mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
508 lines
No EOL
18 KiB
JSON
508 lines
No EOL
18 KiB
JSON
[
|
|
{
|
|
"id": 282072947,
|
|
"name": "CVE-2020-1472-visualizer",
|
|
"full_name": "mingchen-script\/CVE-2020-1472-visualizer",
|
|
"owner": {
|
|
"login": "mingchen-script",
|
|
"id": 68715366,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/68715366?v=4",
|
|
"html_url": "https:\/\/github.com\/mingchen-script"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mingchen-script\/CVE-2020-1472-visualizer",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-07-23T22:52:05Z",
|
|
"updated_at": "2020-09-15T04:14:19Z",
|
|
"pushed_at": "2020-08-06T22:24:04Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 293756101,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "SecuraBV\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "SecuraBV",
|
|
"id": 46344423,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46344423?v=4",
|
|
"html_url": "https:\/\/github.com\/SecuraBV"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
|
|
"description": "Test tool for CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-08T08:58:37Z",
|
|
"updated_at": "2020-09-17T03:07:42Z",
|
|
"pushed_at": "2020-09-16T15:49:24Z",
|
|
"stargazers_count": 805,
|
|
"watchers_count": 805,
|
|
"forks_count": 157,
|
|
"forks": 157,
|
|
"watchers": 805,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295480770,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "cube0x0\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "cube0x0",
|
|
"id": 39370848,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/39370848?v=4",
|
|
"html_url": "https:\/\/github.com\/cube0x0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-14T16:52:37Z",
|
|
"updated_at": "2020-09-16T06:27:21Z",
|
|
"pushed_at": "2020-09-14T16:53:07Z",
|
|
"stargazers_count": 24,
|
|
"watchers_count": 24,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 24,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295481822,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "dirkjanm\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "dirkjanm",
|
|
"id": 1773762,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1773762?v=4",
|
|
"html_url": "https:\/\/github.com\/dirkjanm"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
|
|
"description": "PoC for Zerologon - all research credits go to Tom Tervoort of Secura",
|
|
"fork": false,
|
|
"created_at": "2020-09-14T16:56:51Z",
|
|
"updated_at": "2020-09-17T02:22:02Z",
|
|
"pushed_at": "2020-09-15T15:50:03Z",
|
|
"stargazers_count": 418,
|
|
"watchers_count": 418,
|
|
"forks_count": 113,
|
|
"forks": 113,
|
|
"watchers": 418,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295482050,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "VoidSec\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "VoidSec",
|
|
"id": 5717603,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5717603?v=4",
|
|
"html_url": "https:\/\/github.com\/VoidSec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/VoidSec\/CVE-2020-1472",
|
|
"description": "Exploit Code for CVE-2020-1472 aka Zerologon",
|
|
"fork": false,
|
|
"created_at": "2020-09-14T16:57:49Z",
|
|
"updated_at": "2020-09-17T02:08:52Z",
|
|
"pushed_at": "2020-09-15T14:52:26Z",
|
|
"stargazers_count": 63,
|
|
"watchers_count": 63,
|
|
"forks_count": 13,
|
|
"forks": 13,
|
|
"watchers": 63,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295515909,
|
|
"name": "zerologon",
|
|
"full_name": "risksense\/zerologon",
|
|
"owner": {
|
|
"login": "risksense",
|
|
"id": 1999284,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1999284?v=4",
|
|
"html_url": "https:\/\/github.com\/risksense"
|
|
},
|
|
"html_url": "https:\/\/github.com\/risksense\/zerologon",
|
|
"description": "Exploit for zerologon cve-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-14T19:19:07Z",
|
|
"updated_at": "2020-09-17T00:54:54Z",
|
|
"pushed_at": "2020-09-14T19:44:25Z",
|
|
"stargazers_count": 75,
|
|
"watchers_count": 75,
|
|
"forks_count": 23,
|
|
"forks": 23,
|
|
"watchers": 75,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295517706,
|
|
"name": "zer0dump",
|
|
"full_name": "bb00\/zer0dump",
|
|
"owner": {
|
|
"login": "bb00",
|
|
"id": 11166320,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11166320?v=4",
|
|
"html_url": "https:\/\/github.com\/bb00"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bb00\/zer0dump",
|
|
"description": "Abuse CVE-2020-1472 (Zerologon) to take over a domain and then repair the local stored machine account password.",
|
|
"fork": false,
|
|
"created_at": "2020-09-14T19:27:14Z",
|
|
"updated_at": "2020-09-17T02:49:38Z",
|
|
"pushed_at": "2020-09-16T14:05:27Z",
|
|
"stargazers_count": 70,
|
|
"watchers_count": 70,
|
|
"forks_count": 18,
|
|
"forks": 18,
|
|
"watchers": 70,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295692006,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "Kamimuka\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "Kamimuka",
|
|
"id": 19571618,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19571618?v=4",
|
|
"html_url": "https:\/\/github.com\/Kamimuka"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Kamimuka\/CVE-2020-1472",
|
|
"description": "CVE-2020-1472漏洞复现过程",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T10:25:47Z",
|
|
"updated_at": "2020-09-15T10:39:42Z",
|
|
"pushed_at": "2020-09-15T10:39:40Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295716616,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "NAXG\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "NAXG",
|
|
"id": 28560949,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/28560949?v=4",
|
|
"html_url": "https:\/\/github.com\/NAXG"
|
|
},
|
|
"html_url": "https:\/\/github.com\/NAXG\/CVE-2020-1472",
|
|
"description": "CVE-2020-1472复现流程",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T12:11:49Z",
|
|
"updated_at": "2020-09-16T08:45:08Z",
|
|
"pushed_at": "2020-09-16T08:45:06Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295743213,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "s0wr0b1ndef\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "s0wr0b1ndef",
|
|
"id": 37288034,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/37288034?v=4",
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef"
|
|
},
|
|
"html_url": "https:\/\/github.com\/s0wr0b1ndef\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-15T13:50:01Z",
|
|
"updated_at": "2020-09-15T13:50:22Z",
|
|
"pushed_at": "2020-09-15T13:50:18Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295754317,
|
|
"name": "zerologon-CVE-2020-1472",
|
|
"full_name": "harshil-shah004\/zerologon-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "harshil-shah004",
|
|
"id": 34110198,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/34110198?v=4",
|
|
"html_url": "https:\/\/github.com\/harshil-shah004"
|
|
},
|
|
"html_url": "https:\/\/github.com\/harshil-shah004\/zerologon-CVE-2020-1472",
|
|
"description": "PoC for Zerologon (CVE-2020-1472) - Exploit",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T14:29:24Z",
|
|
"updated_at": "2020-09-16T11:28:23Z",
|
|
"pushed_at": "2020-09-16T11:06:19Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295781919,
|
|
"name": "CVE-2020-1472-EXP",
|
|
"full_name": "k8gege\/CVE-2020-1472-EXP",
|
|
"owner": {
|
|
"login": "k8gege",
|
|
"id": 42312878,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/42312878?v=4",
|
|
"html_url": "https:\/\/github.com\/k8gege"
|
|
},
|
|
"html_url": "https:\/\/github.com\/k8gege\/CVE-2020-1472-EXP",
|
|
"description": "Ladon Moudle CVE-2020-1472 Exploit 域控提权神器",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T16:10:21Z",
|
|
"updated_at": "2020-09-17T02:05:38Z",
|
|
"pushed_at": "2020-09-15T16:40:53Z",
|
|
"stargazers_count": 23,
|
|
"watchers_count": 23,
|
|
"forks_count": 6,
|
|
"forks": 6,
|
|
"watchers": 23,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295788757,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "422926799\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "422926799",
|
|
"id": 29516567,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/29516567?v=4",
|
|
"html_url": "https:\/\/github.com\/422926799"
|
|
},
|
|
"html_url": "https:\/\/github.com\/422926799\/CVE-2020-1472",
|
|
"description": "CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-15T16:36:40Z",
|
|
"updated_at": "2020-09-16T03:58:43Z",
|
|
"pushed_at": "2020-09-15T16:38:45Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295903888,
|
|
"name": "zabbix-template-CVE-2020-1472",
|
|
"full_name": "scv-m\/zabbix-template-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "scv-m",
|
|
"id": 965541,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/965541?v=4",
|
|
"html_url": "https:\/\/github.com\/scv-m"
|
|
},
|
|
"html_url": "https:\/\/github.com\/scv-m\/zabbix-template-CVE-2020-1472",
|
|
"description": "Zabbix Template to monitor for Windows Event Viewer event's related to Netlogon Elevation of Privilege Vulnerability - CVE-2020-1472. Monitors event ID's 5827, 5828 & 5829. See: https:\/\/portal.msrc.microsoft.com\/en-US\/security-guidance\/advisory\/CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T02:37:52Z",
|
|
"updated_at": "2020-09-16T02:47:42Z",
|
|
"pushed_at": "2020-09-16T02:47:40Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295915198,
|
|
"name": "cve-2020-1472",
|
|
"full_name": "mstxq17\/cve-2020-1472",
|
|
"owner": {
|
|
"login": "mstxq17",
|
|
"id": 29624427,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/29624427?v=4",
|
|
"html_url": "https:\/\/github.com\/mstxq17"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mstxq17\/cve-2020-1472",
|
|
"description": "cve-2020-1472 复现利用及其exp",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T03:40:47Z",
|
|
"updated_at": "2020-09-17T02:28:59Z",
|
|
"pushed_at": "2020-09-16T15:03:32Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295917575,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "Fa1c0n35\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-16T03:54:27Z",
|
|
"updated_at": "2020-09-16T03:54:39Z",
|
|
"pushed_at": "2020-09-16T03:54:37Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295917979,
|
|
"name": "SecuraBV-CVE-2020-1472",
|
|
"full_name": "Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "Fa1c0n35",
|
|
"id": 33335488,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33335488?v=4",
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Fa1c0n35\/SecuraBV-CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-16T03:57:04Z",
|
|
"updated_at": "2020-09-16T03:57:16Z",
|
|
"pushed_at": "2020-09-16T03:57:14Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295956141,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "CanciuCostin\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "CanciuCostin",
|
|
"id": 27332434,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/27332434?v=4",
|
|
"html_url": "https:\/\/github.com\/CanciuCostin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/CanciuCostin\/CVE-2020-1472",
|
|
"description": "CVE-2020-1472 - Zero Logon vulnerability Python implementation",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T07:25:22Z",
|
|
"updated_at": "2020-09-16T23:12:03Z",
|
|
"pushed_at": "2020-09-16T08:39:06Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295972450,
|
|
"name": "cve-2020-1472_Tool-collection",
|
|
"full_name": "0xcccc666\/cve-2020-1472_Tool-collection",
|
|
"owner": {
|
|
"login": "0xcccc666",
|
|
"id": 71364553,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/71364553?v=4",
|
|
"html_url": "https:\/\/github.com\/0xcccc666"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xcccc666\/cve-2020-1472_Tool-collection",
|
|
"description": "cve-2020-1472_Tool collection",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T08:32:52Z",
|
|
"updated_at": "2020-09-16T09:13:47Z",
|
|
"pushed_at": "2020-09-16T09:13:44Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295984599,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "murataydemir\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "murataydemir",
|
|
"id": 16391655,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/16391655?v=4",
|
|
"html_url": "https:\/\/github.com\/murataydemir"
|
|
},
|
|
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-1472",
|
|
"description": "[CVE-2020-1472] Netlogon Remote Protocol Call (MS-NRPC) Privilege Escalation (Zerologon)",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T09:22:30Z",
|
|
"updated_at": "2020-09-16T21:00:01Z",
|
|
"pushed_at": "2020-09-16T20:59:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 295992280,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "npocmak\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "npocmak",
|
|
"id": 33814019,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/33814019?v=4",
|
|
"html_url": "https:\/\/github.com\/npocmak"
|
|
},
|
|
"html_url": "https:\/\/github.com\/npocmak\/CVE-2020-1472",
|
|
"description": "https:\/\/github.com\/dirkjanm\/CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-16T09:54:09Z",
|
|
"updated_at": "2020-09-16T09:59:34Z",
|
|
"pushed_at": "2020-09-16T09:58:30Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 296056571,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "victim10wq3\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "victim10wq3",
|
|
"id": 46973456,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/46973456?v=4",
|
|
"html_url": "https:\/\/github.com\/victim10wq3"
|
|
},
|
|
"html_url": "https:\/\/github.com\/victim10wq3\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-09-16T14:25:54Z",
|
|
"updated_at": "2020-09-16T14:28:55Z",
|
|
"pushed_at": "2020-09-16T14:28:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |