mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 13:22:21 +01:00
388 lines
No EOL
13 KiB
JSON
388 lines
No EOL
13 KiB
JSON
[
|
|
{
|
|
"id": 293756101,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "SecuraBV\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "SecuraBV",
|
|
"id": 46344423,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46344423?v=4",
|
|
"html_url": "https:\/\/github.com\/SecuraBV"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SecuraBV\/CVE-2020-1472",
|
|
"description": "Test tool for CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2020-09-08T08:58:37Z",
|
|
"updated_at": "2022-12-27T07:38:14Z",
|
|
"pushed_at": "2021-12-08T10:31:54Z",
|
|
"stargazers_count": 1535,
|
|
"watchers_count": 1535,
|
|
"has_discussions": false,
|
|
"forks_count": 352,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 352,
|
|
"watchers": 1535,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 296388474,
|
|
"name": "zerologon",
|
|
"full_name": "zeronetworks\/zerologon",
|
|
"owner": {
|
|
"login": "zeronetworks",
|
|
"id": 46243031,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46243031?v=4",
|
|
"html_url": "https:\/\/github.com\/zeronetworks"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zeronetworks\/zerologon",
|
|
"description": "Test script for CVE-2020-1472 for both RPC\/TCP and RPC\/SMB",
|
|
"fork": false,
|
|
"created_at": "2020-09-17T16:53:17Z",
|
|
"updated_at": "2022-11-09T18:09:28Z",
|
|
"pushed_at": "2022-09-07T09:46:40Z",
|
|
"stargazers_count": 51,
|
|
"watchers_count": 51,
|
|
"has_discussions": false,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 51,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 296468860,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "sv3nbeast\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "sv3nbeast",
|
|
"id": 55974091,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/55974091?v=4",
|
|
"html_url": "https:\/\/github.com\/sv3nbeast"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sv3nbeast\/CVE-2020-1472",
|
|
"description": " CVE-2020-1472复现时使用的py文件整理打包",
|
|
"fork": false,
|
|
"created_at": "2020-09-18T00:02:26Z",
|
|
"updated_at": "2022-12-04T02:15:53Z",
|
|
"pushed_at": "2022-12-03T01:53:07Z",
|
|
"stargazers_count": 10,
|
|
"watchers_count": 10,
|
|
"has_discussions": false,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 10,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 331439225,
|
|
"name": "zerologon",
|
|
"full_name": "sho-luv\/zerologon",
|
|
"owner": {
|
|
"login": "sho-luv",
|
|
"id": 1679089,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1679089?v=4",
|
|
"html_url": "https:\/\/github.com\/sho-luv"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sho-luv\/zerologon",
|
|
"description": "Zerologon Check and Exploit - Discovered by Tom Tervoort of Secura and expanded on @Dirkjanm's cve-2020-1472 coded example. This tool will check, exploit and restore password to original state",
|
|
"fork": false,
|
|
"created_at": "2021-01-20T21:38:47Z",
|
|
"updated_at": "2022-12-01T17:17:57Z",
|
|
"pushed_at": "2022-04-12T23:27:40Z",
|
|
"stargazers_count": 13,
|
|
"watchers_count": 13,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 13,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 379594309,
|
|
"name": "zeroscan",
|
|
"full_name": "NickSanzotta\/zeroscan",
|
|
"owner": {
|
|
"login": "NickSanzotta",
|
|
"id": 10254849,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10254849?v=4",
|
|
"html_url": "https:\/\/github.com\/NickSanzotta"
|
|
},
|
|
"html_url": "https:\/\/github.com\/NickSanzotta\/zeroscan",
|
|
"description": "Zeroscan is a Domain Controller vulnerability scanner, that currently includes checks for Zerologon (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
|
|
"fork": false,
|
|
"created_at": "2021-06-23T12:23:48Z",
|
|
"updated_at": "2022-12-14T08:14:16Z",
|
|
"pushed_at": "2022-04-09T12:01:43Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2020-1472",
|
|
"cve-2021-1675",
|
|
"domain-controller",
|
|
"pentest",
|
|
"pentest-tool",
|
|
"pentesting",
|
|
"python",
|
|
"zerologon"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 462124353,
|
|
"name": "SecuraBV-CVE-2020-1472",
|
|
"full_name": "TheJoyOfHacking\/SecuraBV-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "TheJoyOfHacking",
|
|
"id": 99463221,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
|
|
"html_url": "https:\/\/github.com\/TheJoyOfHacking"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TheJoyOfHacking\/SecuraBV-CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-02-22T03:33:24Z",
|
|
"updated_at": "2022-02-22T03:33:37Z",
|
|
"pushed_at": "2022-02-22T03:33:33Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 462124410,
|
|
"name": "dirkjanm-CVE-2020-1472",
|
|
"full_name": "TheJoyOfHacking\/dirkjanm-CVE-2020-1472",
|
|
"owner": {
|
|
"login": "TheJoyOfHacking",
|
|
"id": 99463221,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99463221?v=4",
|
|
"html_url": "https:\/\/github.com\/TheJoyOfHacking"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TheJoyOfHacking\/dirkjanm-CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-02-22T03:33:38Z",
|
|
"updated_at": "2022-02-22T03:33:49Z",
|
|
"pushed_at": "2022-02-22T03:33:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 465532157,
|
|
"name": "Zero-day-scanning",
|
|
"full_name": "Anonymous-Family\/Zero-day-scanning",
|
|
"owner": {
|
|
"login": "Anonymous-Family",
|
|
"id": 98486038,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
|
|
"html_url": "https:\/\/github.com\/Anonymous-Family"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Anonymous-Family\/Zero-day-scanning",
|
|
"description": "Zero-day-scanning is a Domain Controller vulnerability scanner, that currently includes checks for Zero-day-scanning (CVE-2020-1472), MS-PAR\/MS-RPRN and SMBv2 Signing.",
|
|
"fork": false,
|
|
"created_at": "2022-03-03T01:55:28Z",
|
|
"updated_at": "2022-03-08T05:31:23Z",
|
|
"pushed_at": "2022-03-03T07:50:52Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 465533233,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "Anonymous-Family\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "Anonymous-Family",
|
|
"id": 98486038,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/98486038?v=4",
|
|
"html_url": "https:\/\/github.com\/Anonymous-Family"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Anonymous-Family\/CVE-2020-1472",
|
|
"description": "Test tool for CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2022-03-03T02:00:21Z",
|
|
"updated_at": "2022-03-03T02:01:04Z",
|
|
"pushed_at": "2022-03-03T02:00:41Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 475626821,
|
|
"name": "zerologon",
|
|
"full_name": "Nekoox\/zerologon",
|
|
"owner": {
|
|
"login": "Nekoox",
|
|
"id": 83406029,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83406029?v=4",
|
|
"html_url": "https:\/\/github.com\/Nekoox"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Nekoox\/zerologon",
|
|
"description": "Set of scripts, to test and exploit the zerologon vulnerability (CVE-2020-1472). ",
|
|
"fork": false,
|
|
"created_at": "2022-03-29T21:34:56Z",
|
|
"updated_at": "2022-04-01T12:51:07Z",
|
|
"pushed_at": "2022-03-29T23:13:06Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 530954073,
|
|
"name": "ZeroLogon",
|
|
"full_name": "Rvn0xsy\/ZeroLogon",
|
|
"owner": {
|
|
"login": "Rvn0xsy",
|
|
"id": 19944759,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19944759?v=4",
|
|
"html_url": "https:\/\/github.com\/Rvn0xsy"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Rvn0xsy\/ZeroLogon",
|
|
"description": "CVE-2020-1472 C++",
|
|
"fork": false,
|
|
"created_at": "2022-08-31T06:01:02Z",
|
|
"updated_at": "2022-12-05T16:13:04Z",
|
|
"pushed_at": "2022-09-02T16:25:01Z",
|
|
"stargazers_count": 81,
|
|
"watchers_count": 81,
|
|
"has_discussions": false,
|
|
"forks_count": 9,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 9,
|
|
"watchers": 81,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 543363896,
|
|
"name": "MassZeroLogon",
|
|
"full_name": "guglia001\/MassZeroLogon",
|
|
"owner": {
|
|
"login": "guglia001",
|
|
"id": 7321539,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7321539?v=4",
|
|
"html_url": "https:\/\/github.com\/guglia001"
|
|
},
|
|
"html_url": "https:\/\/github.com\/guglia001\/MassZeroLogon",
|
|
"description": "Tool for mass testing ZeroLogon vulnerability CVE-2020-1472",
|
|
"fork": false,
|
|
"created_at": "2022-09-30T00:03:12Z",
|
|
"updated_at": "2022-10-28T01:44:53Z",
|
|
"pushed_at": "2022-09-30T00:09:13Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 569087060,
|
|
"name": "CVE-2020-1472",
|
|
"full_name": "dr4g0n23\/CVE-2020-1472",
|
|
"owner": {
|
|
"login": "dr4g0n23",
|
|
"id": 68361881,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68361881?v=4",
|
|
"html_url": "https:\/\/github.com\/dr4g0n23"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dr4g0n23\/CVE-2020-1472",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2022-11-22T03:35:47Z",
|
|
"updated_at": "2022-11-22T03:37:43Z",
|
|
"pushed_at": "2022-11-25T10:09:13Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |