mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-19 22:32:22 +01:00
117 lines
No EOL
4.3 KiB
JSON
117 lines
No EOL
4.3 KiB
JSON
[
|
||
{
|
||
"id": 234192123,
|
||
"name": "chainoffools",
|
||
"full_name": "kudelskisecurity\/chainoffools",
|
||
"owner": {
|
||
"login": "kudelskisecurity",
|
||
"id": 10771090,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10771090?v=4",
|
||
"html_url": "https:\/\/github.com\/kudelskisecurity"
|
||
},
|
||
"html_url": "https:\/\/github.com\/kudelskisecurity\/chainoffools",
|
||
"description": "A PoC for CVE-2020-0601",
|
||
"fork": false,
|
||
"created_at": "2020-01-15T23:15:32Z",
|
||
"updated_at": "2021-03-04T04:24:32Z",
|
||
"pushed_at": "2020-03-22T15:14:31Z",
|
||
"stargazers_count": 338,
|
||
"watchers_count": 338,
|
||
"forks_count": 87,
|
||
"forks": 87,
|
||
"watchers": 338,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 241136874,
|
||
"name": "CVE-2018-20250-WinRAR",
|
||
"full_name": "eastmountyxz\/CVE-2018-20250-WinRAR",
|
||
"owner": {
|
||
"login": "eastmountyxz",
|
||
"id": 53172375,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53172375?v=4",
|
||
"html_url": "https:\/\/github.com\/eastmountyxz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/eastmountyxz\/CVE-2018-20250-WinRAR",
|
||
"description": "这资源是作者复现微软签字证书漏洞CVE-2020-0601,结合相关资源及文章实现。推荐大家结合作者博客,复现了该漏洞和理解恶意软件自启动劫持原理。作为网络安全初学者,自己确实很菜,但希望坚持下去,一起加油!",
|
||
"fork": false,
|
||
"created_at": "2020-02-17T15:08:22Z",
|
||
"updated_at": "2021-03-14T04:44:31Z",
|
||
"pushed_at": "2020-05-19T07:55:32Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 243353551,
|
||
"name": "meetup-2-curveball",
|
||
"full_name": "bsides-rijeka\/meetup-2-curveball",
|
||
"owner": {
|
||
"login": "bsides-rijeka",
|
||
"id": 61519397,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61519397?v=4",
|
||
"html_url": "https:\/\/github.com\/bsides-rijeka"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bsides-rijeka\/meetup-2-curveball",
|
||
"description": "Materials for the second Rijeka secuity meetup. We will be discussing Microsoft cryptoapi vulnerability dubbed CurveBall (CVE-2020-0601)",
|
||
"fork": false,
|
||
"created_at": "2020-02-26T19:59:25Z",
|
||
"updated_at": "2020-03-05T07:54:18Z",
|
||
"pushed_at": "2020-09-11T10:29:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 244585713,
|
||
"name": "CVE-2020-0601-spoofkey",
|
||
"full_name": "exploitblizzard\/CVE-2020-0601-spoofkey",
|
||
"owner": {
|
||
"login": "exploitblizzard",
|
||
"id": 61627070,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61627070?v=4",
|
||
"html_url": "https:\/\/github.com\/exploitblizzard"
|
||
},
|
||
"html_url": "https:\/\/github.com\/exploitblizzard\/CVE-2020-0601-spoofkey",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2020-03-03T08:49:47Z",
|
||
"updated_at": "2021-03-14T14:20:52Z",
|
||
"pushed_at": "2021-03-14T14:20:50Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 246794448,
|
||
"name": "twoplustwo",
|
||
"full_name": "ShayNehmad\/twoplustwo",
|
||
"owner": {
|
||
"login": "ShayNehmad",
|
||
"id": 48879847,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48879847?v=4",
|
||
"html_url": "https:\/\/github.com\/ShayNehmad"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ShayNehmad\/twoplustwo",
|
||
"description": "Implementing CVE-2020-0601",
|
||
"fork": false,
|
||
"created_at": "2020-03-12T09:30:19Z",
|
||
"updated_at": "2020-03-12T09:58:51Z",
|
||
"pushed_at": "2020-03-12T09:58:48Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |