mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
302 lines
No EOL
10 KiB
JSON
302 lines
No EOL
10 KiB
JSON
[
|
|
{
|
|
"id": 381392691,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "yu2u\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "yu2u",
|
|
"id": 25322880,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25322880?v=4",
|
|
"html_url": "https:\/\/github.com\/yu2u"
|
|
},
|
|
"html_url": "https:\/\/github.com\/yu2u\/CVE-2021-1675",
|
|
"description": "CVE-2021-1675 exploit",
|
|
"fork": false,
|
|
"created_at": "2021-06-29T14:24:30Z",
|
|
"updated_at": "2021-09-15T02:02:40Z",
|
|
"pushed_at": "2021-06-29T14:26:25Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381444656,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "cube0x0\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "cube0x0",
|
|
"id": 39370848,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39370848?v=4",
|
|
"html_url": "https:\/\/github.com\/cube0x0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cube0x0\/CVE-2021-1675",
|
|
"description": "C# and Impacket implementation of PrintNightmare CVE-2021-1675\/CVE-2021-34527",
|
|
"fork": false,
|
|
"created_at": "2021-06-29T17:24:14Z",
|
|
"updated_at": "2022-01-04T18:32:29Z",
|
|
"pushed_at": "2021-07-20T15:28:13Z",
|
|
"stargazers_count": 1488,
|
|
"watchers_count": 1488,
|
|
"forks_count": 543,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 543,
|
|
"watchers": 1488,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381799016,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "LaresLLC\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "LaresLLC",
|
|
"id": 63059624,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63059624?v=4",
|
|
"html_url": "https:\/\/github.com\/LaresLLC"
|
|
},
|
|
"html_url": "https:\/\/github.com\/LaresLLC\/CVE-2021-1675",
|
|
"description": "CVE-2021-1675 Detection Info",
|
|
"fork": false,
|
|
"created_at": "2021-06-30T18:32:17Z",
|
|
"updated_at": "2021-12-30T00:16:08Z",
|
|
"pushed_at": "2021-07-07T15:43:05Z",
|
|
"stargazers_count": 213,
|
|
"watchers_count": 213,
|
|
"forks_count": 34,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 34,
|
|
"watchers": 213,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 381858715,
|
|
"name": "patch-cve-2021-1675",
|
|
"full_name": "kondah\/patch-cve-2021-1675",
|
|
"owner": {
|
|
"login": "kondah",
|
|
"id": 7760108,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7760108?v=4",
|
|
"html_url": "https:\/\/github.com\/kondah"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kondah\/patch-cve-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-06-30T23:39:21Z",
|
|
"updated_at": "2021-10-24T04:47:24Z",
|
|
"pushed_at": "2021-06-30T23:40:44Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 382024474,
|
|
"name": "CVE-2021-1675",
|
|
"full_name": "puckiestyle\/CVE-2021-1675",
|
|
"owner": {
|
|
"login": "puckiestyle",
|
|
"id": 57447087,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
|
|
"html_url": "https:\/\/github.com\/puckiestyle"
|
|
},
|
|
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2021-1675",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-07-01T12:24:19Z",
|
|
"updated_at": "2021-10-31T15:29:24Z",
|
|
"pushed_at": "2021-10-31T15:29:21Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 5,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 5,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 388427598,
|
|
"name": "my-CVE-2021-1675",
|
|
"full_name": "hahaleyile\/my-CVE-2021-1675",
|
|
"owner": {
|
|
"login": "hahaleyile",
|
|
"id": 38727644,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38727644?v=4",
|
|
"html_url": "https:\/\/github.com\/hahaleyile"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hahaleyile\/my-CVE-2021-1675",
|
|
"description": "see https:\/\/github.com\/cube0x0\/CVE-2021-1675",
|
|
"fork": false,
|
|
"created_at": "2021-07-22T10:49:30Z",
|
|
"updated_at": "2021-12-30T18:17:24Z",
|
|
"pushed_at": "2021-08-13T15:15:05Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 402035048,
|
|
"name": "CVE-2021-1675_RDL_LPE",
|
|
"full_name": "mstxq17\/CVE-2021-1675_RDL_LPE",
|
|
"owner": {
|
|
"login": "mstxq17",
|
|
"id": 29624427,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29624427?v=4",
|
|
"html_url": "https:\/\/github.com\/mstxq17"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mstxq17\/CVE-2021-1675_RDL_LPE",
|
|
"description": "PrintNightMare LPE提权漏洞的CS 反射加载插件。开箱即用、通过内存加载、混淆加载的驱动名称来ByPass Defender\/EDR。",
|
|
"fork": false,
|
|
"created_at": "2021-09-01T11:25:04Z",
|
|
"updated_at": "2021-12-15T14:42:53Z",
|
|
"pushed_at": "2021-09-01T11:25:22Z",
|
|
"stargazers_count": 105,
|
|
"watchers_count": 105,
|
|
"forks_count": 18,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 18,
|
|
"watchers": 105,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 410565318,
|
|
"name": "PrintNightmare",
|
|
"full_name": "ly4k\/PrintNightmare",
|
|
"owner": {
|
|
"login": "ly4k",
|
|
"id": 53348818,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
|
|
"html_url": "https:\/\/github.com\/ly4k"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ly4k\/PrintNightmare",
|
|
"description": "Python implementation for PrintNightmare (CVE-2021-1675 \/ CVE-2021-34527)",
|
|
"fork": false,
|
|
"created_at": "2021-09-26T13:53:10Z",
|
|
"updated_at": "2021-12-28T12:43:52Z",
|
|
"pushed_at": "2021-10-17T13:29:56Z",
|
|
"stargazers_count": 94,
|
|
"watchers_count": 94,
|
|
"forks_count": 18,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [
|
|
"cve-2021-1675",
|
|
"cve-2021-34527"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 18,
|
|
"watchers": 94,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 410658843,
|
|
"name": "SharpPN",
|
|
"full_name": "Wra7h\/SharpPN",
|
|
"owner": {
|
|
"login": "Wra7h",
|
|
"id": 60988551,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60988551?v=4",
|
|
"html_url": "https:\/\/github.com\/Wra7h"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Wra7h\/SharpPN",
|
|
"description": "C# PrintNightmare (CVE-2021-1675)",
|
|
"fork": false,
|
|
"created_at": "2021-09-26T20:46:23Z",
|
|
"updated_at": "2021-12-15T14:43:04Z",
|
|
"pushed_at": "2021-09-26T22:35:07Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 413951914,
|
|
"name": "CVE-2021-1675-PrintNightmare",
|
|
"full_name": "OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
|
|
"owner": {
|
|
"login": "OppressionBreedsResistance",
|
|
"id": 60150959,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60150959?v=4",
|
|
"html_url": "https:\/\/github.com\/OppressionBreedsResistance"
|
|
},
|
|
"html_url": "https:\/\/github.com\/OppressionBreedsResistance\/CVE-2021-1675-PrintNightmare",
|
|
"description": "Working PowerShell POC",
|
|
"fork": false,
|
|
"created_at": "2021-10-05T19:24:23Z",
|
|
"updated_at": "2021-10-24T06:08:06Z",
|
|
"pushed_at": "2021-10-06T21:04:44Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 435194981,
|
|
"name": "NimNightmare",
|
|
"full_name": "fumamatar\/NimNightmare",
|
|
"owner": {
|
|
"login": "fumamatar",
|
|
"id": 51821028,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51821028?v=4",
|
|
"html_url": "https:\/\/github.com\/fumamatar"
|
|
},
|
|
"html_url": "https:\/\/github.com\/fumamatar\/NimNightmare",
|
|
"description": "CVE-2021-1675 LPE PoC in Nim (PrintNightmare Local Privilege Escalation)",
|
|
"fork": false,
|
|
"created_at": "2021-12-05T14:49:32Z",
|
|
"updated_at": "2021-12-10T19:36:21Z",
|
|
"pushed_at": "2021-12-05T14:51:28Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 12,
|
|
"score": 0
|
|
}
|
|
] |