PoC-in-GitHub/2020/CVE-2020-16898.json
2021-07-15 06:11:45 +09:00

324 lines
No EOL
11 KiB
JSON

[
{
"id": 302145941,
"name": "CVE-2020-16898",
"full_name": "advanced-threat-research\/CVE-2020-16898",
"owner": {
"login": "advanced-threat-research",
"id": 27901279,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27901279?v=4",
"html_url": "https:\/\/github.com\/advanced-threat-research"
},
"html_url": "https:\/\/github.com\/advanced-threat-research\/CVE-2020-16898",
"description": "CVE-2020-16898 (Bad Neighbor) Microsoft Windows TCP\/IP Vulnerability Detection Logic and Rule",
"fork": false,
"created_at": "2020-10-07T19:56:09Z",
"updated_at": "2021-07-06T12:23:33Z",
"pushed_at": "2020-10-26T10:15:32Z",
"stargazers_count": 205,
"watchers_count": 205,
"forks_count": 30,
"forks": 30,
"watchers": 205,
"score": 0
},
{
"id": 303891965,
"name": "CVE-2020-16898",
"full_name": "corelight\/CVE-2020-16898",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/CVE-2020-16898",
"description": "A network detection package for CVE-2020-16898 (Windows TCP\/IP Remote Code Execution Vulnerability)",
"fork": false,
"created_at": "2020-10-14T03:25:00Z",
"updated_at": "2021-02-24T17:35:51Z",
"pushed_at": "2020-10-22T15:22:55Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 304024639,
"name": "CVE-2020-16898_Check",
"full_name": "Maliek\/CVE-2020-16898_Check",
"owner": {
"login": "Maliek",
"id": 8858341,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8858341?v=4",
"html_url": "https:\/\/github.com\/Maliek"
},
"html_url": "https:\/\/github.com\/Maliek\/CVE-2020-16898_Check",
"description": "Minor powershell script that checks for vulnerable interfaces.",
"fork": false,
"created_at": "2020-10-14T13:30:38Z",
"updated_at": "2020-10-16T09:20:02Z",
"pushed_at": "2020-10-16T09:20:00Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 3,
"forks": 3,
"watchers": 2,
"score": 0
},
{
"id": 304044860,
"name": "CVE-2020-16898",
"full_name": "ZephrFish\/CVE-2020-16898",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-16898",
"description": "HoneyPoC 2.0: Proof-of-Concept (PoC) script to exploit IPv6 (CVE-2020-16898).",
"fork": false,
"created_at": "2020-10-14T14:42:52Z",
"updated_at": "2021-05-17T07:52:28Z",
"pushed_at": "2020-10-14T16:56:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 7,
"forks": 7,
"watchers": 19,
"score": 0
},
{
"id": 304075693,
"name": "cve-2020-16898",
"full_name": "esnet-security\/cve-2020-16898",
"owner": {
"login": "esnet-security",
"id": 46755983,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46755983?v=4",
"html_url": "https:\/\/github.com\/esnet-security"
},
"html_url": "https:\/\/github.com\/esnet-security\/cve-2020-16898",
"description": "Detects CVE-2020-16898: \"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T16:38:06Z",
"updated_at": "2020-10-15T15:39:52Z",
"pushed_at": "2020-10-15T23:00:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304139222,
"name": "CVE-2020-16898-Bad-Neighbor",
"full_name": "initconf\/CVE-2020-16898-Bad-Neighbor",
"owner": {
"login": "initconf",
"id": 4044729,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4044729?v=4",
"html_url": "https:\/\/github.com\/initconf"
},
"html_url": "https:\/\/github.com\/initconf\/CVE-2020-16898-Bad-Neighbor",
"description": "Zeek detection for CVE-2020-16898-\"Bad Neighbor\"",
"fork": false,
"created_at": "2020-10-14T21:25:09Z",
"updated_at": "2020-10-22T21:12:06Z",
"pushed_at": "2020-10-22T21:12:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 304538917,
"name": "CVE-2020-16898",
"full_name": "Q1984\/CVE-2020-16898",
"owner": {
"login": "Q1984",
"id": 50952023,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50952023?v=4",
"html_url": "https:\/\/github.com\/Q1984"
},
"html_url": "https:\/\/github.com\/Q1984\/CVE-2020-16898",
"description": "PoC Bad Neighbor BSOD exploit",
"fork": false,
"created_at": "2020-10-16T06:27:24Z",
"updated_at": "2020-10-16T11:17:23Z",
"pushed_at": "2020-10-16T11:17:22Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304755825,
"name": "cve-2020-16898",
"full_name": "0xeb-bp\/cve-2020-16898",
"owner": {
"login": "0xeb-bp",
"id": 53204152,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53204152?v=4",
"html_url": "https:\/\/github.com\/0xeb-bp"
},
"html_url": "https:\/\/github.com\/0xeb-bp\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898 (badneighbor)",
"fork": false,
"created_at": "2020-10-16T23:03:15Z",
"updated_at": "2021-05-14T01:43:38Z",
"pushed_at": "2020-10-16T23:12:52Z",
"stargazers_count": 20,
"watchers_count": 20,
"forks_count": 5,
"forks": 5,
"watchers": 20,
"score": 0
},
{
"id": 304797048,
"name": "cve-2020-16898",
"full_name": "jiansiting\/cve-2020-16898",
"owner": {
"login": "jiansiting",
"id": 28823754,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28823754?v=4",
"html_url": "https:\/\/github.com\/jiansiting"
},
"html_url": "https:\/\/github.com\/jiansiting\/cve-2020-16898",
"description": "PoC BSOD for CVE-2020-16898",
"fork": false,
"created_at": "2020-10-17T04:32:11Z",
"updated_at": "2020-10-28T03:38:27Z",
"pushed_at": "2020-10-17T04:32:19Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 4,
"forks": 4,
"watchers": 6,
"score": 0
},
{
"id": 304819444,
"name": "CVE-2020-16898_Workaround",
"full_name": "CPO-EH\/CVE-2020-16898_Workaround",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Workaround",
"description": "PowerShell Script Workaround for VCE-220-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T07:09:58Z",
"updated_at": "2020-10-21T16:45:04Z",
"pushed_at": "2020-10-21T16:45:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 304851828,
"name": "CVE-2020-16898_Checker",
"full_name": "CPO-EH\/CVE-2020-16898_Checker",
"owner": {
"login": "CPO-EH",
"id": 56457033,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56457033?v=4",
"html_url": "https:\/\/github.com\/CPO-EH"
},
"html_url": "https:\/\/github.com\/CPO-EH\/CVE-2020-16898_Checker",
"description": "Check all Network Interfaces for CVE-2020-16898 Vulnerability",
"fork": false,
"created_at": "2020-10-17T10:23:56Z",
"updated_at": "2020-10-21T17:45:24Z",
"pushed_at": "2020-10-21T17:45:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 304888543,
"name": "CVE-2020-16898-exp",
"full_name": "momika233\/CVE-2020-16898-exp",
"owner": {
"login": "momika233",
"id": 56291820,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56291820?v=4",
"html_url": "https:\/\/github.com\/momika233"
},
"html_url": "https:\/\/github.com\/momika233\/CVE-2020-16898-exp",
"description": null,
"fork": false,
"created_at": "2020-10-17T13:52:08Z",
"updated_at": "2021-01-06T08:49:01Z",
"pushed_at": "2020-10-17T13:52:38Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 8,
"forks": 8,
"watchers": 15,
"score": 0
},
{
"id": 305598825,
"name": "CVE-2020-16898-EXP-POC",
"full_name": "komomon\/CVE-2020-16898-EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898-EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-20T05:24:47Z",
"updated_at": "2021-01-29T10:23:15Z",
"pushed_at": "2020-10-28T11:21:00Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 0,
"forks": 0,
"watchers": 4,
"score": 0
},
{
"id": 307994197,
"name": "CVE-2020-16898--EXP-POC",
"full_name": "komomon\/CVE-2020-16898--EXP-POC",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2020-16898--EXP-POC",
"description": "CVE-2020-16898 Windows TCP\/IP远程代码执行漏洞 EXP&POC",
"fork": false,
"created_at": "2020-10-28T11:25:58Z",
"updated_at": "2021-03-22T03:25:52Z",
"pushed_at": "2020-10-28T11:27:17Z",
"stargazers_count": 7,
"watchers_count": 7,
"forks_count": 6,
"forks": 6,
"watchers": 7,
"score": 0
}
]