PoC-in-GitHub/2020/CVE-2020-1350.json
2022-01-29 09:14:08 +09:00

427 lines
No EOL
15 KiB
JSON

[
{
"id": 246641886,
"name": "NSE-scripts",
"full_name": "psc4re\/NSE-scripts",
"owner": {
"login": "psc4re",
"id": 4672886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4672886?v=4",
"html_url": "https:\/\/github.com\/psc4re"
},
"html_url": "https:\/\/github.com\/psc4re\/NSE-scripts",
"description": "NSE scripts to detect CVE-2020-1350 SIGRED and CVE-2020-0796 SMBGHOST, CVE-2021-21972, proxyshell, CVE-2021-34473",
"fork": false,
"created_at": "2020-03-11T17:51:29Z",
"updated_at": "2022-01-28T19:28:15Z",
"pushed_at": "2021-08-16T18:16:20Z",
"stargazers_count": 102,
"watchers_count": 102,
"forks_count": 22,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2020-1350",
"cve-2021-21972",
"cve-2021-34473",
"nmap",
"nmap-scan-script",
"nmap-scripts",
"nse-script",
"poc",
"proxyshell",
"scanner",
"sigred",
"smbghost",
"smbv3",
"vcenter",
"vulnerability",
"vulnerability-detection"
],
"visibility": "public",
"forks": 22,
"watchers": 102,
"score": 0
},
{
"id": 279670211,
"name": "CVE-2020-1350_HoneyPoC",
"full_name": "ZephrFish\/CVE-2020-1350_HoneyPoC",
"owner": {
"login": "ZephrFish",
"id": 5783068,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
"html_url": "https:\/\/github.com\/ZephrFish"
},
"html_url": "https:\/\/github.com\/ZephrFish\/CVE-2020-1350_HoneyPoC",
"description": "HoneyPoC: Proof-of-Concept (PoC) script to exploit SIGRed (CVE-2020-1350). Achieves Domain Admin on Domain Controllers running Windows Server 2000 up to Windows Server 2019.",
"fork": false,
"created_at": "2020-07-14T19:02:25Z",
"updated_at": "2021-12-29T14:44:45Z",
"pushed_at": "2021-06-10T02:46:52Z",
"stargazers_count": 269,
"watchers_count": 269,
"forks_count": 79,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2020-1350",
"sigred"
],
"visibility": "public",
"forks": 79,
"watchers": 269,
"score": 0
},
{
"id": 279675165,
"name": "CVE-2020-1350",
"full_name": "mr-r3b00t\/CVE-2020-1350",
"owner": {
"login": "mr-r3b00t",
"id": 14963690,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14963690?v=4",
"html_url": "https:\/\/github.com\/mr-r3b00t"
},
"html_url": "https:\/\/github.com\/mr-r3b00t\/CVE-2020-1350",
"description": null,
"fork": false,
"created_at": "2020-07-14T19:28:46Z",
"updated_at": "2021-05-06T11:57:25Z",
"pushed_at": "2020-07-20T06:15:56Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 5,
"score": 0
},
{
"id": 279701266,
"name": "Fake_CVE-2020-1350",
"full_name": "zoomerxsec\/Fake_CVE-2020-1350",
"owner": {
"login": "zoomerxsec",
"id": 56858864,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56858864?v=4",
"html_url": "https:\/\/github.com\/zoomerxsec"
},
"html_url": "https:\/\/github.com\/zoomerxsec\/Fake_CVE-2020-1350",
"description": "Fake exploit tool, designed to rickroll users attempting to actually exploit.",
"fork": false,
"created_at": "2020-07-14T21:55:57Z",
"updated_at": "2021-07-22T12:14:33Z",
"pushed_at": "2020-07-19T02:29:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 6,
"score": 0
},
{
"id": 279776271,
"name": "CVE-2020-1350",
"full_name": "T13nn3s\/CVE-2020-1350",
"owner": {
"login": "T13nn3s",
"id": 29333776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29333776?v=4",
"html_url": "https:\/\/github.com\/T13nn3s"
},
"html_url": "https:\/\/github.com\/T13nn3s\/CVE-2020-1350",
"description": "This Powershell Script is checking if your server is vulnerable for the CVE-2020-1350 Remote Code Execution flaw in the Windows DNS Service",
"fork": false,
"created_at": "2020-07-15T05:46:31Z",
"updated_at": "2021-08-12T00:10:26Z",
"pushed_at": "2020-07-18T06:38:11Z",
"stargazers_count": 15,
"watchers_count": 15,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 15,
"score": 0
},
{
"id": 279778118,
"name": "SIGRed",
"full_name": "corelight\/SIGRed",
"owner": {
"login": "corelight",
"id": 21672558,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
"html_url": "https:\/\/github.com\/corelight"
},
"html_url": "https:\/\/github.com\/corelight\/SIGRed",
"description": "Detection of attempts to exploit Microsoft Windows DNS server via CVE-2020-1350 (AKA SIGRed)",
"fork": false,
"created_at": "2020-07-15T05:55:20Z",
"updated_at": "2021-01-14T18:47:12Z",
"pushed_at": "2020-07-20T02:20:43Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"score": 0
},
{
"id": 279961698,
"name": "dRMM-CVE-2020-1350-response",
"full_name": "jmaddington\/dRMM-CVE-2020-1350-response",
"owner": {
"login": "jmaddington",
"id": 2353597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2353597?v=4",
"html_url": "https:\/\/github.com\/jmaddington"
},
"html_url": "https:\/\/github.com\/jmaddington\/dRMM-CVE-2020-1350-response",
"description": "Windows registry mitigation response to CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T19:43:39Z",
"updated_at": "2020-10-10T20:38:31Z",
"pushed_at": "2020-07-15T19:59:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0
},
{
"id": 279999285,
"name": "CVE-2020-1350-DoS",
"full_name": "maxpl0it\/CVE-2020-1350-DoS",
"owner": {
"login": "maxpl0it",
"id": 27973683,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27973683?v=4",
"html_url": "https:\/\/github.com\/maxpl0it"
},
"html_url": "https:\/\/github.com\/maxpl0it\/CVE-2020-1350-DoS",
"description": "A denial-of-service proof-of-concept for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-15T23:00:00Z",
"updated_at": "2022-01-24T21:03:40Z",
"pushed_at": "2020-07-17T13:07:29Z",
"stargazers_count": 233,
"watchers_count": 233,
"forks_count": 53,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 53,
"watchers": 233,
"score": 0
},
{
"id": 280207373,
"name": "CVE-2020-1350",
"full_name": "captainGeech42\/CVE-2020-1350",
"owner": {
"login": "captainGeech42",
"id": 4255667,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4255667?v=4",
"html_url": "https:\/\/github.com\/captainGeech42"
},
"html_url": "https:\/\/github.com\/captainGeech42\/CVE-2020-1350",
"description": "Denial of Service PoC for CVE-2020-1350 (SIGRed)",
"fork": false,
"created_at": "2020-07-16T16:46:48Z",
"updated_at": "2022-01-09T21:16:20Z",
"pushed_at": "2020-07-16T18:32:04Z",
"stargazers_count": 19,
"watchers_count": 19,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 19,
"score": 0
},
{
"id": 280336928,
"name": "CVE-2020-1350",
"full_name": "connormcgarr\/CVE-2020-1350",
"owner": {
"login": "connormcgarr",
"id": 45445720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45445720?v=4",
"html_url": "https:\/\/github.com\/connormcgarr"
},
"html_url": "https:\/\/github.com\/connormcgarr\/CVE-2020-1350",
"description": "CVE-2020-1350 Proof-of-Concept",
"fork": false,
"created_at": "2020-07-17T05:41:19Z",
"updated_at": "2021-09-05T17:57:23Z",
"pushed_at": "2020-07-27T16:20:06Z",
"stargazers_count": 8,
"watchers_count": 8,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0
},
{
"id": 280665873,
"name": "CVE-2020-1350",
"full_name": "graph-inc\/CVE-2020-1350",
"owner": {
"login": "graph-inc",
"id": 68469953,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68469953?v=4",
"html_url": "https:\/\/github.com\/graph-inc"
},
"html_url": "https:\/\/github.com\/graph-inc\/CVE-2020-1350",
"description": "Scanner and Mitigator for CVE 2020-1350",
"fork": false,
"created_at": "2020-07-18T13:49:54Z",
"updated_at": "2021-01-27T17:38:05Z",
"pushed_at": "2020-07-18T14:05:55Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0
},
{
"id": 280916907,
"name": "CVE-2020-1350",
"full_name": "CVEmaster\/CVE-2020-1350",
"owner": {
"login": "CVEmaster",
"id": 68512490,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/68512490?v=4",
"html_url": "https:\/\/github.com\/CVEmaster"
},
"html_url": "https:\/\/github.com\/CVEmaster\/CVE-2020-1350",
"description": "DNS Vulnerability - CVE-2020-1350",
"fork": false,
"created_at": "2020-07-19T17:32:47Z",
"updated_at": "2020-10-10T20:39:05Z",
"pushed_at": "2020-07-20T14:25:59Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 281069444,
"name": "CVE-2020-1350-checker.ps1",
"full_name": "Secuora-Org\/CVE-2020-1350-checker.ps1",
"owner": {
"login": "Secuora-Org",
"id": 67636594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67636594?v=4",
"html_url": "https:\/\/github.com\/Secuora-Org"
},
"html_url": "https:\/\/github.com\/Secuora-Org\/CVE-2020-1350-checker.ps1",
"description": "Comprueba si su servidor DNS es vulnerable a la ejecución remota de código.",
"fork": false,
"created_at": "2020-07-20T09:12:07Z",
"updated_at": "2020-10-10T20:40:44Z",
"pushed_at": "2020-07-20T09:12:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 281667659,
"name": "cve-2020-1350",
"full_name": "gdwnet\/cve-2020-1350",
"owner": {
"login": "gdwnet",
"id": 19855556,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19855556?v=4",
"html_url": "https:\/\/github.com\/gdwnet"
},
"html_url": "https:\/\/github.com\/gdwnet\/cve-2020-1350",
"description": "A powershell script to deploy the registry mitigation key for CVE-2020-1350",
"fork": false,
"created_at": "2020-07-22T12:11:33Z",
"updated_at": "2020-10-10T20:40:26Z",
"pushed_at": "2020-07-22T12:15:00Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 282558950,
"name": "CVE-2020-1350-Fix",
"full_name": "simeononsecurity\/CVE-2020-1350-Fix",
"owner": {
"login": "simeononsecurity",
"id": 4913771,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4913771?v=4",
"html_url": "https:\/\/github.com\/simeononsecurity"
},
"html_url": "https:\/\/github.com\/simeononsecurity\/CVE-2020-1350-Fix",
"description": "A registry-based workaround can be used to help protect an affected Windows server, and it can be implemented without requiring an administrator to restart the server. Because of the volatility of this vulnerability, administrators may have to implement the workaround before they apply the security update in order to enable them to update their systems by using a standard deployment cadence.",
"fork": false,
"created_at": "2020-07-26T02:12:36Z",
"updated_at": "2020-10-10T20:40:04Z",
"pushed_at": "2020-07-26T02:13:24Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
}
]