang505\/CVE-2019-0708-EXP-Windows",
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-08-13T14:10:11Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 57,
"watchers_count": 57,
"forks_count": 19,
"forks": 19,
"watchers": 57,
"score": 0
},
{
"id": 241542314,
"name": "CVE-2019-0708-Windows",
"full_name": "eastmountyxz\/CVE-2019-0708-Windows",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows",
"description": "这篇文章将分享Windows远程桌面服务漏洞CVE-2019-0708并详细讲解该漏洞及防御措施。作者作为网络安全的小白分享一些自学基础教程给大家主要是关于安全工具和实践操作的在线笔记希望您们喜欢。同时更希望您能与我一起操作和进步后续将深入学习网络安全和系统安全知识并分享相关实验。总之希望该系列文章对博友有所帮助写文不易大神们不喜勿喷谢谢",
"fork": false,
"created_at": "2020-02-19T05:40:22Z",
"updated_at": "2020-03-13T12:53:52Z",
"pushed_at": "2020-03-13T12:53:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 247883778,
"name": "Scanner-CVE-2019-0708",
"full_name": "JSec1337\/Scanner-CVE-2019-0708",
"owner": {
"login": "JSec1337",
"id": 62246378,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62246378?v=4",
"html_url": "https:\/\/github.com\/JSec1337"
},
"html_url": "https:\/\/github.com\/JSec1337\/Scanner-CVE-2019-0708",
"description": "Scanner CVE-2019-0708",
"fork": false,
"created_at": "2020-03-17T05:05:14Z",
"updated_at": "2020-03-17T06:50:00Z",
"pushed_at": "2020-03-17T06:49:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 266412261,
"name": "bLuEkEeP-GUI",
"full_name": "nochemax\/bLuEkEeP-GUI",
"owner": {
"login": "nochemax",
"id": 8238744,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8238744?v=4",
"html_url": "https:\/\/github.com\/nochemax"
},
"html_url": "https:\/\/github.com\/nochemax\/bLuEkEeP-GUI",
"description": "vulnerabilidad CVE-2019-0708 testing y explotacion ",
"fork": false,
"created_at": "2020-05-23T20:15:29Z",
"updated_at": "2020-05-23T20:38:41Z",
"pushed_at": "2020-05-23T20:38:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]