mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-13 04:42:08 +02:00
167 lines
No EOL
6 KiB
JSON
167 lines
No EOL
6 KiB
JSON
[
|
|
{
|
|
"id": 345639477,
|
|
"name": "proxylogscan",
|
|
"full_name": "dwisiswant0\/proxylogscan",
|
|
"owner": {
|
|
"login": "dwisiswant0",
|
|
"id": 25837540,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25837540?v=4",
|
|
"html_url": "https:\/\/github.com\/dwisiswant0",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/dwisiswant0\/proxylogscan",
|
|
"description": "A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impersonating as the admin (CVE-2021-26855).",
|
|
"fork": false,
|
|
"created_at": "2021-03-08T11:54:32Z",
|
|
"updated_at": "2025-01-03T21:53:45Z",
|
|
"pushed_at": "2022-03-02T15:41:29Z",
|
|
"stargazers_count": 156,
|
|
"watchers_count": 156,
|
|
"has_discussions": false,
|
|
"forks_count": 23,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-26855",
|
|
"cve-2021-27065",
|
|
"microsoft-exchange",
|
|
"microsoft-exchange-proxylogon",
|
|
"microsoft-exchange-server",
|
|
"proxylogon",
|
|
"ssrf"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 23,
|
|
"watchers": 156,
|
|
"score": 0,
|
|
"subscribers_count": 9
|
|
},
|
|
{
|
|
"id": 346816198,
|
|
"name": "CVE-2021-26855",
|
|
"full_name": "r0xdeadbeef\/CVE-2021-26855",
|
|
"owner": {
|
|
"login": "r0xdeadbeef",
|
|
"id": 65211256,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65211256?v=4",
|
|
"html_url": "https:\/\/github.com\/r0xdeadbeef",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/r0xdeadbeef\/CVE-2021-26855",
|
|
"description": " CVE-2021-26855, also known as Proxylogon, is a server-side request forgery (SSRF) vulnerability in Exchange that allows an attacker to send arbitrary HTTP requests and authenticate as the Exchange server.",
|
|
"fork": false,
|
|
"created_at": "2021-03-11T19:35:35Z",
|
|
"updated_at": "2024-08-12T20:11:07Z",
|
|
"pushed_at": "2024-01-01T17:04:45Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 7,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 7,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 347638787,
|
|
"name": "proxylogon",
|
|
"full_name": "hakivvi\/proxylogon",
|
|
"owner": {
|
|
"login": "hakivvi",
|
|
"id": 67718634,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67718634?v=4",
|
|
"html_url": "https:\/\/github.com\/hakivvi",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hakivvi\/proxylogon",
|
|
"description": "RCE exploit for Microsoft Exchange Server (CVE-2021-26855).",
|
|
"fork": false,
|
|
"created_at": "2021-03-14T13:04:07Z",
|
|
"updated_at": "2024-09-06T00:15:06Z",
|
|
"pushed_at": "2022-04-23T03:21:44Z",
|
|
"stargazers_count": 20,
|
|
"watchers_count": 20,
|
|
"has_discussions": false,
|
|
"forks_count": 6,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2021-26855"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 6,
|
|
"watchers": 20,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 347961970,
|
|
"name": "Exch-CVE-2021-26855_Priv",
|
|
"full_name": "ZephrFish\/Exch-CVE-2021-26855_Priv",
|
|
"owner": {
|
|
"login": "ZephrFish",
|
|
"id": 5783068,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5783068?v=4",
|
|
"html_url": "https:\/\/github.com\/ZephrFish",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ZephrFish\/Exch-CVE-2021-26855_Priv",
|
|
"description": "patched to work",
|
|
"fork": false,
|
|
"created_at": "2021-03-15T12:33:04Z",
|
|
"updated_at": "2023-03-01T05:35:13Z",
|
|
"pushed_at": "2022-10-08T02:30:28Z",
|
|
"stargazers_count": 4,
|
|
"watchers_count": 4,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 4,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 357875949,
|
|
"name": "ProxyVulns",
|
|
"full_name": "hosch3n\/ProxyVulns",
|
|
"owner": {
|
|
"login": "hosch3n",
|
|
"id": 29953808,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29953808?v=4",
|
|
"html_url": "https:\/\/github.com\/hosch3n",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/hosch3n\/ProxyVulns",
|
|
"description": "[ProxyLogon] CVE-2021-26855 & CVE-2021-27065 Fixed RawIdentity Bug Exploit. [ProxyOracle] CVE-2021-31195 & CVE-2021-31196 Exploit Chains. [ProxyShell] CVE-2021-34473 & CVE-2021-34523 & CVE-2021-31207 Exploit Chains.",
|
|
"fork": false,
|
|
"created_at": "2021-04-14T11:12:30Z",
|
|
"updated_at": "2025-01-25T14:14:36Z",
|
|
"pushed_at": "2022-10-21T08:59:23Z",
|
|
"stargazers_count": 174,
|
|
"watchers_count": 174,
|
|
"has_discussions": false,
|
|
"forks_count": 34,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 34,
|
|
"watchers": 174,
|
|
"score": 0,
|
|
"subscribers_count": 4
|
|
}
|
|
] |