mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 05:42:21 +01:00
807 lines
No EOL
29 KiB
JSON
807 lines
No EOL
29 KiB
JSON
[
|
||
{
|
||
"id": 186865180,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "thugcrowd\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "thugcrowd",
|
||
"id": 40207376,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/40207376?v=4",
|
||
"html_url": "https:\/\/github.com\/thugcrowd"
|
||
},
|
||
"html_url": "https:\/\/github.com\/thugcrowd\/CVE-2019-0708",
|
||
"description": "sup pry0cc :3",
|
||
"fork": false,
|
||
"created_at": "2019-05-15T16:33:31Z",
|
||
"updated_at": "2020-03-24T14:55:02Z",
|
||
"pushed_at": "2019-08-28T02:51:47Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 187057686,
|
||
"name": "CVE-2019-0708-Check-Device-Patch-Status",
|
||
"full_name": "fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status",
|
||
"owner": {
|
||
"login": "fourtwizzy",
|
||
"id": 1735941,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1735941?v=4",
|
||
"html_url": "https:\/\/github.com\/fourtwizzy"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fourtwizzy\/CVE-2019-0708-Check-Device-Patch-Status",
|
||
"description": "Powershell script to run and determine if a specific device has been patched for CVE-2019-0708. This checks to see if the termdd.sys file has been updated appropriate and is at a version level at or greater than the versions released in the 5\/14\/19 patches.",
|
||
"fork": false,
|
||
"created_at": "2019-05-16T15:47:29Z",
|
||
"updated_at": "2020-07-14T03:50:16Z",
|
||
"pushed_at": "2019-08-28T17:14:57Z",
|
||
"stargazers_count": 19,
|
||
"watchers_count": 19,
|
||
"forks_count": 8,
|
||
"forks": 8,
|
||
"watchers": 19,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 187931596,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "zerosum0x0\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "zerosum0x0",
|
||
"id": 3971576,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3971576?v=4",
|
||
"html_url": "https:\/\/github.com\/zerosum0x0"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zerosum0x0\/CVE-2019-0708",
|
||
"description": "Scanner PoC for CVE-2019-0708 RDP RCE vuln",
|
||
"fork": false,
|
||
"created_at": "2019-05-22T00:08:44Z",
|
||
"updated_at": "2020-07-24T05:42:48Z",
|
||
"pushed_at": "2019-10-01T12:23:59Z",
|
||
"stargazers_count": 1108,
|
||
"watchers_count": 1108,
|
||
"forks_count": 377,
|
||
"forks": 377,
|
||
"watchers": 1108,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 189265014,
|
||
"name": "BlueKeep",
|
||
"full_name": "Ekultek\/BlueKeep",
|
||
"owner": {
|
||
"login": "Ekultek",
|
||
"id": 14183473,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/14183473?v=4",
|
||
"html_url": "https:\/\/github.com\/Ekultek"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Ekultek\/BlueKeep",
|
||
"description": "Proof of concept for CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-05-29T16:53:54Z",
|
||
"updated_at": "2020-07-17T08:22:06Z",
|
||
"pushed_at": "2019-09-03T20:50:28Z",
|
||
"stargazers_count": 1037,
|
||
"watchers_count": 1037,
|
||
"forks_count": 347,
|
||
"forks": 347,
|
||
"watchers": 1037,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 189498490,
|
||
"name": "bluekeep_CVE-2019-0708_poc_to_exploit",
|
||
"full_name": "algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
|
||
"owner": {
|
||
"login": "algo7",
|
||
"id": 11154774,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11154774?v=4",
|
||
"html_url": "https:\/\/github.com\/algo7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/algo7\/bluekeep_CVE-2019-0708_poc_to_exploit",
|
||
"description": "An Attempt to Port BlueKeep PoC from @Ekultek to actual exploits",
|
||
"fork": false,
|
||
"created_at": "2019-05-31T00:04:12Z",
|
||
"updated_at": "2020-07-17T21:12:13Z",
|
||
"pushed_at": "2020-05-09T09:49:14Z",
|
||
"stargazers_count": 331,
|
||
"watchers_count": 331,
|
||
"forks_count": 116,
|
||
"forks": 116,
|
||
"watchers": 331,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 191340467,
|
||
"name": "CVE-2019-0708-PoC",
|
||
"full_name": "at0mik\/CVE-2019-0708-PoC",
|
||
"owner": {
|
||
"login": "at0mik",
|
||
"id": 46066196,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46066196?v=4",
|
||
"html_url": "https:\/\/github.com\/at0mik"
|
||
},
|
||
"html_url": "https:\/\/github.com\/at0mik\/CVE-2019-0708-PoC",
|
||
"description": "CVE-2019-0708-PoC Notes and Pseudocodes.",
|
||
"fork": false,
|
||
"created_at": "2019-06-11T09:38:36Z",
|
||
"updated_at": "2020-05-16T19:37:09Z",
|
||
"pushed_at": "2020-05-16T19:37:06Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 8,
|
||
"forks": 8,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 196871345,
|
||
"name": "cve-2019-0708",
|
||
"full_name": "mekhalleh\/cve-2019-0708",
|
||
"owner": {
|
||
"login": "mekhalleh",
|
||
"id": 5225129,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/5225129?v=4",
|
||
"html_url": "https:\/\/github.com\/mekhalleh"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mekhalleh\/cve-2019-0708",
|
||
"description": "Metasploit module for massive Denial of Service using #Bluekeep vector.",
|
||
"fork": false,
|
||
"created_at": "2019-07-14T18:43:48Z",
|
||
"updated_at": "2020-04-05T04:23:16Z",
|
||
"pushed_at": "2019-10-01T15:31:26Z",
|
||
"stargazers_count": 21,
|
||
"watchers_count": 21,
|
||
"forks_count": 7,
|
||
"forks": 7,
|
||
"watchers": 21,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 198343084,
|
||
"name": "bluekeep",
|
||
"full_name": "0xeb-bp\/bluekeep",
|
||
"owner": {
|
||
"login": "0xeb-bp",
|
||
"id": 53204152,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/53204152?v=4",
|
||
"html_url": "https:\/\/github.com\/0xeb-bp"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xeb-bp\/bluekeep",
|
||
"description": "Public work for CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-07-23T03:15:53Z",
|
||
"updated_at": "2020-07-08T11:08:52Z",
|
||
"pushed_at": "2019-11-19T02:43:38Z",
|
||
"stargazers_count": 273,
|
||
"watchers_count": 273,
|
||
"forks_count": 89,
|
||
"forks": 89,
|
||
"watchers": 273,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 202911823,
|
||
"name": "Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
|
||
"full_name": "dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
|
||
"owner": {
|
||
"login": "dorkerdevil",
|
||
"id": 15796745,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15796745?v=4",
|
||
"html_url": "https:\/\/github.com\/dorkerdevil"
|
||
},
|
||
"html_url": "https:\/\/github.com\/dorkerdevil\/Remote-Desktop-Services-Remote-Code-Execution-Vulnerability-CVE-2019-0708-",
|
||
"description": "rce exploit , made to work with pocsuite3",
|
||
"fork": false,
|
||
"created_at": "2019-08-17T17:23:53Z",
|
||
"updated_at": "2020-06-24T22:43:12Z",
|
||
"pushed_at": "2019-08-19T02:52:11Z",
|
||
"stargazers_count": 108,
|
||
"watchers_count": 108,
|
||
"forks_count": 53,
|
||
"forks": 53,
|
||
"watchers": 108,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 202951481,
|
||
"name": "bluekeep",
|
||
"full_name": "turingcompl33t\/bluekeep",
|
||
"owner": {
|
||
"login": "turingcompl33t",
|
||
"id": 19956905,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/19956905?v=4",
|
||
"html_url": "https:\/\/github.com\/turingcompl33t"
|
||
},
|
||
"html_url": "https:\/\/github.com\/turingcompl33t\/bluekeep",
|
||
"description": "Research Regarding CVE-2019-0708.",
|
||
"fork": false,
|
||
"created_at": "2019-08-18T02:34:31Z",
|
||
"updated_at": "2020-03-09T19:52:03Z",
|
||
"pushed_at": "2019-11-04T01:15:22Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 203477227,
|
||
"name": "CVE-2019-0708-test",
|
||
"full_name": "fade-vivida\/CVE-2019-0708-test",
|
||
"owner": {
|
||
"login": "fade-vivida",
|
||
"id": 38774342,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/38774342?v=4",
|
||
"html_url": "https:\/\/github.com\/fade-vivida"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fade-vivida\/CVE-2019-0708-test",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-08-21T00:48:55Z",
|
||
"updated_at": "2020-03-11T13:53:42Z",
|
||
"pushed_at": "2019-11-28T01:38:56Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206050892,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "skommando\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "skommando",
|
||
"id": 22767889,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22767889?v=4",
|
||
"html_url": "https:\/\/github.com\/skommando"
|
||
},
|
||
"html_url": "https:\/\/github.com\/skommando\/CVE-2019-0708",
|
||
"description": "CVE-2019-0708 BlueKeep漏洞批量扫描工具和POC,暂时只有蓝屏。",
|
||
"fork": false,
|
||
"created_at": "2019-09-03T10:25:48Z",
|
||
"updated_at": "2019-10-02T17:51:34Z",
|
||
"pushed_at": "2019-09-12T02:29:03Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206863569,
|
||
"name": "msf-module-CVE-2019-0708",
|
||
"full_name": "RickGeex\/msf-module-CVE-2019-0708",
|
||
"owner": {
|
||
"login": "RickGeex",
|
||
"id": 7975904,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/7975904?v=4",
|
||
"html_url": "https:\/\/github.com\/RickGeex"
|
||
},
|
||
"html_url": "https:\/\/github.com\/RickGeex\/msf-module-CVE-2019-0708",
|
||
"description": "Metasploit module for CVE-2019-0708 (BlueKeep) - https:\/\/github.com\/rapid7\/metasploit-framework\/tree\/5a0119b04309c8e61b44763ac08811cd3ecbbf8d\/modules\/exploits\/windows\/rdp",
|
||
"fork": false,
|
||
"created_at": "2019-09-06T19:46:03Z",
|
||
"updated_at": "2020-03-25T05:25:37Z",
|
||
"pushed_at": "2019-09-07T09:41:22Z",
|
||
"stargazers_count": 9,
|
||
"watchers_count": 9,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 9,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206893335,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "wqsemc\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "wqsemc",
|
||
"id": 36132717,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36132717?v=4",
|
||
"html_url": "https:\/\/github.com\/wqsemc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wqsemc\/CVE-2019-0708",
|
||
"description": "initial exploit for CVE-2019-0708, BlueKeep CVE-2019-0708 BlueKeep RDP Remote Windows Kernel Use After Free The RDP termdd.sys driver improperly handles binds to internal-only channel MS_T120, allowing a malformed Disconnect Provider Indication message to cause use-after-free. With a controllable data\/size remote nonpaged pool spray, an indirect call gadget of the freed channel is used to achieve arbitrary code execution.",
|
||
"fork": false,
|
||
"created_at": "2019-09-07T00:28:45Z",
|
||
"updated_at": "2020-07-17T15:41:30Z",
|
||
"pushed_at": "2019-09-16T10:35:57Z",
|
||
"stargazers_count": 11,
|
||
"watchers_count": 11,
|
||
"forks_count": 3,
|
||
"forks": 3,
|
||
"watchers": 11,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206919373,
|
||
"name": "CVE-2019-0708-RCE",
|
||
"full_name": "mai-lang-chai\/CVE-2019-0708-RCE",
|
||
"owner": {
|
||
"login": "mai-lang-chai",
|
||
"id": 36095584,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/36095584?v=4",
|
||
"html_url": "https:\/\/github.com\/mai-lang-chai"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mai-lang-chai\/CVE-2019-0708-RCE",
|
||
"description": "CVE-2019-0708 POC RCE 远程代码执行getshell教程",
|
||
"fork": false,
|
||
"created_at": "2019-09-07T05:15:23Z",
|
||
"updated_at": "2020-04-06T02:00:19Z",
|
||
"pushed_at": "2019-09-20T04:53:41Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"forks_count": 14,
|
||
"forks": 14,
|
||
"watchers": 37,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206926531,
|
||
"name": "CVE-2019-0708RDP-MSF",
|
||
"full_name": "Micr067\/CVE-2019-0708RDP-MSF",
|
||
"owner": {
|
||
"login": "Micr067",
|
||
"id": 49861012,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/49861012?v=4",
|
||
"html_url": "https:\/\/github.com\/Micr067"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Micr067\/CVE-2019-0708RDP-MSF",
|
||
"description": "CVE-2019-0708RDP MSF",
|
||
"fork": false,
|
||
"created_at": "2019-09-07T06:32:25Z",
|
||
"updated_at": "2019-09-07T06:32:25Z",
|
||
"pushed_at": "2019-09-07T06:32:26Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206928449,
|
||
"name": "CVE-2019-0708-BlueKeep",
|
||
"full_name": "adkinguzi\/CVE-2019-0708-BlueKeep",
|
||
"owner": {
|
||
"login": "adkinguzi",
|
||
"id": 31617622,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/31617622?v=4",
|
||
"html_url": "https:\/\/github.com\/adkinguzi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/adkinguzi\/CVE-2019-0708-BlueKeep",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-09-07T06:50:47Z",
|
||
"updated_at": "2020-03-25T05:24:54Z",
|
||
"pushed_at": "2019-09-07T07:05:24Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206932731,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "FrostsaberX\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "FrostsaberX",
|
||
"id": 24857203,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24857203?v=4",
|
||
"html_url": "https:\/\/github.com\/FrostsaberX"
|
||
},
|
||
"html_url": "https:\/\/github.com\/FrostsaberX\/CVE-2019-0708",
|
||
"description": "CVE-2019-0708 With Metasploit-Framework Exploit",
|
||
"fork": false,
|
||
"created_at": "2019-09-07T07:32:14Z",
|
||
"updated_at": "2019-09-09T01:17:19Z",
|
||
"pushed_at": "2019-09-07T08:50:59Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 206976374,
|
||
"name": "CVE-2019-0708-EXP-MSF-",
|
||
"full_name": "qinggegeya\/CVE-2019-0708-EXP-MSF-",
|
||
"owner": {
|
||
"login": "qinggegeya",
|
||
"id": 30001685,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30001685?v=4",
|
||
"html_url": "https:\/\/github.com\/qinggegeya"
|
||
},
|
||
"html_url": "https:\/\/github.com\/qinggegeya\/CVE-2019-0708-EXP-MSF-",
|
||
"description": "CVE-2019-0708-EXP(MSF) Vulnerability exploit program for cve-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-09-07T14:02:50Z",
|
||
"updated_at": "2020-03-25T16:07:00Z",
|
||
"pushed_at": "2019-09-07T15:07:24Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 5,
|
||
"forks": 5,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 207703935,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "distance-vector\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "distance-vector",
|
||
"id": 35881006,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/35881006?v=4",
|
||
"html_url": "https:\/\/github.com\/distance-vector"
|
||
},
|
||
"html_url": "https:\/\/github.com\/distance-vector\/CVE-2019-0708",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-09-11T02:19:19Z",
|
||
"updated_at": "2019-09-11T02:23:01Z",
|
||
"pushed_at": "2019-09-11T02:23:00Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 207790184,
|
||
"name": "CVE-2019-0708-test",
|
||
"full_name": "0xFlag\/CVE-2019-0708-test",
|
||
"owner": {
|
||
"login": "0xFlag",
|
||
"id": 54313514,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/54313514?v=4",
|
||
"html_url": "https:\/\/github.com\/0xFlag"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0xFlag\/CVE-2019-0708-test",
|
||
"description": "CVE-2019-0708 C#验证漏洞",
|
||
"fork": false,
|
||
"created_at": "2019-09-11T10:58:04Z",
|
||
"updated_at": "2019-09-13T01:46:23Z",
|
||
"pushed_at": "2019-09-13T01:46:21Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 208964787,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "1aa87148377\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "1aa87148377",
|
||
"id": 51265955,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/51265955?v=4",
|
||
"html_url": "https:\/\/github.com\/1aa87148377"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1aa87148377\/CVE-2019-0708",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-09-17T05:15:28Z",
|
||
"updated_at": "2019-09-17T05:17:33Z",
|
||
"pushed_at": "2019-09-17T05:17:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 211623683,
|
||
"name": "cve-2019-0708_bluekeep_rce",
|
||
"full_name": "coolboy4me\/cve-2019-0708_bluekeep_rce",
|
||
"owner": {
|
||
"login": "coolboy4me",
|
||
"id": 10040130,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10040130?v=4",
|
||
"html_url": "https:\/\/github.com\/coolboy4me"
|
||
},
|
||
"html_url": "https:\/\/github.com\/coolboy4me\/cve-2019-0708_bluekeep_rce",
|
||
"description": "it works on xp (all version sp2 sp3)",
|
||
"fork": false,
|
||
"created_at": "2019-09-29T07:38:41Z",
|
||
"updated_at": "2020-06-24T02:31:24Z",
|
||
"pushed_at": "2019-09-30T03:44:18Z",
|
||
"stargazers_count": 63,
|
||
"watchers_count": 63,
|
||
"forks_count": 12,
|
||
"forks": 12,
|
||
"watchers": 63,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 211942417,
|
||
"name": "ispy",
|
||
"full_name": "Cyb0r9\/ispy",
|
||
"owner": {
|
||
"login": "Cyb0r9",
|
||
"id": 43474676,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43474676?v=4",
|
||
"html_url": "https:\/\/github.com\/Cyb0r9"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cyb0r9\/ispy",
|
||
"description": "ispy V1.0 - Eternalblue(ms17-010)\/Bluekeep(CVE-2019-0708) Scanner and exploit ( Metasploit automation )",
|
||
"fork": false,
|
||
"created_at": "2019-09-30T19:46:21Z",
|
||
"updated_at": "2020-07-09T08:15:59Z",
|
||
"pushed_at": "2019-10-16T01:04:12Z",
|
||
"stargazers_count": 159,
|
||
"watchers_count": 159,
|
||
"forks_count": 55,
|
||
"forks": 55,
|
||
"watchers": 159,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 214051334,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "shishibabyq\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "shishibabyq",
|
||
"id": 56372841,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/56372841?v=4",
|
||
"html_url": "https:\/\/github.com\/shishibabyq"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shishibabyq\/CVE-2019-0708",
|
||
"description": "CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-10-10T00:34:41Z",
|
||
"updated_at": "2020-03-25T05:23:01Z",
|
||
"pushed_at": "2019-10-10T00:50:48Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 214524140,
|
||
"name": "Wincrash",
|
||
"full_name": "pwnhacker0x18\/Wincrash",
|
||
"owner": {
|
||
"login": "pwnhacker0x18",
|
||
"id": 51971493,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/51971493?v=4",
|
||
"html_url": "https:\/\/github.com\/pwnhacker0x18"
|
||
},
|
||
"html_url": "https:\/\/github.com\/pwnhacker0x18\/Wincrash",
|
||
"description": "Mass exploit for CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-10-11T20:33:35Z",
|
||
"updated_at": "2020-07-18T04:11:40Z",
|
||
"pushed_at": "2019-10-11T20:42:38Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 221436919,
|
||
"name": "CVE-2019-0708-DOS",
|
||
"full_name": "R4v3nG\/CVE-2019-0708-DOS",
|
||
"owner": {
|
||
"login": "R4v3nG",
|
||
"id": 43517528,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/43517528?v=4",
|
||
"html_url": "https:\/\/github.com\/R4v3nG"
|
||
},
|
||
"html_url": "https:\/\/github.com\/R4v3nG\/CVE-2019-0708-DOS",
|
||
"description": "CVE-2019-0708 DOS RDP",
|
||
"fork": false,
|
||
"created_at": "2019-11-13T10:49:51Z",
|
||
"updated_at": "2019-12-01T20:58:13Z",
|
||
"pushed_at": "2019-12-01T20:58:11Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 222191780,
|
||
"name": "sudoku.py",
|
||
"full_name": "lwtz\/sudoku.py",
|
||
"owner": {
|
||
"login": "lwtz",
|
||
"id": 25403119,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25403119?v=4",
|
||
"html_url": "https:\/\/github.com\/lwtz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/lwtz\/sudoku.py",
|
||
"description": "CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2019-11-17T03:28:28Z",
|
||
"updated_at": "2020-07-19T00:58:26Z",
|
||
"pushed_at": "2020-07-19T00:58:08Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 223320391,
|
||
"name": "-2-CVE-2019-0708",
|
||
"full_name": "ulisesrc\/-2-CVE-2019-0708",
|
||
"owner": {
|
||
"login": "ulisesrc",
|
||
"id": 3741400,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3741400?v=4",
|
||
"html_url": "https:\/\/github.com\/ulisesrc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ulisesrc\/-2-CVE-2019-0708",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-11-22T04:00:49Z",
|
||
"updated_at": "2019-11-22T04:01:11Z",
|
||
"pushed_at": "2019-11-22T04:01:03Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 226491441,
|
||
"name": "CVE-2019-0708",
|
||
"full_name": "worawit\/CVE-2019-0708",
|
||
"owner": {
|
||
"login": "worawit",
|
||
"id": 1352296,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1352296?v=4",
|
||
"html_url": "https:\/\/github.com\/worawit"
|
||
},
|
||
"html_url": "https:\/\/github.com\/worawit\/CVE-2019-0708",
|
||
"description": "CVE-2019-0708 (BlueKeep)",
|
||
"fork": false,
|
||
"created_at": "2019-12-07T10:13:11Z",
|
||
"updated_at": "2020-07-22T16:10:47Z",
|
||
"pushed_at": "2020-07-07T15:28:13Z",
|
||
"stargazers_count": 72,
|
||
"watchers_count": 72,
|
||
"forks_count": 6,
|
||
"forks": 6,
|
||
"watchers": 72,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 235239045,
|
||
"name": "CVE-2019-0708-EXP-Windows",
|
||
"full_name": "cbwang505\/CVE-2019-0708-EXP-Windows",
|
||
"owner": {
|
||
"login": "cbwang505",
|
||
"id": 4487329,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/4487329?v=4",
|
||
"html_url": "https:\/\/github.com\/cbwang505"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cbwang505\/CVE-2019-0708-EXP-Windows",
|
||
"description": "CVE-2019-0708-EXP-Windows版单文件exe版,运行后直接在当前控制台反弹System权限Shell",
|
||
"fork": false,
|
||
"created_at": "2020-01-21T02:22:29Z",
|
||
"updated_at": "2020-07-21T07:11:53Z",
|
||
"pushed_at": "2020-01-21T03:15:41Z",
|
||
"stargazers_count": 51,
|
||
"watchers_count": 51,
|
||
"forks_count": 18,
|
||
"forks": 18,
|
||
"watchers": 51,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 241542314,
|
||
"name": "CVE-2019-0708-Windows",
|
||
"full_name": "eastmountyxz\/CVE-2019-0708-Windows",
|
||
"owner": {
|
||
"login": "eastmountyxz",
|
||
"id": 53172375,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/53172375?v=4",
|
||
"html_url": "https:\/\/github.com\/eastmountyxz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2019-0708-Windows",
|
||
"description": "这篇文章将分享Windows远程桌面服务漏洞(CVE-2019-0708),并详细讲解该漏洞及防御措施。作者作为网络安全的小白,分享一些自学基础教程给大家,主要是关于安全工具和实践操作的在线笔记,希望您们喜欢。同时,更希望您能与我一起操作和进步,后续将深入学习网络安全和系统安全知识并分享相关实验。总之,希望该系列文章对博友有所帮助,写文不易,大神们不喜勿喷,谢谢!",
|
||
"fork": false,
|
||
"created_at": "2020-02-19T05:40:22Z",
|
||
"updated_at": "2020-03-13T12:53:52Z",
|
||
"pushed_at": "2020-03-13T12:53:50Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 247883778,
|
||
"name": "Scanner-CVE-2019-0708",
|
||
"full_name": "JSec1337\/Scanner-CVE-2019-0708",
|
||
"owner": {
|
||
"login": "JSec1337",
|
||
"id": 62246378,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/62246378?v=4",
|
||
"html_url": "https:\/\/github.com\/JSec1337"
|
||
},
|
||
"html_url": "https:\/\/github.com\/JSec1337\/Scanner-CVE-2019-0708",
|
||
"description": "Scanner CVE-2019-0708",
|
||
"fork": false,
|
||
"created_at": "2020-03-17T05:05:14Z",
|
||
"updated_at": "2020-03-17T06:50:00Z",
|
||
"pushed_at": "2020-03-17T06:49:58Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 259169347,
|
||
"name": "cve-2019-0708",
|
||
"full_name": "wanghuohuobutailao\/cve-2019-0708",
|
||
"owner": {
|
||
"login": "wanghuohuobutailao",
|
||
"id": 54968227,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54968227?v=4",
|
||
"html_url": "https:\/\/github.com\/wanghuohuobutailao"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wanghuohuobutailao\/cve-2019-0708",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-04-27T01:06:29Z",
|
||
"updated_at": "2020-04-27T01:08:48Z",
|
||
"pushed_at": "2020-04-27T01:08:46Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 266412261,
|
||
"name": "bLuEkEeP-GUI",
|
||
"full_name": "nochemax\/bLuEkEeP-GUI",
|
||
"owner": {
|
||
"login": "nochemax",
|
||
"id": 8238744,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8238744?v=4",
|
||
"html_url": "https:\/\/github.com\/nochemax"
|
||
},
|
||
"html_url": "https:\/\/github.com\/nochemax\/bLuEkEeP-GUI",
|
||
"description": "vulnerabilidad CVE-2019-0708 testing y explotacion ",
|
||
"fork": false,
|
||
"created_at": "2020-05-23T20:15:29Z",
|
||
"updated_at": "2020-05-23T20:38:41Z",
|
||
"pushed_at": "2020-05-23T20:38:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |