mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
301 lines
No EOL
10 KiB
JSON
301 lines
No EOL
10 KiB
JSON
[
|
|
{
|
|
"id": 233959211,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "nissan-sudo\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "nissan-sudo",
|
|
"id": 58976920,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/58976920?v=4",
|
|
"html_url": "https:\/\/github.com\/nissan-sudo"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nissan-sudo\/CVE-2020-0601",
|
|
"description": "Remote Code Execution Exploit ",
|
|
"fork": false,
|
|
"created_at": "2020-01-14T23:53:18Z",
|
|
"updated_at": "2020-01-15T11:04:25Z",
|
|
"pushed_at": "2020-01-14T23:56:22Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 233960159,
|
|
"name": "cve-2020-0601",
|
|
"full_name": "0xxon\/cve-2020-0601",
|
|
"owner": {
|
|
"login": "0xxon",
|
|
"id": 1538460,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
|
|
"html_url": "https:\/\/github.com\/0xxon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601",
|
|
"description": "Zeek package to detect CVE-2020-0601",
|
|
"fork": false,
|
|
"created_at": "2020-01-15T00:01:29Z",
|
|
"updated_at": "2020-01-17T07:39:55Z",
|
|
"pushed_at": "2020-01-16T18:27:28Z",
|
|
"stargazers_count": 27,
|
|
"watchers_count": 27,
|
|
"forks_count": 10,
|
|
"forks": 10,
|
|
"watchers": 27,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234134766,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "SherlockSec\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "SherlockSec",
|
|
"id": 37545173,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/37545173?v=4",
|
|
"html_url": "https:\/\/github.com\/SherlockSec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/SherlockSec\/CVE-2020-0601",
|
|
"description": "A Windows Crypto Exploit",
|
|
"fork": false,
|
|
"created_at": "2020-01-15T17:26:58Z",
|
|
"updated_at": "2020-01-16T20:56:07Z",
|
|
"pushed_at": "2020-01-15T17:28:20Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234146234,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "JPurrier\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "JPurrier",
|
|
"id": 25715340,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/25715340?v=4",
|
|
"html_url": "https:\/\/github.com\/JPurrier"
|
|
},
|
|
"html_url": "https:\/\/github.com\/JPurrier\/CVE-2020-0601",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-01-15T18:31:30Z",
|
|
"updated_at": "2020-01-17T10:49:19Z",
|
|
"pushed_at": "2020-01-17T10:49:17Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234190972,
|
|
"name": "cve-2020-0601-plugin",
|
|
"full_name": "0xxon\/cve-2020-0601-plugin",
|
|
"owner": {
|
|
"login": "0xxon",
|
|
"id": 1538460,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
|
|
"html_url": "https:\/\/github.com\/0xxon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-plugin",
|
|
"description": "Zeek package that uses OpenSSL to detect CVE-2020-0601 exploit attempts",
|
|
"fork": false,
|
|
"created_at": "2020-01-15T23:07:02Z",
|
|
"updated_at": "2020-01-16T18:32:31Z",
|
|
"pushed_at": "2020-01-16T18:06:57Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 1,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234191063,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "ollypwn\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "ollypwn",
|
|
"id": 53348818,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/53348818?v=4",
|
|
"html_url": "https:\/\/github.com\/ollypwn"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ollypwn\/CVE-2020-0601",
|
|
"description": "PoC for CVE-2020-0601",
|
|
"fork": false,
|
|
"created_at": "2020-01-15T23:07:41Z",
|
|
"updated_at": "2020-01-17T15:17:00Z",
|
|
"pushed_at": "2020-01-17T10:09:11Z",
|
|
"stargazers_count": 521,
|
|
"watchers_count": 521,
|
|
"forks_count": 139,
|
|
"forks": 139,
|
|
"watchers": 521,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234192123,
|
|
"name": "chainoffools",
|
|
"full_name": "kudelskisecurity\/chainoffools",
|
|
"owner": {
|
|
"login": "kudelskisecurity",
|
|
"id": 10771090,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/10771090?v=4",
|
|
"html_url": "https:\/\/github.com\/kudelskisecurity"
|
|
},
|
|
"html_url": "https:\/\/github.com\/kudelskisecurity\/chainoffools",
|
|
"description": "A PoC for CVE-2020-0601",
|
|
"fork": false,
|
|
"created_at": "2020-01-15T23:15:32Z",
|
|
"updated_at": "2020-01-17T14:29:26Z",
|
|
"pushed_at": "2020-01-17T13:29:44Z",
|
|
"stargazers_count": 207,
|
|
"watchers_count": 207,
|
|
"forks_count": 51,
|
|
"forks": 51,
|
|
"watchers": 207,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234220195,
|
|
"name": "Awesome-CVE-2020-0601",
|
|
"full_name": "plawin\/Awesome-CVE-2020-0601",
|
|
"owner": {
|
|
"login": "plawin",
|
|
"id": 18636152,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/18636152?v=4",
|
|
"html_url": "https:\/\/github.com\/plawin"
|
|
},
|
|
"html_url": "https:\/\/github.com\/plawin\/Awesome-CVE-2020-0601",
|
|
"description": "😂An awesome curated list of repos for CVE-2020-0601.",
|
|
"fork": false,
|
|
"created_at": "2020-01-16T02:46:21Z",
|
|
"updated_at": "2020-01-16T11:25:11Z",
|
|
"pushed_at": "2020-01-16T03:14:43Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234317211,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "BleepSec\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "BleepSec",
|
|
"id": 550582,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/550582?v=4",
|
|
"html_url": "https:\/\/github.com\/BleepSec"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BleepSec\/CVE-2020-0601",
|
|
"description": "Curated list of CVE-2020-0601 resources",
|
|
"fork": false,
|
|
"created_at": "2020-01-16T12:40:48Z",
|
|
"updated_at": "2020-01-16T17:05:31Z",
|
|
"pushed_at": "2020-01-16T17:05:29Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234378948,
|
|
"name": "CVE-2020-0601",
|
|
"full_name": "apmunch\/CVE-2020-0601",
|
|
"owner": {
|
|
"login": "apmunch",
|
|
"id": 7328483,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7328483?v=4",
|
|
"html_url": "https:\/\/github.com\/apmunch"
|
|
},
|
|
"html_url": "https:\/\/github.com\/apmunch\/CVE-2020-0601",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2020-01-16T17:54:36Z",
|
|
"updated_at": "2020-01-16T18:04:01Z",
|
|
"pushed_at": "2020-01-16T18:03:59Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234433419,
|
|
"name": "badecparams",
|
|
"full_name": "saleemrashid\/badecparams",
|
|
"owner": {
|
|
"login": "saleemrashid",
|
|
"id": 22301423,
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/22301423?v=4",
|
|
"html_url": "https:\/\/github.com\/saleemrashid"
|
|
},
|
|
"html_url": "https:\/\/github.com\/saleemrashid\/badecparams",
|
|
"description": "Proof of Concept for CVE-2020-0601",
|
|
"fork": false,
|
|
"created_at": "2020-01-16T23:44:37Z",
|
|
"updated_at": "2020-01-17T15:06:36Z",
|
|
"pushed_at": "2020-01-17T07:24:59Z",
|
|
"stargazers_count": 21,
|
|
"watchers_count": 21,
|
|
"forks_count": 2,
|
|
"forks": 2,
|
|
"watchers": 21,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234442281,
|
|
"name": "cve-2020-0601-utils",
|
|
"full_name": "0xxon\/cve-2020-0601-utils",
|
|
"owner": {
|
|
"login": "0xxon",
|
|
"id": 1538460,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1538460?v=4",
|
|
"html_url": "https:\/\/github.com\/0xxon"
|
|
},
|
|
"html_url": "https:\/\/github.com\/0xxon\/cve-2020-0601-utils",
|
|
"description": "C++ based utility to check if certificates are trying to exploit CVE-2020-0601",
|
|
"fork": false,
|
|
"created_at": "2020-01-17T01:02:52Z",
|
|
"updated_at": "2020-01-17T01:03:05Z",
|
|
"pushed_at": "2020-01-17T01:03:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 234574037,
|
|
"name": "Windows10_Cumulative_Updates_PowerShell",
|
|
"full_name": "Doug-Moody\/Windows10_Cumulative_Updates_PowerShell",
|
|
"owner": {
|
|
"login": "Doug-Moody",
|
|
"id": 40870695,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/40870695?v=4",
|
|
"html_url": "https:\/\/github.com\/Doug-Moody"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Doug-Moody\/Windows10_Cumulative_Updates_PowerShell",
|
|
"description": "This powershell script can be ran on a system and will identify if a system is patched for CVE-2020-0601 and if not will then download the appropriate patch and execute. Only works for Windows 10 1607-1909. Feel free to update \/ fork.",
|
|
"fork": false,
|
|
"created_at": "2020-01-17T15:13:37Z",
|
|
"updated_at": "2020-01-17T15:21:22Z",
|
|
"pushed_at": "2020-01-17T15:21:20Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |