mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2026-01-29 06:39:02 +01:00
163 lines
No EOL
5.7 KiB
JSON
163 lines
No EOL
5.7 KiB
JSON
[
|
|
{
|
|
"id": 103382657,
|
|
"name": "CVE-2017-8759-Exploit-sample",
|
|
"full_name": "Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"owner": {
|
|
"login": "Voulnet",
|
|
"id": 1334847,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1334847?v=4",
|
|
"html_url": "https:\/\/github.com\/Voulnet"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Voulnet\/CVE-2017-8759-Exploit-sample",
|
|
"description": "Running CVE-2017-8759 exploit sample.",
|
|
"fork": false,
|
|
"created_at": "2017-09-13T09:50:04Z",
|
|
"updated_at": "2020-03-22T01:58:08Z",
|
|
"pushed_at": "2020-01-23T06:53:00Z",
|
|
"stargazers_count": 259,
|
|
"watchers_count": 259,
|
|
"forks_count": 107,
|
|
"forks": 107,
|
|
"watchers": 259,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103517315,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "bhdresh\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "bhdresh",
|
|
"id": 8931885,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
|
|
"html_url": "https:\/\/github.com\/bhdresh"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-8759",
|
|
"description": "Exploit toolkit CVE-2017-8759 - v1.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft .NET Framework RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
|
|
"fork": false,
|
|
"created_at": "2017-09-14T10:04:39Z",
|
|
"updated_at": "2020-03-22T04:41:59Z",
|
|
"pushed_at": "2018-09-10T16:25:12Z",
|
|
"stargazers_count": 304,
|
|
"watchers_count": 304,
|
|
"forks_count": 121,
|
|
"forks": 121,
|
|
"watchers": 304,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 103595749,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "Lz1y\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "Lz1y",
|
|
"id": 23468993,
|
|
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/23468993?v=4",
|
|
"html_url": "https:\/\/github.com\/Lz1y"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Lz1y\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2017-09-15T00:36:17Z",
|
|
"updated_at": "2019-10-08T16:03:26Z",
|
|
"pushed_at": "2017-12-28T07:16:15Z",
|
|
"stargazers_count": 82,
|
|
"watchers_count": 82,
|
|
"forks_count": 51,
|
|
"forks": 51,
|
|
"watchers": 82,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 161397133,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "ChaitanyaHaritash\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "ChaitanyaHaritash",
|
|
"id": 16261173,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/16261173?v=4",
|
|
"html_url": "https:\/\/github.com\/ChaitanyaHaritash"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ChaitanyaHaritash\/CVE-2017-8759",
|
|
"description": "Just My ports of CVE-2017-8759",
|
|
"fork": false,
|
|
"created_at": "2018-12-11T21:39:39Z",
|
|
"updated_at": "2018-12-11T22:02:33Z",
|
|
"pushed_at": "2018-12-11T22:02:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 1,
|
|
"forks": 1,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 188365315,
|
|
"name": "CVE-2017-8759Expoit",
|
|
"full_name": "smashinu\/CVE-2017-8759Expoit",
|
|
"owner": {
|
|
"login": "smashinu",
|
|
"id": 30433218,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/30433218?v=4",
|
|
"html_url": "https:\/\/github.com\/smashinu"
|
|
},
|
|
"html_url": "https:\/\/github.com\/smashinu\/CVE-2017-8759Expoit",
|
|
"description": "yehnah",
|
|
"fork": false,
|
|
"created_at": "2019-05-24T06:29:45Z",
|
|
"updated_at": "2019-05-30T02:01:34Z",
|
|
"pushed_at": "2019-05-30T02:01:32Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 193617602,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "adeljck\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "adeljck",
|
|
"id": 24542600,
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/24542600?v=4",
|
|
"html_url": "https:\/\/github.com\/adeljck"
|
|
},
|
|
"html_url": "https:\/\/github.com\/adeljck\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 微软word漏洞利用脚本",
|
|
"fork": false,
|
|
"created_at": "2019-06-25T02:17:04Z",
|
|
"updated_at": "2019-06-25T02:17:51Z",
|
|
"pushed_at": "2019-06-25T02:17:50Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 231332316,
|
|
"name": "CVE-2017-8759",
|
|
"full_name": "zhengkook\/CVE-2017-8759",
|
|
"owner": {
|
|
"login": "zhengkook",
|
|
"id": 32629417,
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/32629417?v=4",
|
|
"html_url": "https:\/\/github.com\/zhengkook"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zhengkook\/CVE-2017-8759",
|
|
"description": "CVE-2017-8759 use file",
|
|
"fork": false,
|
|
"created_at": "2020-01-02T07:43:19Z",
|
|
"updated_at": "2020-01-02T07:45:48Z",
|
|
"pushed_at": "2020-01-02T07:45:46Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"forks_count": 0,
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |