PoC-in-GitHub/2019/CVE-2019-0708.json
2020-07-25 12:07:11 +09:00

807 lines
No EOL
29 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 186865180,
"name": "CVE-2019-0708",
"full_name": "thugcrowd\/CVE-2019-0708",
"owner": {
"login": "thugcrowd",
"id": 40207376,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40207376?v=4",
"html_url": "https:\/\/github.com\/thugcrowd"
},
"html_url": "https:\/\/github.com\/thugcrowd\/CVE-2019-0708",
"description": "sup pry0cc :3",
"fork": false,
"created_at": "2019-05-15T16:33:31Z",
"updated_at": "2020-03-24T14:55:02Z",
"pushed_at": "2019-08-28T02:51:47Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 0,
"forks": 0,
"watchers": 6,
"score": 0
},
{
"id": 187057686,
"name": "CVE-2019-0708-Check-Device-Patch-Status",
"full_name": "fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status",
"owner": {
"login": "fourtwizzy",
"id": 1735941,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1735941?v=4",
"html_url": "https:\/\/github.com\/fourtwizzy"
},
"html_url": "https:\/\/github.com\/fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status",
"description": "Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5\/14\/19 patches.",
"fork": false,
"created_at": "2019-05-16T15:47:29Z",
"updated_at": "2020-07-14T03:50:16Z",
"pushed_at": "2019-08-28T17:14:57Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 8,
"forks": 8,
"watchers": 19,
"score": 0
},
{
"id": 187931596,
"name": "CVE-2019-0708",
"full_name": "zerosum0x0\/CVE-2019-0708",
"owner": {
"login": "zerosum0x0",
"id": 3971576,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3971576?v=4",
"html_url": "https:\/\/github.com\/zerosum0x0"
},
"html_url": "https:\/\/github.com\/zerosum0x0\/CVE-2019-0708",
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
"fork": false,
"created_at": "2019-05-22T00:08:44Z",
"updated_at": "2020-07-24T05:42:48Z",
"pushed_at": "2019-10-01T12:23:59Z",
"stargazers_count": 1108,
"watchers_count": 1108,
"forks_count": 377,
"forks": 377,
"watchers": 1108,
"score": 0
},
{
"id": 189265014,
"name": "BlueKeep",
"full_name": "Ekultek\/BlueKeep",
"owner": {
"login": "Ekultek",
"id": 14183473,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
"html_url": "https:\/\/github.com\/Ekultek"
},
"html_url": "https:\/\/github.com\/Ekultek\/BlueKeep",
"description": "Proof of concept for CVE-2019-0708",
"fork": false,
"created_at": "2019-05-29T16:53:54Z",
"updated_at": "2020-07-17T08:22:06Z",
"pushed_at": "2019-09-03T20:50:28Z",
"stargazers_count": 1037,
"watchers_count": 1037,
"forks_count": 347,
"forks": 347,
"watchers": 1037,
"score": 0
},
{
"id": 189498490,
"name": "bluekeep_CVE-2019-0708_poc_to_exploit",
"full_name": "algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
"owner": {
"login": "algo7",
"id": 11154774,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11154774?v=4",
"html_url": "https:\/\/github.com\/algo7"
},
"html_url": "https:\/\/github.com\/algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
"fork": false,
"created_at": "2019-05-31T00:04:12Z",
"updated_at": "2020-07-17T21:12:13Z",
"pushed_at": "2020-05-09T09:49:14Z",
"stargazers_count": 331,
"watchers_count": 331,
"forks_count": 116,
"forks": 116,
"watchers": 331,
"score": 0
},
{
"id": 191340467,
"name": "CVE-2019-0708-PoC",
"full_name": "at0mik\/CVE-2019-0708-PoC",
"owner": {
"login": "at0mik",
"id": 46066196,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46066196?v=4",
"html_url": "https:\/\/github.com\/at0mik"
},
"html_url": "https:\/\/github.com\/at0mik\/CVE-2019-0708-PoC",
"description": "CVE-2019-0708-PoC Notes and Pseudocodes.",
"fork": false,
"created_at": "2019-06-11T09:38:36Z",
"updated_at": "2020-05-16T19:37:09Z",
"pushed_at": "2020-05-16T19:37:06Z",
"stargazers_count": 16,
"watchers_count": 16,
"forks_count": 8,
"forks": 8,
"watchers": 16,
"score": 0
},
{
"id": 196871345,
"name": "cve-2019-0708",
"full_name": "mekhalleh\/cve-2019-0708",
"owner": {
"login": "mekhalleh",
"id": 5225129,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5225129?v=4",
"html_url": "https:\/\/github.com\/mekhalleh"
},
"html_url": "https:\/\/github.com\/mekhalleh\/cve-2019-0708",
"description": "Metasploit module for massive Denial of Service using #Bluekeep vector.",
"fork": false,
"created_at": "2019-07-14T18:43:48Z",
"updated_at": "2020-04-05T04:23:16Z",
"pushed_at": "2019-10-01T15:31:26Z",
"stargazers_count": 21,
"watchers_count": 21,
"forks_count": 7,
"forks": 7,
"watchers": 21,
"score": 0
},
{
"id": 198343084,
"name": "bluekeep",
"full_name": "0xeb-bp\/bluekeep",
"owner": {
"login": "0xeb-bp",
"id": 53204152,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53204152?v=4",
"html_url": "https:\/\/github.com\/0xeb-bp"
},
"html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep",
"description": "Public work for CVE-2019-0708",
"fork": false,
"created_at": "2019-07-23T03:15:53Z",
"updated_at": "2020-07-08T11:08:52Z",
"pushed_at": "2019-11-19T02:43:38Z",
"stargazers_count": 273,
"watchers_count": 273,
"forks_count": 89,
"forks": 89,
"watchers": 273,
"score": 0
},
{
"id": 202911823,
"name": "Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
"full_name": "dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
"owner": {
"login": "dorkerdevil",
"id": 15796745,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4",
"html_url": "https:\/\/github.com\/dorkerdevil"
},
"html_url": "https:\/\/github.com\/dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
"description": "rce exploit , made to work with pocsuite3",
"fork": false,
"created_at": "2019-08-17T17:23:53Z",
"updated_at": "2020-06-24T22:43:12Z",
"pushed_at": "2019-08-19T02:52:11Z",
"stargazers_count": 108,
"watchers_count": 108,
"forks_count": 53,
"forks": 53,
"watchers": 108,
"score": 0
},
{
"id": 202951481,
"name": "bluekeep",
"full_name": "turingcompl33t\/bluekeep",
"owner": {
"login": "turingcompl33t",
"id": 19956905,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19956905?v=4",
"html_url": "https:\/\/github.com\/turingcompl33t"
},
"html_url": "https:\/\/github.com\/turingcompl33t\/bluekeep",
"description": "Research Regarding CVE-2019-0708.",
"fork": false,
"created_at": "2019-08-18T02:34:31Z",
"updated_at": "2020-03-09T19:52:03Z",
"pushed_at": "2019-11-04T01:15:22Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 3,
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 203477227,
"name": "CVE-2019-0708-test",
"full_name": "fade-vivida\/CVE-2019-0708-test",
"owner": {
"login": "fade-vivida",
"id": 38774342,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38774342?v=4",
"html_url": "https:\/\/github.com\/fade-vivida"
},
"html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test",
"description": null,
"fork": false,
"created_at": "2019-08-21T00:48:55Z",
"updated_at": "2020-03-11T13:53:42Z",
"pushed_at": "2019-11-28T01:38:56Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 206050892,
"name": "CVE-2019-0708",
"full_name": "skommando\/CVE-2019-0708",
"owner": {
"login": "skommando",
"id": 22767889,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22767889?v=4",
"html_url": "https:\/\/github.com\/skommando"
},
"html_url": "https:\/\/github.com\/skommando\/CVE-2019-0708",
"description": "CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC暂时只有蓝屏。",
"fork": false,
"created_at": "2019-09-03T10:25:48Z",
"updated_at": "2019-10-02T17:51:34Z",
"pushed_at": "2019-09-12T02:29:03Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 206863569,
"name": "msf-module-CVE-2019-0708",
"full_name": "RickGeex\/msf-module-CVE-2019-0708",
"owner": {
"login": "RickGeex",
"id": 7975904,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7975904?v=4",
"html_url": "https:\/\/github.com\/RickGeex"
},
"html_url": "https:\/\/github.com\/RickGeex\/msf-module-CVE-2019-0708",
"description": "Metasploit module for CVE-2019-0708 (BlueKeep) - https:\/\/github.com\/rapid7\/metasploit-framework\/tree\/5a0119b04309c8e61b44763ac08811cd3ecbbf8d\/modules\/exploits\/windows\/rdp",
"fork": false,
"created_at": "2019-09-06T19:46:03Z",
"updated_at": "2020-03-25T05:25:37Z",
"pushed_at": "2019-09-07T09:41:22Z",
"stargazers_count": 9,
"watchers_count": 9,
"forks_count": 3,
"forks": 3,
"watchers": 9,
"score": 0
},
{
"id": 206893335,
"name": "CVE-2019-0708",
"full_name": "wqsemc\/CVE-2019-0708",
"owner": {
"login": "wqsemc",
"id": 36132717,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36132717?v=4",
"html_url": "https:\/\/github.com\/wqsemc"
},
"html_url": "https:\/\/github.com\/wqsemc\/CVE-2019-0708",
"description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.",
"fork": false,
"created_at": "2019-09-07T00:28:45Z",
"updated_at": "2020-07-17T15:41:30Z",
"pushed_at": "2019-09-16T10:35:57Z",
"stargazers_count": 11,
"watchers_count": 11,
"forks_count": 3,
"forks": 3,
"watchers": 11,
"score": 0
},
{
"id": 206919373,
"name": "CVE-2019-0708-RCE",
"full_name": "mai-lang-chai\/CVE-2019-0708-RCE",
"owner": {
"login": "mai-lang-chai",
"id": 36095584,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36095584?v=4",
"html_url": "https:\/\/github.com\/mai-lang-chai"
},
"html_url": "https:\/\/github.com\/mai-lang-chai\/CVE-2019-0708-RCE",
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
"fork": false,
"created_at": "2019-09-07T05:15:23Z",
"updated_at": "2020-04-06T02:00:19Z",
"pushed_at": "2019-09-20T04:53:41Z",
"stargazers_count": 37,
"watchers_count": 37,
"forks_count": 14,
"forks": 14,
"watchers": 37,
"score": 0
},
{
"id": 206926531,
"name": "CVE-2019-0708RDP-MSF",
"full_name": "Micr067\/CVE-2019-0708RDP-MSF",
"owner": {
"login": "Micr067",
"id": 49861012,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/49861012?v=4",
"html_url": "https:\/\/github.com\/Micr067"
},
"html_url": "https:\/\/github.com\/Micr067\/CVE-2019-0708RDP-MSF",
"description": "CVE-2019-0708RDP MSF",
"fork": false,
"created_at": "2019-09-07T06:32:25Z",
"updated_at": "2019-09-07T06:32:25Z",
"pushed_at": "2019-09-07T06:32:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 206928449,
"name": "CVE-2019-0708-BlueKeep",
"full_name": "adkinguzi\/CVE-2019-0708-BlueKeep",
"owner": {
"login": "adkinguzi",
"id": 31617622,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4",
"html_url": "https:\/\/github.com\/adkinguzi"
},
"html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep",
"description": null,
"fork": false,
"created_at": "2019-09-07T06:50:47Z",
"updated_at": "2020-03-25T05:24:54Z",
"pushed_at": "2019-09-07T07:05:24Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 206932731,
"name": "CVE-2019-0708",
"full_name": "FrostsaberX\/CVE-2019-0708",
"owner": {
"login": "FrostsaberX",
"id": 24857203,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24857203?v=4",
"html_url": "https:\/\/github.com\/FrostsaberX"
},
"html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2019-0708",
"description": "CVE-2019-0708 With Metasploit-Framework Exploit",
"fork": false,
"created_at": "2019-09-07T07:32:14Z",
"updated_at": "2019-09-09T01:17:19Z",
"pushed_at": "2019-09-07T08:50:59Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 206976374,
"name": "CVE-2019-0708-EXP-MSF-",
"full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-",
"owner": {
"login": "qinggegeya",
"id": 30001685,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4",
"html_url": "https:\/\/github.com\/qinggegeya"
},
"html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-",
"description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708",
"fork": false,
"created_at": "2019-09-07T14:02:50Z",
"updated_at": "2020-03-25T16:07:00Z",
"pushed_at": "2019-09-07T15:07:24Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 5,
"forks": 5,
"watchers": 3,
"score": 0
},
{
"id": 207703935,
"name": "CVE-2019-0708",
"full_name": "distance-vector\/CVE-2019-0708",
"owner": {
"login": "distance-vector",
"id": 35881006,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35881006?v=4",
"html_url": "https:\/\/github.com\/distance-vector"
},
"html_url": "https:\/\/github.com\/distance-vector\/CVE-2019-0708",
"description": null,
"fork": false,
"created_at": "2019-09-11T02:19:19Z",
"updated_at": "2019-09-11T02:23:01Z",
"pushed_at": "2019-09-11T02:23:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 207790184,
"name": "CVE-2019-0708-test",
"full_name": "0xFlag\/CVE-2019-0708-test",
"owner": {
"login": "0xFlag",
"id": 54313514,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/54313514?v=4",
"html_url": "https:\/\/github.com\/0xFlag"
},
"html_url": "https:\/\/github.com\/0xFlag\/CVE-2019-0708-test",
"description": "CVE-2019-0708 C#验证漏洞",
"fork": false,
"created_at": "2019-09-11T10:58:04Z",
"updated_at": "2019-09-13T01:46:23Z",
"pushed_at": "2019-09-13T01:46:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 208964787,
"name": "CVE-2019-0708",
"full_name": "1aa87148377\/CVE-2019-0708",
"owner": {
"login": "1aa87148377",
"id": 51265955,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51265955?v=4",
"html_url": "https:\/\/github.com\/1aa87148377"
},
"html_url": "https:\/\/github.com\/1aa87148377\/CVE-2019-0708",
"description": null,
"fork": false,
"created_at": "2019-09-17T05:15:28Z",
"updated_at": "2019-09-17T05:17:33Z",
"pushed_at": "2019-09-17T05:17:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 211623683,
"name": "cve-2019-0708_bluekeep_rce",
"full_name": "coolboy4me\/cve-2019-0708_bluekeep_rce",
"owner": {
"login": "coolboy4me",
"id": 10040130,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10040130?v=4",
"html_url": "https:\/\/github.com\/coolboy4me"
},
"html_url": "https:\/\/github.com\/coolboy4me\/cve-2019-0708_bluekeep_rce",
"description": "it works on xp (all version sp2 sp3)",
"fork": false,
"created_at": "2019-09-29T07:38:41Z",
"updated_at": "2020-06-24T02:31:24Z",
"pushed_at": "2019-09-30T03:44:18Z",
"stargazers_count": 63,
"watchers_count": 63,
"forks_count": 12,
"forks": 12,
"watchers": 63,
"score": 0
},
{
"id": 211942417,
"name": "ispy",
"full_name": "Cyb0r9\/ispy",
"owner": {
"login": "Cyb0r9",
"id": 43474676,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43474676?v=4",
"html_url": "https:\/\/github.com\/Cyb0r9"
},
"html_url": "https:\/\/github.com\/Cyb0r9\/ispy",
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
"fork": false,
"created_at": "2019-09-30T19:46:21Z",
"updated_at": "2020-07-09T08:15:59Z",
"pushed_at": "2019-10-16T01:04:12Z",
"stargazers_count": 159,
"watchers_count": 159,
"forks_count": 55,
"forks": 55,
"watchers": 159,
"score": 0
},
{
"id": 214051334,
"name": "CVE-2019-0708",
"full_name": "shishibabyq\/CVE-2019-0708",
"owner": {
"login": "shishibabyq",
"id": 56372841,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56372841?v=4",
"html_url": "https:\/\/github.com\/shishibabyq"
},
"html_url": "https:\/\/github.com\/shishibabyq\/CVE-2019-0708",
"description": "CVE-2019-0708",
"fork": false,
"created_at": "2019-10-10T00:34:41Z",
"updated_at": "2020-03-25T05:23:01Z",
"pushed_at": "2019-10-10T00:50:48Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 214524140,
"name": "Wincrash",
"full_name": "pwnhacker0x18\/Wincrash",
"owner": {
"login": "pwnhacker0x18",
"id": 51971493,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51971493?v=4",
"html_url": "https:\/\/github.com\/pwnhacker0x18"
},
"html_url": "https:\/\/github.com\/pwnhacker0x18\/Wincrash",
"description": "Mass exploit for CVE-2019-0708",
"fork": false,
"created_at": "2019-10-11T20:33:35Z",
"updated_at": "2020-07-18T04:11:40Z",
"pushed_at": "2019-10-11T20:42:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 221436919,
"name": "CVE-2019-0708-DOS",
"full_name": "R4v3nG\/CVE-2019-0708-DOS",
"owner": {
"login": "R4v3nG",
"id": 43517528,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43517528?v=4",
"html_url": "https:\/\/github.com\/R4v3nG"
},
"html_url": "https:\/\/github.com\/R4v3nG\/CVE-2019-0708-DOS",
"description": "CVE-2019-0708 DOS RDP",
"fork": false,
"created_at": "2019-11-13T10:49:51Z",
"updated_at": "2019-12-01T20:58:13Z",
"pushed_at": "2019-12-01T20:58:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 0,
"forks": 0,
"watchers": 1,
"score": 0
},
{
"id": 222191780,
"name": "sudoku.py",
"full_name": "lwtz\/sudoku.py",
"owner": {
"login": "lwtz",
"id": 25403119,
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25403119?v=4",
"html_url": "https:\/\/github.com\/lwtz"
},
"html_url": "https:\/\/github.com\/lwtz\/sudoku.py",
"description": "CVE-2019-0708",
"fork": false,
"created_at": "2019-11-17T03:28:28Z",
"updated_at": "2020-07-19T00:58:26Z",
"pushed_at": "2020-07-19T00:58:08Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 223320391,
"name": "-2-CVE-2019-0708",
"full_name": "ulisesrc\/-2-CVE-2019-0708",
"owner": {
"login": "ulisesrc",
"id": 3741400,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3741400?v=4",
"html_url": "https:\/\/github.com\/ulisesrc"
},
"html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708",
"description": null,
"fork": false,
"created_at": "2019-11-22T04:00:49Z",
"updated_at": "2019-11-22T04:01:11Z",
"pushed_at": "2019-11-22T04:01:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 226491441,
"name": "CVE-2019-0708",
"full_name": "worawit\/CVE-2019-0708",
"owner": {
"login": "worawit",
"id": 1352296,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1352296?v=4",
"html_url": "https:\/\/github.com\/worawit"
},
"html_url": "https:\/\/github.com\/worawit\/CVE-2019-0708",
"description": "CVE-2019-0708 (BlueKeep)",
"fork": false,
"created_at": "2019-12-07T10:13:11Z",
"updated_at": "2020-07-22T16:10:47Z",
"pushed_at": "2020-07-07T15:28:13Z",
"stargazers_count": 72,
"watchers_count": 72,
"forks_count": 6,
"forks": 6,
"watchers": 72,
"score": 0
},
{
"id": 235239045,
"name": "CVE-2019-0708-EXP-Windows",
"full_name": "cbwang505\/CVE-2019-0708-EXP-Windows",
"owner": {
"login": "cbwang505",
"id": 4487329,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4487329?v=4",
"html_url": "https:\/\/github.com\/cbwang505"
},
"html_url": "https:\/\/github.com\/cbwang505\/CVE-2019-0708-EXP-Windows",
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
"fork": false,
"created_at": "2020-01-21T02:22:29Z",
"updated_at": "2020-07-21T07:11:53Z",
"pushed_at": "2020-01-21T03:15:41Z",
"stargazers_count": 51,
"watchers_count": 51,
"forks_count": 18,
"forks": 18,
"watchers": 51,
"score": 0
},
{
"id": 241542314,
"name": "CVE-2019-0708-Windows",
"full_name": "eastmountyxz\/CVE-2019-0708-Windows",
"owner": {
"login": "eastmountyxz",
"id": 53172375,
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
"html_url": "https:\/\/github.com\/eastmountyxz"
},
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows",
"description": "这篇文章将分享Windows远程桌面服务漏洞CVE-2019-0708并详细讲解该漏洞及防御措施。作者作为网络安全的小白分享一些自学基础教程给大家主要是关于安全工具和实践操作的在线笔记希望您们喜欢。同时更希望您能与我一起操作和进步后续将深入学习网络安全和系统安全知识并分享相关实验。总之希望该系列文章对博友有所帮助写文不易大神们不喜勿喷谢谢",
"fork": false,
"created_at": "2020-02-19T05:40:22Z",
"updated_at": "2020-03-13T12:53:52Z",
"pushed_at": "2020-03-13T12:53:50Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 247883778,
"name": "Scanner-CVE-2019-0708",
"full_name": "JSec1337\/Scanner-CVE-2019-0708",
"owner": {
"login": "JSec1337",
"id": 62246378,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62246378?v=4",
"html_url": "https:\/\/github.com\/JSec1337"
},
"html_url": "https:\/\/github.com\/JSec1337\/Scanner-CVE-2019-0708",
"description": "Scanner CVE-2019-0708",
"fork": false,
"created_at": "2020-03-17T05:05:14Z",
"updated_at": "2020-03-17T06:50:00Z",
"pushed_at": "2020-03-17T06:49:58Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 259169347,
"name": "cve-2019-0708",
"full_name": "wanghuohuobutailao\/cve-2019-0708",
"owner": {
"login": "wanghuohuobutailao",
"id": 54968227,
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54968227?v=4",
"html_url": "https:\/\/github.com\/wanghuohuobutailao"
},
"html_url": "https:\/\/github.com\/wanghuohuobutailao\/cve-2019-0708",
"description": null,
"fork": false,
"created_at": "2020-04-27T01:06:29Z",
"updated_at": "2020-04-27T01:08:48Z",
"pushed_at": "2020-04-27T01:08:46Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 266412261,
"name": "bLuEkEeP-GUI",
"full_name": "nochemax\/bLuEkEeP-GUI",
"owner": {
"login": "nochemax",
"id": 8238744,
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8238744?v=4",
"html_url": "https:\/\/github.com\/nochemax"
},
"html_url": "https:\/\/github.com\/nochemax\/bLuEkEeP-GUI",
"description": "vulnerabilidad CVE-2019-0708 testing y explotacion ",
"fork": false,
"created_at": "2020-05-23T20:15:29Z",
"updated_at": "2020-05-23T20:38:41Z",
"pushed_at": "2020-05-23T20:38:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"forks": 0,
"watchers": 0,
"score": 0
}
]