mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 04:42:22 +01:00
439 lines
No EOL
15 KiB
JSON
439 lines
No EOL
15 KiB
JSON
[
|
|
{
|
|
"id": 243126851,
|
|
"name": "cve-2020-0688",
|
|
"full_name": "random-robbie\/cve-2020-0688",
|
|
"owner": {
|
|
"login": "random-robbie",
|
|
"id": 4902869,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4902869?v=4",
|
|
"html_url": "https:\/\/github.com\/random-robbie"
|
|
},
|
|
"html_url": "https:\/\/github.com\/random-robbie\/cve-2020-0688",
|
|
"description": "cve-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-02-25T23:44:16Z",
|
|
"updated_at": "2021-03-16T02:27:57Z",
|
|
"pushed_at": "2020-02-26T00:58:39Z",
|
|
"stargazers_count": 152,
|
|
"watchers_count": 152,
|
|
"forks_count": 47,
|
|
"forks": 47,
|
|
"watchers": 152,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243257176,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "Jumbo-WJB\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "Jumbo-WJB",
|
|
"id": 7954518,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7954518?v=4",
|
|
"html_url": "https:\/\/github.com\/Jumbo-WJB"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Jumbo-WJB\/CVE-2020-0688",
|
|
"description": "CVE-2020-0688 - Exchange",
|
|
"fork": false,
|
|
"created_at": "2020-02-26T12:28:11Z",
|
|
"updated_at": "2021-03-17T16:00:04Z",
|
|
"pushed_at": "2020-02-27T03:50:07Z",
|
|
"stargazers_count": 56,
|
|
"watchers_count": 56,
|
|
"forks_count": 23,
|
|
"forks": 23,
|
|
"watchers": 56,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243416592,
|
|
"name": "cve-2020-0688",
|
|
"full_name": "Ridter\/cve-2020-0688",
|
|
"owner": {
|
|
"login": "Ridter",
|
|
"id": 6007471,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
|
|
"html_url": "https:\/\/github.com\/Ridter"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Ridter\/cve-2020-0688",
|
|
"description": "cve-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-02-27T02:54:27Z",
|
|
"updated_at": "2021-03-10T04:08:31Z",
|
|
"pushed_at": "2020-06-19T09:28:15Z",
|
|
"stargazers_count": 266,
|
|
"watchers_count": 266,
|
|
"forks_count": 89,
|
|
"forks": 89,
|
|
"watchers": 266,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243531424,
|
|
"name": "CVE-2020-0688_EXP",
|
|
"full_name": "Yt1g3r\/CVE-2020-0688_EXP",
|
|
"owner": {
|
|
"login": "Yt1g3r",
|
|
"id": 12625147,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12625147?v=4",
|
|
"html_url": "https:\/\/github.com\/Yt1g3r"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Yt1g3r\/CVE-2020-0688_EXP",
|
|
"description": "CVE-2020-0688_EXP Auto trigger payload & encrypt method",
|
|
"fork": false,
|
|
"created_at": "2020-02-27T13:53:46Z",
|
|
"updated_at": "2021-03-14T05:07:44Z",
|
|
"pushed_at": "2020-02-27T15:57:53Z",
|
|
"stargazers_count": 134,
|
|
"watchers_count": 134,
|
|
"forks_count": 58,
|
|
"forks": 58,
|
|
"watchers": 134,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243640997,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "righter83\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "righter83",
|
|
"id": 12727740,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12727740?v=4",
|
|
"html_url": "https:\/\/github.com\/righter83"
|
|
},
|
|
"html_url": "https:\/\/github.com\/righter83\/CVE-2020-0688",
|
|
"description": "Exchange Scanner CVE-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-02-27T23:55:04Z",
|
|
"updated_at": "2021-03-11T15:57:36Z",
|
|
"pushed_at": "2020-11-06T13:33:30Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243672879,
|
|
"name": "cve-2020-0688",
|
|
"full_name": "truongtn\/cve-2020-0688",
|
|
"owner": {
|
|
"login": "truongtn",
|
|
"id": 11813006,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11813006?v=4",
|
|
"html_url": "https:\/\/github.com\/truongtn"
|
|
},
|
|
"html_url": "https:\/\/github.com\/truongtn\/cve-2020-0688",
|
|
"description": "I made this script for conducting CVE-2020-0688 more rapidly. It helps to improve checking the vuln, reducing hugely steps for that",
|
|
"fork": false,
|
|
"created_at": "2020-02-28T03:47:40Z",
|
|
"updated_at": "2020-02-28T09:39:14Z",
|
|
"pushed_at": "2020-02-28T04:04:54Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243801603,
|
|
"name": "CVE-2020-0688-Scanner",
|
|
"full_name": "onSec-fr\/CVE-2020-0688-Scanner",
|
|
"owner": {
|
|
"login": "onSec-fr",
|
|
"id": 59887731,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59887731?v=4",
|
|
"html_url": "https:\/\/github.com\/onSec-fr"
|
|
},
|
|
"html_url": "https:\/\/github.com\/onSec-fr\/CVE-2020-0688-Scanner",
|
|
"description": "Quick tool for checking CVE-2020-0688 on multiple hosts with a non-intrusive method.",
|
|
"fork": false,
|
|
"created_at": "2020-02-28T16:04:30Z",
|
|
"updated_at": "2021-03-11T15:57:50Z",
|
|
"pushed_at": "2020-10-07T08:10:46Z",
|
|
"stargazers_count": 35,
|
|
"watchers_count": 35,
|
|
"forks_count": 12,
|
|
"forks": 12,
|
|
"watchers": 35,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 243813543,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "youncyb\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "youncyb",
|
|
"id": 33374470,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/33374470?v=4",
|
|
"html_url": "https:\/\/github.com\/youncyb"
|
|
},
|
|
"html_url": "https:\/\/github.com\/youncyb\/CVE-2020-0688",
|
|
"description": "CVE-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-02-28T17:03:53Z",
|
|
"updated_at": "2021-03-13T00:34:36Z",
|
|
"pushed_at": "2020-02-28T17:07:15Z",
|
|
"stargazers_count": 9,
|
|
"watchers_count": 9,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 9,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 244149446,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "zcgonvh\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "zcgonvh",
|
|
"id": 25787677,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25787677?v=4",
|
|
"html_url": "https:\/\/github.com\/zcgonvh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zcgonvh\/CVE-2020-0688",
|
|
"description": "Exploit and detect tools for CVE-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-03-01T12:57:32Z",
|
|
"updated_at": "2021-03-14T05:07:40Z",
|
|
"pushed_at": "2020-03-21T05:44:48Z",
|
|
"stargazers_count": 272,
|
|
"watchers_count": 272,
|
|
"forks_count": 70,
|
|
"forks": 70,
|
|
"watchers": 272,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 245013193,
|
|
"name": "PSForgot2kEyXCHANGE",
|
|
"full_name": "justin-p\/PSForgot2kEyXCHANGE",
|
|
"owner": {
|
|
"login": "justin-p",
|
|
"id": 8249280,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8249280?v=4",
|
|
"html_url": "https:\/\/github.com\/justin-p"
|
|
},
|
|
"html_url": "https:\/\/github.com\/justin-p\/PSForgot2kEyXCHANGE",
|
|
"description": "PoC for Forgot2kEyXCHANGE (CVE-2020-0688) written in PowerShell",
|
|
"fork": false,
|
|
"created_at": "2020-03-04T22:02:30Z",
|
|
"updated_at": "2020-08-14T17:15:13Z",
|
|
"pushed_at": "2020-03-05T08:02:57Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 5,
|
|
"forks": 5,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 248554405,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "cert-lv\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "cert-lv",
|
|
"id": 22764485,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22764485?v=4",
|
|
"html_url": "https:\/\/github.com\/cert-lv"
|
|
},
|
|
"html_url": "https:\/\/github.com\/cert-lv\/CVE-2020-0688",
|
|
"description": "Vulnerability scanner for CVE-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-03-19T16:39:56Z",
|
|
"updated_at": "2021-03-11T15:58:15Z",
|
|
"pushed_at": "2020-03-19T16:41:39Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 251646716,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "ravinacademy\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "ravinacademy",
|
|
"id": 62107070,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62107070?v=4",
|
|
"html_url": "https:\/\/github.com\/ravinacademy"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ravinacademy\/CVE-2020-0688",
|
|
"description": "Exploitation Script for CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\"",
|
|
"fork": false,
|
|
"created_at": "2020-03-31T15:29:52Z",
|
|
"updated_at": "2021-02-07T08:36:06Z",
|
|
"pushed_at": "2020-04-01T06:57:50Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"forks_count": 9,
|
|
"forks": 9,
|
|
"watchers": 12,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 253240950,
|
|
"name": "Exploit_CVE-2020-0688",
|
|
"full_name": "mahyarx\/Exploit_CVE-2020-0688",
|
|
"owner": {
|
|
"login": "mahyarx",
|
|
"id": 7817627,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7817627?v=4",
|
|
"html_url": "https:\/\/github.com\/mahyarx"
|
|
},
|
|
"html_url": "https:\/\/github.com\/mahyarx\/Exploit_CVE-2020-0688",
|
|
"description": "CVE-2020-0688 \"Microsoft Exchange default MachineKeySection deserialize vulnerability\" ",
|
|
"fork": false,
|
|
"created_at": "2020-04-05T13:26:03Z",
|
|
"updated_at": "2021-03-08T23:35:10Z",
|
|
"pushed_at": "2020-04-05T13:33:10Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 257824792,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "ktpdpro\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "ktpdpro",
|
|
"id": 17905484,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/17905484?v=4",
|
|
"html_url": "https:\/\/github.com\/ktpdpro"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ktpdpro\/CVE-2020-0688",
|
|
"description": "PoC RCE Reverse Shell for CVE-2020-0688",
|
|
"fork": false,
|
|
"created_at": "2020-04-22T07:28:32Z",
|
|
"updated_at": "2021-03-11T15:58:27Z",
|
|
"pushed_at": "2020-04-22T01:09:27Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 271748338,
|
|
"name": "cve-2020-0688-webshell-upload-technique",
|
|
"full_name": "w4fz5uck5\/cve-2020-0688-webshell-upload-technique",
|
|
"owner": {
|
|
"login": "w4fz5uck5",
|
|
"id": 32375656,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32375656?v=4",
|
|
"html_url": "https:\/\/github.com\/w4fz5uck5"
|
|
},
|
|
"html_url": "https:\/\/github.com\/w4fz5uck5\/cve-2020-0688-webshell-upload-technique",
|
|
"description": "cve-2020-0688 UNIVERSAL Python implementation utilizing ASPX webshell for command output",
|
|
"fork": false,
|
|
"created_at": "2020-06-12T08:28:35Z",
|
|
"updated_at": "2021-03-05T21:42:09Z",
|
|
"pushed_at": "2020-07-16T10:42:27Z",
|
|
"stargazers_count": 14,
|
|
"watchers_count": 14,
|
|
"forks_count": 8,
|
|
"forks": 8,
|
|
"watchers": 14,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 288177224,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "murataydemir\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "murataydemir",
|
|
"id": 16391655,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16391655?v=4",
|
|
"html_url": "https:\/\/github.com\/murataydemir"
|
|
},
|
|
"html_url": "https:\/\/github.com\/murataydemir\/CVE-2020-0688",
|
|
"description": "[CVE-2020-0688] Microsoft Exchange Server Fixed Cryptographic Key Remote Code Execution (RCE)",
|
|
"fork": false,
|
|
"created_at": "2020-08-17T12:41:51Z",
|
|
"updated_at": "2021-03-13T00:32:52Z",
|
|
"pushed_at": "2020-08-29T21:00:56Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 3,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 306497480,
|
|
"name": "ecp_slap",
|
|
"full_name": "zyn3rgy\/ecp_slap",
|
|
"owner": {
|
|
"login": "zyn3rgy",
|
|
"id": 73311948,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/73311948?v=4",
|
|
"html_url": "https:\/\/github.com\/zyn3rgy"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zyn3rgy\/ecp_slap",
|
|
"description": "CVE-2020-0688 PoC",
|
|
"fork": false,
|
|
"created_at": "2020-10-23T01:18:13Z",
|
|
"updated_at": "2020-12-21T20:27:18Z",
|
|
"pushed_at": "2020-10-26T03:35:14Z",
|
|
"stargazers_count": 7,
|
|
"watchers_count": 7,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 7,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 308367304,
|
|
"name": "CVE-2020-0688-Scanner",
|
|
"full_name": "SLSteff\/CVE-2020-0688-Scanner",
|
|
"owner": {
|
|
"login": "SLSteff",
|
|
"id": 20557573,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20557573?v=4",
|
|
"html_url": "https:\/\/github.com\/SLSteff"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SLSteff\/CVE-2020-0688-Scanner",
|
|
"description": "Scans for Microsoft Exchange Versions with masscan",
|
|
"fork": false,
|
|
"created_at": "2020-10-29T15:16:24Z",
|
|
"updated_at": "2021-03-20T06:54:20Z",
|
|
"pushed_at": "2020-10-29T20:06:25Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 326652424,
|
|
"name": "CVE-2020-0688",
|
|
"full_name": "MrTiz9\/CVE-2020-0688",
|
|
"owner": {
|
|
"login": "MrTiz9",
|
|
"id": 29025198,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29025198?v=4",
|
|
"html_url": "https:\/\/github.com\/MrTiz9"
|
|
},
|
|
"html_url": "https:\/\/github.com\/MrTiz9\/CVE-2020-0688",
|
|
"description": "Remote Code Execution on Microsoft Exchange Server through fixed cryptographic keys",
|
|
"fork": false,
|
|
"created_at": "2021-01-04T10:48:40Z",
|
|
"updated_at": "2021-03-11T15:58:39Z",
|
|
"pushed_at": "2021-01-04T10:49:21Z",
|
|
"stargazers_count": 3,
|
|
"watchers_count": 3,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 3,
|
|
"score": 0
|
|
}
|
|
] |