mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-18 05:42:21 +01:00
416 lines
No EOL
15 KiB
JSON
416 lines
No EOL
15 KiB
JSON
[
|
|
{
|
|
"id": 344161221,
|
|
"name": "exchange-0days-202103",
|
|
"full_name": "sgnls\/exchange-0days-202103",
|
|
"owner": {
|
|
"login": "sgnls",
|
|
"id": 11134228,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11134228?v=4",
|
|
"html_url": "https:\/\/github.com\/sgnls"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sgnls\/exchange-0days-202103",
|
|
"description": "IoC determination for exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858 and CVE-2021-27065.",
|
|
"fork": false,
|
|
"created_at": "2021-03-03T14:50:16Z",
|
|
"updated_at": "2021-03-10T19:04:25Z",
|
|
"pushed_at": "2021-03-10T19:04:22Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 4,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 344210374,
|
|
"name": "HAFNIUM-IOC",
|
|
"full_name": "soteria-security\/HAFNIUM-IOC",
|
|
"owner": {
|
|
"login": "soteria-security",
|
|
"id": 49722282,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/49722282?v=4",
|
|
"html_url": "https:\/\/github.com\/soteria-security"
|
|
},
|
|
"html_url": "https:\/\/github.com\/soteria-security\/HAFNIUM-IOC",
|
|
"description": "A PowerShell script to identify indicators of exploitation of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865",
|
|
"fork": false,
|
|
"created_at": "2021-03-03T17:36:18Z",
|
|
"updated_at": "2021-03-08T04:47:01Z",
|
|
"pushed_at": "2021-03-05T17:09:01Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 344742582,
|
|
"name": "exchange_webshell_detection",
|
|
"full_name": "cert-lv\/exchange_webshell_detection",
|
|
"owner": {
|
|
"login": "cert-lv",
|
|
"id": 22764485,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
|
|
"html_url": "https:\/\/github.com\/cert-lv"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cert-lv\/exchange_webshell_detection",
|
|
"description": "Detect webshells dropped on Microsoft Exchange servers exploited through \"proxylogon\" group of vulnerabilites (CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065)",
|
|
"fork": false,
|
|
"created_at": "2021-03-05T08:22:07Z",
|
|
"updated_at": "2021-03-11T12:31:04Z",
|
|
"pushed_at": "2021-03-09T11:27:08Z",
|
|
"stargazers_count": 70,
|
|
"watchers_count": 70,
|
|
"forks_count": 10,
|
|
"forks": 10,
|
|
"watchers": 70,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345052378,
|
|
"name": "Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
|
"full_name": "conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
|
"owner": {
|
|
"login": "conjojo",
|
|
"id": 79626719,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/79626719?v=4",
|
|
"html_url": "https:\/\/github.com\/conjojo"
|
|
},
|
|
"html_url": "https:\/\/github.com\/conjojo\/Microsoft_Exchange_Server_SSRF_CVE-2021-26855",
|
|
"description": "Microsoft Exchange Server SSRF漏洞(CVE-2021-26855)",
|
|
"fork": false,
|
|
"created_at": "2021-03-06T09:15:55Z",
|
|
"updated_at": "2021-03-10T16:37:03Z",
|
|
"pushed_at": "2021-03-06T10:34:49Z",
|
|
"stargazers_count": 35,
|
|
"watchers_count": 35,
|
|
"forks_count": 7,
|
|
"forks": 7,
|
|
"watchers": 35,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345142051,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "Udyz\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "Udyz",
|
|
"id": 39673284,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
|
|
"html_url": "https:\/\/github.com\/Udyz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Udyz\/CVE-2021-26855",
|
|
"description": "CVE-2021-26855 SSRF Exchange Server",
|
|
"fork": false,
|
|
"created_at": "2021-03-06T16:34:45Z",
|
|
"updated_at": "2021-03-11T14:55:12Z",
|
|
"pushed_at": "2021-03-11T14:55:10Z",
|
|
"stargazers_count": 24,
|
|
"watchers_count": 24,
|
|
"forks_count": 9,
|
|
"forks": 9,
|
|
"watchers": 24,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345173055,
|
|
"name": "CVE-2021-26855-SSRF",
|
|
"full_name": "pussycat0x\/CVE-2021-26855-SSRF",
|
|
"owner": {
|
|
"login": "pussycat0x",
|
|
"id": 65701233,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65701233?v=4",
|
|
"html_url": "https:\/\/github.com\/pussycat0x"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pussycat0x\/CVE-2021-26855-SSRF",
|
|
"description": "This script helps to identify CVE-2021-26855 ssrf Poc",
|
|
"fork": false,
|
|
"created_at": "2021-03-06T19:03:00Z",
|
|
"updated_at": "2021-03-10T07:49:18Z",
|
|
"pushed_at": "2021-03-10T07:41:56Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 4,
|
|
"forks": 4,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345215022,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "0xAbdullah\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "0xAbdullah",
|
|
"id": 29471278,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29471278?v=4",
|
|
"html_url": "https:\/\/github.com\/0xAbdullah"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xAbdullah\/CVE-2021-26855",
|
|
"description": "PoC for CVE-2021-26855 -Just a checker-",
|
|
"fork": false,
|
|
"created_at": "2021-03-06T23:12:22Z",
|
|
"updated_at": "2021-03-11T08:25:51Z",
|
|
"pushed_at": "2021-03-09T22:07:46Z",
|
|
"stargazers_count": 8,
|
|
"watchers_count": 8,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 8,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345228496,
|
|
"name": "CVE-2021-26855-SSRF-Exchange",
|
|
"full_name": "Th3eCrow\/CVE-2021-26855-SSRF-Exchange",
|
|
"owner": {
|
|
"login": "Th3eCrow",
|
|
"id": 10507748,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10507748?v=4",
|
|
"html_url": "https:\/\/github.com\/Th3eCrow"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Th3eCrow\/CVE-2021-26855-SSRF-Exchange",
|
|
"description": "CVE-2021-26855 SSRF Exchange Server",
|
|
"fork": false,
|
|
"created_at": "2021-03-07T00:55:16Z",
|
|
"updated_at": "2021-03-10T04:02:32Z",
|
|
"pushed_at": "2021-03-06T18:57:43Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345567206,
|
|
"name": "CVE-2021-26855_SSRF",
|
|
"full_name": "Yt1g3r\/CVE-2021-26855_SSRF",
|
|
"owner": {
|
|
"login": "Yt1g3r",
|
|
"id": 12625147,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
|
|
"html_url": "https:\/\/github.com\/Yt1g3r"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2021-26855_SSRF",
|
|
"description": "POC of CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, and CVE-2021-26865, ProxyLogon poc",
|
|
"fork": false,
|
|
"created_at": "2021-03-08T07:28:21Z",
|
|
"updated_at": "2021-03-11T03:31:00Z",
|
|
"pushed_at": "2021-03-11T03:28:47Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345586288,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "jsdryan\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "jsdryan",
|
|
"id": 34669056,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/34669056?v=4",
|
|
"html_url": "https:\/\/github.com\/jsdryan"
|
|
},
|
|
"html_url": "https:\/\/github.com\/jsdryan\/CVE-2021-26855",
|
|
"description": "CVE-2021-26855 exp",
|
|
"fork": false,
|
|
"created_at": "2021-03-08T08:39:05Z",
|
|
"updated_at": "2021-03-11T11:33:34Z",
|
|
"pushed_at": "2021-03-08T08:09:01Z",
|
|
"stargazers_count": 52,
|
|
"watchers_count": 52,
|
|
"forks_count": 58,
|
|
"forks": 58,
|
|
"watchers": 52,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345639477,
|
|
"name": "proxylogscan",
|
|
"full_name": "dwisiswant0\/proxylogscan",
|
|
"owner": {
|
|
"login": "dwisiswant0",
|
|
"id": 25837540,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
|
"html_url": "https:\/\/github.com\/dwisiswant0"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dwisiswant0\/proxylogscan",
|
|
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
|
"fork": false,
|
|
"created_at": "2021-03-08T11:54:32Z",
|
|
"updated_at": "2021-03-11T11:41:07Z",
|
|
"pushed_at": "2021-03-08T14:50:48Z",
|
|
"stargazers_count": 83,
|
|
"watchers_count": 83,
|
|
"forks_count": 11,
|
|
"forks": 11,
|
|
"watchers": 83,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345955330,
|
|
"name": "ExchangeWeaknessTest",
|
|
"full_name": "mauricelambert\/ExchangeWeaknessTest",
|
|
"owner": {
|
|
"login": "mauricelambert",
|
|
"id": 50479118,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
|
|
"html_url": "https:\/\/github.com\/mauricelambert"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mauricelambert\/ExchangeWeaknessTest",
|
|
"description": "This script test the CVE-2021-26855 vulnerability on Exchange Server.",
|
|
"fork": false,
|
|
"created_at": "2021-03-09T09:40:29Z",
|
|
"updated_at": "2021-03-09T09:43:55Z",
|
|
"pushed_at": "2021-03-09T09:42:51Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345970212,
|
|
"name": "Exchange_IOC_Hunter",
|
|
"full_name": "DCScoder\/Exchange_IOC_Hunter",
|
|
"owner": {
|
|
"login": "DCScoder",
|
|
"id": 42096735,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42096735?v=4",
|
|
"html_url": "https:\/\/github.com\/DCScoder"
|
|
},
|
|
"html_url": "https:\/\/github.com\/DCScoder\/Exchange_IOC_Hunter",
|
|
"description": "CVE-2021-26855, CVE-2021-26857, CVE-2021-26858, CVE-2021-27065",
|
|
"fork": false,
|
|
"created_at": "2021-03-09T10:36:44Z",
|
|
"updated_at": "2021-03-11T15:08:41Z",
|
|
"pushed_at": "2021-03-11T15:08:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 345990340,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "PwCNO-CTO\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "PwCNO-CTO",
|
|
"id": 58770486,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58770486?v=4",
|
|
"html_url": "https:\/\/github.com\/PwCNO-CTO"
|
|
},
|
|
"html_url": "https:\/\/github.com\/PwCNO-CTO\/CVE-2021-26855",
|
|
"description": "Microsoft Exchange Server Remote Code Execution Vulnerability (ProxyLogon)",
|
|
"fork": false,
|
|
"created_at": "2021-03-09T11:57:26Z",
|
|
"updated_at": "2021-03-09T11:57:26Z",
|
|
"pushed_at": "2021-03-09T11:57:27Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 346033440,
|
|
"name": "CVE-2021-26855-PoC",
|
|
"full_name": "srvaccount\/CVE-2021-26855-PoC",
|
|
"owner": {
|
|
"login": "srvaccount",
|
|
"id": 76211832,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76211832?v=4",
|
|
"html_url": "https:\/\/github.com\/srvaccount"
|
|
},
|
|
"html_url": "https:\/\/github.com\/srvaccount\/CVE-2021-26855-PoC",
|
|
"description": "PoC exploit code for CVE-2021-26855",
|
|
"fork": false,
|
|
"created_at": "2021-03-09T14:27:06Z",
|
|
"updated_at": "2021-03-10T16:52:56Z",
|
|
"pushed_at": "2021-03-09T21:59:53Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 11,
|
|
"forks": 11,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 346078570,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "h4x0r-dz\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "h4x0r-dz",
|
|
"id": 26070859,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26070859?v=4",
|
|
"html_url": "https:\/\/github.com\/h4x0r-dz"
|
|
},
|
|
"html_url": "https:\/\/github.com\/h4x0r-dz\/CVE-2021-26855",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-03-09T16:54:39Z",
|
|
"updated_at": "2021-03-11T14:54:07Z",
|
|
"pushed_at": "2021-03-09T16:56:09Z",
|
|
"stargazers_count": 50,
|
|
"watchers_count": 50,
|
|
"forks_count": 39,
|
|
"forks": 39,
|
|
"watchers": 50,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 346241102,
|
|
"name": "CVE-2021-26855_PoC",
|
|
"full_name": "alt3kx\/CVE-2021-26855_PoC",
|
|
"owner": {
|
|
"login": "alt3kx",
|
|
"id": 3140111,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3140111?v=4",
|
|
"html_url": "https:\/\/github.com\/alt3kx"
|
|
},
|
|
"html_url": "https:\/\/github.com\/alt3kx\/CVE-2021-26855_PoC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-03-10T05:21:19Z",
|
|
"updated_at": "2021-03-11T14:47:08Z",
|
|
"pushed_at": "2021-03-10T05:46:35Z",
|
|
"stargazers_count": 27,
|
|
"watchers_count": 27,
|
|
"forks_count": 9,
|
|
"forks": 9,
|
|
"watchers": 27,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 346347325,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "achabahe\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "achabahe",
|
|
"id": 12010973,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12010973?v=4",
|
|
"html_url": "https:\/\/github.com\/achabahe"
|
|
},
|
|
"html_url": "https:\/\/github.com\/achabahe\/CVE-2021-26855",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2021-03-10T12:23:43Z",
|
|
"updated_at": "2021-03-10T22:51:26Z",
|
|
"pushed_at": "2021-03-10T12:46:41Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 3,
|
|
"forks": 3,
|
|
"watchers": 1,
|
|
"score": 0
|
|
}
|
|
] |