PoC-in-GitHub/2021/CVE-2021-42278.json
2022-02-17 21:15:45 +09:00

144 lines
No EOL
4.7 KiB
JSON

[
{
"id": 437314230,
"name": "sam-the-admin",
"full_name": "WazeHell\/sam-the-admin",
"owner": {
"login": "WazeHell",
"id": 20618414,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20618414?v=4",
"html_url": "https:\/\/github.com\/WazeHell"
},
"html_url": "https:\/\/github.com\/WazeHell\/sam-the-admin",
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-11T15:10:30Z",
"updated_at": "2022-02-17T01:05:19Z",
"pushed_at": "2021-12-21T10:11:05Z",
"stargazers_count": 731,
"watchers_count": 731,
"forks_count": 161,
"allow_forking": true,
"is_template": false,
"topics": [
"active-directory",
"exploitation",
"redteam",
"s4u2self"
],
"visibility": "public",
"forks": 161,
"watchers": 731,
"score": 0
},
{
"id": 437829160,
"name": "noPac",
"full_name": "Ridter\/noPac",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter"
},
"html_url": "https:\/\/github.com\/Ridter\/noPac",
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287 to impersonate DA from standard domain user ",
"fork": false,
"created_at": "2021-12-13T10:28:12Z",
"updated_at": "2022-02-17T06:58:20Z",
"pushed_at": "2021-12-20T04:51:01Z",
"stargazers_count": 249,
"watchers_count": 249,
"forks_count": 49,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 49,
"watchers": 249,
"score": 0
},
{
"id": 437924403,
"name": "noPac",
"full_name": "waterrr\/noPac",
"owner": {
"login": "waterrr",
"id": 15225499,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15225499?v=4",
"html_url": "https:\/\/github.com\/waterrr"
},
"html_url": "https:\/\/github.com\/waterrr\/noPac",
"description": "Exploiting CVE-2021-42278 and CVE-2021-42287",
"fork": false,
"created_at": "2021-12-13T15:24:59Z",
"updated_at": "2021-12-14T06:51:42Z",
"pushed_at": "2021-12-13T15:40:14Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0
},
{
"id": 438053162,
"name": "Pachine",
"full_name": "ly4k\/Pachine",
"owner": {
"login": "ly4k",
"id": 53348818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53348818?v=4",
"html_url": "https:\/\/github.com\/ly4k"
},
"html_url": "https:\/\/github.com\/ly4k\/Pachine",
"description": "Python implementation for CVE-2021-42278 (Active Directory Privilege Escalation)",
"fork": false,
"created_at": "2021-12-13T23:15:05Z",
"updated_at": "2022-02-16T19:10:47Z",
"pushed_at": "2022-01-13T12:35:19Z",
"stargazers_count": 208,
"watchers_count": 208,
"forks_count": 28,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2021-42278"
],
"visibility": "public",
"forks": 28,
"watchers": 208,
"score": 0
},
{
"id": 442163896,
"name": "noPac-detection",
"full_name": "cybersecurityworks553\/noPac-detection",
"owner": {
"login": "cybersecurityworks553",
"id": 63910792,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63910792?v=4",
"html_url": "https:\/\/github.com\/cybersecurityworks553"
},
"html_url": "https:\/\/github.com\/cybersecurityworks553\/noPac-detection",
"description": "Detection script for CVE-2021-42278 and CVE-2021-42287",
"fork": false,
"created_at": "2021-12-27T13:10:45Z",
"updated_at": "2021-12-27T13:27:35Z",
"pushed_at": "2021-12-27T13:27:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
}
]