mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-17 21:32:21 +01:00
140 lines
No EOL
5 KiB
JSON
140 lines
No EOL
5 KiB
JSON
[
|
|
{
|
|
"id": 88486475,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "bhdresh\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199",
|
|
"description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-04-17T08:10:07Z",
|
|
"updated_at": "2021-03-05T13:05:06Z",
|
|
"pushed_at": "2017-11-19T11:01:16Z",
|
|
"stargazers_count": 647,
|
|
"watchers_count": 647,
|
|
"forks_count": 287,
|
|
"forks": 287,
|
|
"watchers": 647,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 109420190,
|
|
"name": "RTF-Cleaner",
|
|
"full_name": "nicpenning\/RTF-Cleaner",
|
|
"owner": {
|
|
"login": "nicpenning",
|
|
"id": 5582679,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5582679?v=4",
|
|
"html_url": "https:\/\/github.com\/nicpenning"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
|
|
"description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
|
|
"fork": false,
|
|
"created_at": "2017-11-03T16:47:16Z",
|
|
"updated_at": "2019-06-29T16:49:45Z",
|
|
"pushed_at": "2017-11-03T20:55:20Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 111145351,
|
|
"name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"owner": {
|
|
"login": "bloomer1016",
|
|
"id": 12056770,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12056770?v=4",
|
|
"html_url": "https:\/\/github.com\/bloomer1016"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2017-11-17T20:00:29Z",
|
|
"updated_at": "2020-03-29T03:29:38Z",
|
|
"pushed_at": "2017-11-17T20:00:42Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 113558617,
|
|
"name": "RTF-Cleaner",
|
|
"full_name": "jacobsoo\/RTF-Cleaner",
|
|
"owner": {
|
|
"login": "jacobsoo",
|
|
"id": 3516693,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3516693?v=4",
|
|
"html_url": "https:\/\/github.com\/jacobsoo"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
|
|
"description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-12-08T09:45:25Z",
|
|
"updated_at": "2018-02-21T04:37:47Z",
|
|
"pushed_at": "2017-12-08T09:46:07Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 126305253,
|
|
"name": "CVE-2017-0199",
|
|
"full_name": "likescam\/CVE-2017-0199",
|
|
"owner": {
|
|
"login": "likescam",
|
|
"id": 2469038,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2469038?v=4",
|
|
"html_url": "https:\/\/github.com\/likescam"
|
|
},
|
|
"html_url": "https:\/\/github.com\/likescam\/CVE-2017-0199",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2018-03-22T08:40:55Z",
|
|
"updated_at": "2018-03-22T08:41:14Z",
|
|
"pushed_at": "2018-03-22T08:41:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 305189722,
|
|
"name": "CVE-2017-0199-PY-KIT",
|
|
"full_name": "stealth-ronin\/CVE-2017-0199-PY-KIT",
|
|
"owner": {
|
|
"login": "stealth-ronin",
|
|
"id": 65579305,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65579305?v=4",
|
|
"html_url": "https:\/\/github.com\/stealth-ronin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/stealth-ronin\/CVE-2017-0199-PY-KIT",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-10-18T20:24:38Z",
|
|
"updated_at": "2020-10-18T20:25:13Z",
|
|
"pushed_at": "2020-10-18T20:25:11Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |