mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 05:42:21 +01:00
330 lines
No EOL
11 KiB
JSON
330 lines
No EOL
11 KiB
JSON
[
|
|
{
|
|
"id": 103382657,
|
|
"name": "CVE-2017-8759-Exploit-sample",
|
|
"full_name": "Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"owner": {
|
|
"login": "Voulnet",
|
|
"id": 1334847,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1334847?v=4",
|
|
"html_url": "https:\/\/github.com\/Voulnet"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"description": "Running CVE-2017-8759 exploit sample.",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T09:50:04Z",
|
|
"updated_at": "2022-12-02T09:30:30Z",
|
|
"pushed_at": "2020-01-23T06:53:00Z",
|
|
"stargazers_count": 257,
|
|
"watchers_count": 257,
|
|
"has_discussions": false,
|
|
"forks_count": 111,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 111,
|
|
"watchers": 257,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103416775,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "nccgroup\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "nccgroup",
|
|
"id": 4067082,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4067082?v=4",
|
|
"html_url": "https:\/\/github.com\/nccgroup"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nccgroup\/CVE-2017-8759",
|
|
"description": "NCC Group's analysis and exploitation of CVE-2017-8759 along with further refinements",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T15:24:10Z",
|
|
"updated_at": "2022-11-13T15:44:40Z",
|
|
"pushed_at": "2017-09-19T18:06:41Z",
|
|
"stargazers_count": 95,
|
|
"watchers_count": 95,
|
|
"has_discussions": false,
|
|
"forks_count": 51,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 51,
|
|
"watchers": 95,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103428172,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "vysecurity\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "vysecurity",
|
|
"id": 3596242,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3596242?v=4",
|
|
"html_url": "https:\/\/github.com\/vysecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/vysecurity\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 - A vulnerability in the SOAP WDSL parser.",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T17:10:18Z",
|
|
"updated_at": "2022-10-25T05:07:41Z",
|
|
"pushed_at": "2017-09-14T10:18:40Z",
|
|
"stargazers_count": 175,
|
|
"watchers_count": 175,
|
|
"has_discussions": false,
|
|
"forks_count": 85,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 85,
|
|
"watchers": 175,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103447049,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "BasuCert\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "BasuCert",
|
|
"id": 29852431,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
|
|
"html_url": "https:\/\/github.com\/BasuCert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BasuCert\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 Research",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T20:27:29Z",
|
|
"updated_at": "2022-11-09T17:58:00Z",
|
|
"pushed_at": "2017-09-15T13:14:38Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103447404,
|
|
"name": "CVE-2017-8759-Exploit-sample2",
|
|
"full_name": "tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
|
"owner": {
|
|
"login": "tahisaad6",
|
|
"id": 21042116,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21042116?v=4",
|
|
"html_url": "https:\/\/github.com\/tahisaad6"
|
|
},
|
|
"html_url": "https:\/\/github.com\/tahisaad6\/CVE-2017-8759-Exploit-sample2",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-13T20:31:43Z",
|
|
"updated_at": "2017-09-13T20:31:43Z",
|
|
"pushed_at": "2017-09-13T20:31:43Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103493845,
|
|
"name": "CVE-2017-8759_-SOAP_WSDL",
|
|
"full_name": "homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
|
"owner": {
|
|
"login": "homjxi0e",
|
|
"id": 25440152,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25440152?v=4",
|
|
"html_url": "https:\/\/github.com\/homjxi0e"
|
|
},
|
|
"html_url": "https:\/\/github.com\/homjxi0e\/CVE-2017-8759_-SOAP_WSDL",
|
|
"description": "CVE-2017-8759 Remote Code Execution Vulnerability On SOAP WDSL - Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 3.5.1 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 3.5",
|
|
"fork": false,
|
|
"created_at": "2017-09-14T06:20:28Z",
|
|
"updated_at": "2018-11-16T12:24:03Z",
|
|
"pushed_at": "2017-09-21T16:41:37Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"code",
|
|
"cve-2017-8759",
|
|
"execution",
|
|
"remote"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103517315,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "bhdresh\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759",
|
|
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-09-14T10:04:39Z",
|
|
"updated_at": "2022-12-02T09:30:30Z",
|
|
"pushed_at": "2018-09-10T16:25:12Z",
|
|
"stargazers_count": 319,
|
|
"watchers_count": 319,
|
|
"has_discussions": false,
|
|
"forks_count": 122,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 122,
|
|
"watchers": 319,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103595749,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "Lz1y\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "Lz1y",
|
|
"id": 23468993,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23468993?v=4",
|
|
"html_url": "https:\/\/github.com\/Lz1y"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-15T00:36:17Z",
|
|
"updated_at": "2022-12-02T09:30:28Z",
|
|
"pushed_at": "2017-12-28T07:16:15Z",
|
|
"stargazers_count": 83,
|
|
"watchers_count": 83,
|
|
"has_discussions": false,
|
|
"forks_count": 49,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 49,
|
|
"watchers": 83,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103865283,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "JonasUliana\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "JonasUliana",
|
|
"id": 29503841,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29503841?v=4",
|
|
"html_url": "https:\/\/github.com\/JonasUliana"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JonasUliana\/CVE-2017-8759",
|
|
"description": "Simple C# implementation of CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-17T22:05:56Z",
|
|
"updated_at": "2022-10-15T14:05:47Z",
|
|
"pushed_at": "2017-09-17T22:20:36Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"csharp",
|
|
"cve-2017-8759",
|
|
"exploit"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104033989,
|
|
"name": "CVE-2017-8759-exploits",
|
|
"full_name": "ashr\/CVE-2017-8759-exploits",
|
|
"owner": {
|
|
"login": "ashr",
|
|
"id": 171286,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/171286?v=4",
|
|
"html_url": "https:\/\/github.com\/ashr"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ashr\/CVE-2017-8759-exploits",
|
|
"description": "Two versions of CVE-2017-8759 exploits",
|
|
"fork": false,
|
|
"created_at": "2017-09-19T06:12:10Z",
|
|
"updated_at": "2022-06-03T02:00:17Z",
|
|
"pushed_at": "2017-09-19T06:19:54Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"has_discussions": false,
|
|
"forks_count": 4,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 4,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 104625403,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "l0n3rs\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "l0n3rs",
|
|
"id": 31120718,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31120718?v=4",
|
|
"html_url": "https:\/\/github.com\/l0n3rs"
|
|
},
|
|
"html_url": "https:\/\/github.com\/l0n3rs\/CVE-2017-8759",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-09-24T06:58:55Z",
|
|
"updated_at": "2017-09-24T06:58:55Z",
|
|
"pushed_at": "2017-09-24T06:59:53Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |