mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 05:12:21 +01:00
362 lines
No EOL
12 KiB
JSON
362 lines
No EOL
12 KiB
JSON
[
|
|
{
|
|
"id": 405152543,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "lockedbyte\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "lockedbyte",
|
|
"id": 37779789,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37779789?v=4",
|
|
"html_url": "https:\/\/github.com\/lockedbyte"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lockedbyte\/CVE-2021-40444",
|
|
"description": "CVE-2021-40444 PoC",
|
|
"fork": false,
|
|
"created_at": "2021-09-10T16:55:53Z",
|
|
"updated_at": "2022-02-19T20:59:00Z",
|
|
"pushed_at": "2021-12-25T18:31:02Z",
|
|
"stargazers_count": 1368,
|
|
"watchers_count": 1368,
|
|
"forks_count": 450,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 450,
|
|
"watchers": 1368,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 405716870,
|
|
"name": "CVE-2021-40444_builders",
|
|
"full_name": "aslitsecurity\/CVE-2021-40444_builders",
|
|
"owner": {
|
|
"login": "aslitsecurity",
|
|
"id": 9478055,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9478055?v=4",
|
|
"html_url": "https:\/\/github.com\/aslitsecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aslitsecurity\/CVE-2021-40444_builders",
|
|
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
|
"fork": false,
|
|
"created_at": "2021-09-12T18:05:53Z",
|
|
"updated_at": "2022-02-17T13:28:29Z",
|
|
"pushed_at": "2021-10-11T20:53:19Z",
|
|
"stargazers_count": 163,
|
|
"watchers_count": 163,
|
|
"forks_count": 45,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 45,
|
|
"watchers": 163,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 406942491,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "klezVirus\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "klezVirus",
|
|
"id": 8959898,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8959898?v=4",
|
|
"html_url": "https:\/\/github.com\/klezVirus"
|
|
},
|
|
"html_url": "https:\/\/github.com\/klezVirus\/CVE-2021-40444",
|
|
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-09-15T22:34:35Z",
|
|
"updated_at": "2022-02-17T09:23:38Z",
|
|
"pushed_at": "2021-10-12T23:05:07Z",
|
|
"stargazers_count": 569,
|
|
"watchers_count": 569,
|
|
"forks_count": 126,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"0day",
|
|
"cve-2021-40444",
|
|
"msword",
|
|
"office",
|
|
"rce",
|
|
"remote-code-execution"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 126,
|
|
"watchers": 569,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 409931314,
|
|
"name": "CVE-2021-40444_CAB_archives",
|
|
"full_name": "kal1gh0st\/CVE-2021-40444_CAB_archives",
|
|
"owner": {
|
|
"login": "kal1gh0st",
|
|
"id": 56889513,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56889513?v=4",
|
|
"html_url": "https:\/\/github.com\/kal1gh0st"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kal1gh0st\/CVE-2021-40444_CAB_archives",
|
|
"description": "CVE 2021 40444 Windows Exploit services.dll",
|
|
"fork": false,
|
|
"created_at": "2021-09-24T10:59:34Z",
|
|
"updated_at": "2021-12-15T00:43:34Z",
|
|
"pushed_at": "2021-10-21T09:46:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 412946991,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "H0j3n\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "H0j3n",
|
|
"id": 51261763,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51261763?v=4",
|
|
"html_url": "https:\/\/github.com\/H0j3n"
|
|
},
|
|
"html_url": "https:\/\/github.com\/H0j3n\/CVE-2021-40444",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-10-03T01:13:42Z",
|
|
"updated_at": "2022-01-26T02:35:54Z",
|
|
"pushed_at": "2021-10-10T06:32:11Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-40444"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 417748789,
|
|
"name": "TIC4301_Project",
|
|
"full_name": "factionsypho\/TIC4301_Project",
|
|
"owner": {
|
|
"login": "factionsypho",
|
|
"id": 40175487,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40175487?v=4",
|
|
"html_url": "https:\/\/github.com\/factionsypho"
|
|
},
|
|
"html_url": "https:\/\/github.com\/factionsypho\/TIC4301_Project",
|
|
"description": "TIC4301 Project - CVE-2021-40444",
|
|
"fork": false,
|
|
"created_at": "2021-10-16T07:07:26Z",
|
|
"updated_at": "2021-12-06T13:36:02Z",
|
|
"pushed_at": "2021-12-06T13:35:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 420818304,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "TiagoSergio\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "TiagoSergio",
|
|
"id": 24528913,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24528913?v=4",
|
|
"html_url": "https:\/\/github.com\/TiagoSergio"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TiagoSergio\/CVE-2021-40444",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-10-24T23:17:12Z",
|
|
"updated_at": "2021-10-24T23:17:28Z",
|
|
"pushed_at": "2021-10-24T23:17:25Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 422246280,
|
|
"name": "CVE-2021-40444-POC",
|
|
"full_name": "0xK4gura\/CVE-2021-40444-POC",
|
|
"owner": {
|
|
"login": "0xK4gura",
|
|
"id": 92495243,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92495243?v=4",
|
|
"html_url": "https:\/\/github.com\/0xK4gura"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xK4gura\/CVE-2021-40444-POC",
|
|
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
|
|
"fork": false,
|
|
"created_at": "2021-10-28T14:55:46Z",
|
|
"updated_at": "2022-01-26T02:46:54Z",
|
|
"pushed_at": "2021-10-31T08:15:00Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 425935080,
|
|
"name": "word_mshtml",
|
|
"full_name": "Zeop-CyberSec\/word_mshtml",
|
|
"owner": {
|
|
"login": "Zeop-CyberSec",
|
|
"id": 68154603,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68154603?v=4",
|
|
"html_url": "https:\/\/github.com\/Zeop-CyberSec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Zeop-CyberSec\/word_mshtml",
|
|
"description": "Contains the offensive (exploit and auxiliary) modules for the CVE-2021-40444.",
|
|
"fork": false,
|
|
"created_at": "2021-11-08T17:38:30Z",
|
|
"updated_at": "2021-12-11T21:29:07Z",
|
|
"pushed_at": "2021-11-09T11:12:53Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 430718153,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "Alexcot25051999\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "Alexcot25051999",
|
|
"id": 94846095,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/94846095?v=4",
|
|
"html_url": "https:\/\/github.com\/Alexcot25051999"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Alexcot25051999\/CVE-2021-40444",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-11-22T13:29:20Z",
|
|
"updated_at": "2021-11-22T13:41:39Z",
|
|
"pushed_at": "2021-11-22T13:41:36Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 431721742,
|
|
"name": "CVE-2021-40444-exp",
|
|
"full_name": "lisinan988\/CVE-2021-40444-exp",
|
|
"owner": {
|
|
"login": "lisinan988",
|
|
"id": 87479262,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87479262?v=4",
|
|
"html_url": "https:\/\/github.com\/lisinan988"
|
|
},
|
|
"html_url": "https:\/\/github.com\/lisinan988\/CVE-2021-40444-exp",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-11-25T05:13:05Z",
|
|
"updated_at": "2021-11-25T05:13:19Z",
|
|
"pushed_at": "2021-11-25T05:13:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 439810103,
|
|
"name": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
|
"full_name": "34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
|
"owner": {
|
|
"login": "34zY",
|
|
"id": 55347142,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55347142?v=4",
|
|
"html_url": "https:\/\/github.com\/34zY"
|
|
},
|
|
"html_url": "https:\/\/github.com\/34zY\/Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
|
"description": "CVE-2021-40444",
|
|
"fork": false,
|
|
"created_at": "2021-12-19T08:16:07Z",
|
|
"updated_at": "2022-01-25T08:55:47Z",
|
|
"pushed_at": "2021-12-19T08:27:33Z",
|
|
"stargazers_count": 53,
|
|
"watchers_count": 53,
|
|
"forks_count": 21,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 21,
|
|
"watchers": 53,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 442372306,
|
|
"name": "CVE-2021-40444",
|
|
"full_name": "MRacumen\/CVE-2021-40444",
|
|
"owner": {
|
|
"login": "MRacumen",
|
|
"id": 73010693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73010693?v=4",
|
|
"html_url": "https:\/\/github.com\/MRacumen"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MRacumen\/CVE-2021-40444",
|
|
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
|
"fork": false,
|
|
"created_at": "2021-12-28T06:33:25Z",
|
|
"updated_at": "2021-12-28T09:38:18Z",
|
|
"pushed_at": "2021-12-28T06:44:19Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |