PoC-in-GitHub/2020/CVE-2020-0688.json
2022-12-24 21:29:45 +09:00

509 lines
No EOL
17 KiB
JSON

[
{
"id": 243126851,
"name": "cve-2020-0688",
"full_name": "random-robbie\/cve-2020-0688",
"owner": {
"login": "random-robbie",
"id": 4902869,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
"html_url": "https:\/\/github.com\/random-robbie"
},
"html_url": "https:\/\/github.com\/random-robbie\/cve-2020-0688",
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-25T23:44:16Z",
"updated_at": "2022-11-09T18:06:27Z",
"pushed_at": "2020-02-26T00:58:39Z",
"stargazers_count": 157,
"watchers_count": 157,
"has_discussions": false,
"forks_count": 50,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0688"
],
"visibility": "public",
"forks": 50,
"watchers": 157,
"score": 0
},
{
"id": 243257176,
"name": "CVE-2020-0688",
"full_name": "Jumbo-WJB\/CVE-2020-0688",
"owner": {
"login": "Jumbo-WJB",
"id": 7954518,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7954518?v=4",
"html_url": "https:\/\/github.com\/Jumbo-WJB"
},
"html_url": "https:\/\/github.com\/Jumbo-WJB\/CVE-2020-0688",
"description": "CVE-2020-0688 - Exchange",
"fork": false,
"created_at": "2020-02-26T12:28:11Z",
"updated_at": "2022-11-09T18:06:28Z",
"pushed_at": "2020-02-27T03:50:07Z",
"stargazers_count": 64,
"watchers_count": 64,
"has_discussions": false,
"forks_count": 25,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 25,
"watchers": 64,
"score": 0
},
{
"id": 243416592,
"name": "cve-2020-0688",
"full_name": "Ridter\/cve-2020-0688",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/cve-2020-0688",
"description": "cve-2020-0688",
"fork": false,
"created_at": "2020-02-27T02:54:27Z",
"updated_at": "2022-12-14T23:12:53Z",
"pushed_at": "2022-12-05T07:29:14Z",
"stargazers_count": 305,
"watchers_count": 305,
"has_discussions": false,
"forks_count": 93,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 93,
"watchers": 305,
"score": 0
},
{
"id": 243531424,
"name": "CVE-2020-0688_EXP",
"full_name": "Yt1g3r\/CVE-2020-0688_EXP",
"owner": {
"login": "Yt1g3r",
"id": 12625147,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
"html_url": "https:\/\/github.com\/Yt1g3r"
},
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2020-0688_EXP",
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
"fork": false,
"created_at": "2020-02-27T13:53:46Z",
"updated_at": "2022-11-30T19:25:08Z",
"pushed_at": "2020-02-27T15:57:53Z",
"stargazers_count": 144,
"watchers_count": 144,
"has_discussions": false,
"forks_count": 66,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"automation",
"cve-2020-0688",
"exchange",
"exploit"
],
"visibility": "public",
"forks": 66,
"watchers": 144,
"score": 0
},
{
"id": 243640997,
"name": "CVE-2020-0688",
"full_name": "righter83\/CVE-2020-0688",
"owner": {
"login": "righter83",
"id": 12727740,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12727740?v=4",
"html_url": "https:\/\/github.com\/righter83"
},
"html_url": "https:\/\/github.com\/righter83\/CVE-2020-0688",
"description": "Exchange Scanner CVE-2020-0688",
"fork": false,
"created_at": "2020-02-27T23:55:04Z",
"updated_at": "2022-11-09T18:06:31Z",
"pushed_at": "2021-09-10T12:10:09Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 243672879,
"name": "cve-2020-0688",
"full_name": "truongtn\/cve-2020-0688",
"owner": {
"login": "truongtn",
"id": 11813006,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11813006?v=4",
"html_url": "https:\/\/github.com\/truongtn"
},
"html_url": "https:\/\/github.com\/truongtn\/cve-2020-0688",
"description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that",
"fork": false,
"created_at": "2020-02-28T03:47:40Z",
"updated_at": "2021-12-05T20:35:51Z",
"pushed_at": "2020-02-28T04:04:54Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0
},
{
"id": 243801603,
"name": "CVE-2020-0688-Scanner",
"full_name": "onSec-fr\/CVE-2020-0688-Scanner",
"owner": {
"login": "onSec-fr",
"id": 59887731,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4",
"html_url": "https:\/\/github.com\/onSec-fr"
},
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2020-0688-Scanner",
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
"fork": false,
"created_at": "2020-02-28T16:04:30Z",
"updated_at": "2022-11-15T17:42:06Z",
"pushed_at": "2021-06-01T07:36:53Z",
"stargazers_count": 38,
"watchers_count": 38,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0688",
"exchange",
"microsoft",
"pentesting"
],
"visibility": "public",
"forks": 13,
"watchers": 38,
"score": 0
},
{
"id": 243813543,
"name": "CVE-2020-0688",
"full_name": "youncyb\/CVE-2020-0688",
"owner": {
"login": "youncyb",
"id": 33374470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33374470?v=4",
"html_url": "https:\/\/github.com\/youncyb"
},
"html_url": "https:\/\/github.com\/youncyb\/CVE-2020-0688",
"description": "CVE-2020-0688",
"fork": false,
"created_at": "2020-02-28T17:03:53Z",
"updated_at": "2022-11-09T18:06:31Z",
"pushed_at": "2020-02-28T17:07:15Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 10,
"score": 0
},
{
"id": 244149446,
"name": "CVE-2020-0688",
"full_name": "zcgonvh\/CVE-2020-0688",
"owner": {
"login": "zcgonvh",
"id": 25787677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
"html_url": "https:\/\/github.com\/zcgonvh"
},
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688",
"description": "Exploit and detect tools for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-01T12:57:32Z",
"updated_at": "2022-12-04T04:04:38Z",
"pushed_at": "2020-03-21T05:44:48Z",
"stargazers_count": 331,
"watchers_count": 331,
"has_discussions": false,
"forks_count": 81,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 81,
"watchers": 331,
"score": 0
},
{
"id": 245013193,
"name": "PSForgot2kEyXCHANGE",
"full_name": "justin-p\/PSForgot2kEyXCHANGE",
"owner": {
"login": "justin-p",
"id": 8249280,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8249280?v=4",
"html_url": "https:\/\/github.com\/justin-p"
},
"html_url": "https:\/\/github.com\/justin-p\/PSForgot2kEyXCHANGE",
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
"fork": false,
"created_at": "2020-03-04T22:02:30Z",
"updated_at": "2022-11-09T18:06:34Z",
"pushed_at": "2020-03-05T08:02:57Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 4,
"score": 0
},
{
"id": 248554405,
"name": "CVE-2020-0688",
"full_name": "cert-lv\/CVE-2020-0688",
"owner": {
"login": "cert-lv",
"id": 22764485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
"html_url": "https:\/\/github.com\/cert-lv"
},
"html_url": "https:\/\/github.com\/cert-lv\/CVE-2020-0688",
"description": "Vulnerability scanner for CVE-2020-0688",
"fork": false,
"created_at": "2020-03-19T16:39:56Z",
"updated_at": "2022-11-09T18:06:47Z",
"pushed_at": "2020-03-19T16:41:39Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 7,
"score": 0
},
{
"id": 251646716,
"name": "CVE-2020-0688",
"full_name": "ravinacademy\/CVE-2020-0688",
"owner": {
"login": "ravinacademy",
"id": 62107070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62107070?v=4",
"html_url": "https:\/\/github.com\/ravinacademy"
},
"html_url": "https:\/\/github.com\/ravinacademy\/CVE-2020-0688",
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
"fork": false,
"created_at": "2020-03-31T15:29:52Z",
"updated_at": "2022-10-26T16:49:22Z",
"pushed_at": "2020-04-01T06:57:50Z",
"stargazers_count": 12,
"watchers_count": 12,
"has_discussions": false,
"forks_count": 9,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 9,
"watchers": 12,
"score": 0
},
{
"id": 253240950,
"name": "Exploit_CVE-2020-0688",
"full_name": "mahyarx\/Exploit_CVE-2020-0688",
"owner": {
"login": "mahyarx",
"id": 7817627,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7817627?v=4",
"html_url": "https:\/\/github.com\/mahyarx"
},
"html_url": "https:\/\/github.com\/mahyarx\/Exploit_CVE-2020-0688",
"description": "CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\" ",
"fork": false,
"created_at": "2020-04-05T13:26:03Z",
"updated_at": "2022-11-09T18:07:04Z",
"pushed_at": "2020-04-05T13:33:10Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0
},
{
"id": 257824792,
"name": "CVE-2020-0688",
"full_name": "ktpdpro\/CVE-2020-0688",
"owner": {
"login": "ktpdpro",
"id": 17905484,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17905484?v=4",
"html_url": "https:\/\/github.com\/ktpdpro"
},
"html_url": "https:\/\/github.com\/ktpdpro\/CVE-2020-0688",
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
"fork": false,
"created_at": "2020-04-22T07:28:32Z",
"updated_at": "2021-12-05T20:36:25Z",
"pushed_at": "2020-04-22T01:09:27Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 4,
"score": 0
},
{
"id": 271748338,
"name": "cve-2020-0688-webshell-upload-technique",
"full_name": "w4fz5uck5\/cve-2020-0688-webshell-upload-technique",
"owner": {
"login": "w4fz5uck5",
"id": 32375656,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32375656?v=4",
"html_url": "https:\/\/github.com\/w4fz5uck5"
},
"html_url": "https:\/\/github.com\/w4fz5uck5\/cve-2020-0688-webshell-upload-technique",
"description": "cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output",
"fork": false,
"created_at": "2020-06-12T08:28:35Z",
"updated_at": "2022-12-14T03:23:03Z",
"pushed_at": "2020-07-16T10:42:27Z",
"stargazers_count": 21,
"watchers_count": 21,
"has_discussions": false,
"forks_count": 12,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 12,
"watchers": 21,
"score": 0
},
{
"id": 491348099,
"name": "CVE-2020-0688",
"full_name": "7heKnight\/CVE-2020-0688",
"owner": {
"login": "7heKnight",
"id": 60308445,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60308445?v=4",
"html_url": "https:\/\/github.com\/7heKnight"
},
"html_url": "https:\/\/github.com\/7heKnight\/CVE-2020-0688",
"description": "CVE-2020-0688_Microsoft Exchange default MachineKeySection deserialize vulnerability",
"fork": false,
"created_at": "2022-05-12T03:17:35Z",
"updated_at": "2022-05-12T03:18:14Z",
"pushed_at": "2022-06-03T06:34:57Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 554151760,
"name": "CVE-2020-0688-Python3",
"full_name": "TheKickPuncher\/CVE-2020-0688-Python3",
"owner": {
"login": "TheKickPuncher",
"id": 71475034,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/71475034?v=4",
"html_url": "https:\/\/github.com\/TheKickPuncher"
},
"html_url": "https:\/\/github.com\/TheKickPuncher\/CVE-2020-0688-Python3",
"description": "Exploit updated to use Python 3.",
"fork": false,
"created_at": "2022-10-19T10:36:10Z",
"updated_at": "2022-10-20T10:29:58Z",
"pushed_at": "2022-10-19T10:58:29Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2020-0688"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
}
]