mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 19:31:39 +01:00
196 lines
No EOL
6.9 KiB
JSON
196 lines
No EOL
6.9 KiB
JSON
[
|
|
{
|
|
"id": 246641886,
|
|
"name": "NSE-scripts",
|
|
"full_name": "psc4re\/NSE-scripts",
|
|
"owner": {
|
|
"login": "psc4re",
|
|
"id": 4672886,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
|
|
"html_url": "https:\/\/github.com\/psc4re"
|
|
},
|
|
"html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
|
|
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
|
|
"fork": false,
|
|
"created_at": "2020-03-11T17:51:29Z",
|
|
"updated_at": "2022-11-23T23:55:39Z",
|
|
"pushed_at": "2021-08-16T18:16:20Z",
|
|
"stargazers_count": 140,
|
|
"watchers_count": 140,
|
|
"has_discussions": false,
|
|
"forks_count": 27,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-1350",
|
|
"cve-2021-21972",
|
|
"cve-2021-34473",
|
|
"nmap",
|
|
"nmap-scan-script",
|
|
"nmap-scripts",
|
|
"nse-script",
|
|
"poc",
|
|
"proxyshell",
|
|
"scanner",
|
|
"sigred",
|
|
"smbghost",
|
|
"smbv3",
|
|
"vcenter",
|
|
"vulnerability",
|
|
"vulnerability-detection"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 27,
|
|
"watchers": 140,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 279670211,
|
|
"name": "CVE-2020-1350_HoneyPoC",
|
|
"full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
|
|
"owner": {
|
|
"login": "ZephrFish",
|
|
"id": 5783068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
|
"html_url": "https:\/\/github.com\/ZephrFish"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
|
|
"description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
|
|
"fork": false,
|
|
"created_at": "2020-07-14T19:02:25Z",
|
|
"updated_at": "2022-11-29T03:32:04Z",
|
|
"pushed_at": "2021-06-10T02:46:52Z",
|
|
"stargazers_count": 272,
|
|
"watchers_count": 272,
|
|
"has_discussions": false,
|
|
"forks_count": 77,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-1350",
|
|
"sigred"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 77,
|
|
"watchers": 272,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 280336928,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "connormcgarr\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "connormcgarr",
|
|
"id": 45445720,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
|
|
"html_url": "https:\/\/github.com\/connormcgarr"
|
|
},
|
|
"html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
|
|
"description": "CVE-2020-1350 Proof-of-Concept",
|
|
"fork": false,
|
|
"created_at": "2020-07-17T05:41:19Z",
|
|
"updated_at": "2022-08-29T16:44:17Z",
|
|
"pushed_at": "2020-07-27T16:20:06Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 10,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 280916907,
|
|
"name": "CVE-2020-1350",
|
|
"full_name": "CVEmaster\/CVE-2020-1350",
|
|
"owner": {
|
|
"login": "CVEmaster",
|
|
"id": 68512490,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
|
|
"html_url": "https:\/\/github.com\/CVEmaster"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
|
|
"description": "DNS Vulnerability - CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-19T17:32:47Z",
|
|
"updated_at": "2020-10-10T20:39:05Z",
|
|
"pushed_at": "2020-07-20T14:25:59Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 281667659,
|
|
"name": "cve-2020-1350",
|
|
"full_name": "gdwnet\/cve-2020-1350",
|
|
"owner": {
|
|
"login": "gdwnet",
|
|
"id": 19855556,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
|
|
"html_url": "https:\/\/github.com\/gdwnet"
|
|
},
|
|
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
|
|
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
|
|
"fork": false,
|
|
"created_at": "2020-07-22T12:11:33Z",
|
|
"updated_at": "2020-10-10T20:40:26Z",
|
|
"pushed_at": "2020-07-22T12:15:00Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 282558950,
|
|
"name": "CVE-2020-1350-Fix",
|
|
"full_name": "simeononsecurity\/CVE-2020-1350-Fix",
|
|
"owner": {
|
|
"login": "simeononsecurity",
|
|
"id": 4913771,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
|
|
"html_url": "https:\/\/github.com\/simeononsecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
|
|
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
|
|
"fork": false,
|
|
"created_at": "2020-07-26T02:12:36Z",
|
|
"updated_at": "2020-10-10T20:40:04Z",
|
|
"pushed_at": "2020-07-26T02:13:24Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 2,
|
|
"score": 0
|
|
}
|
|
] |