mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-09-12 12:22:09 +02:00
751 lines
No EOL
26 KiB
JSON
751 lines
No EOL
26 KiB
JSON
[
|
||
{
|
||
"id": 498710957,
|
||
"name": "CVE-2022-30190-follina",
|
||
"full_name": "drgreenthumb93\/CVE-2022-30190-follina",
|
||
"owner": {
|
||
"login": "drgreenthumb93",
|
||
"id": 50826299,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50826299?v=4",
|
||
"html_url": "https:\/\/github.com\/drgreenthumb93",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/drgreenthumb93\/CVE-2022-30190-follina",
|
||
"description": "Just another PoC for the new MSDT-Exploit",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T11:37:08Z",
|
||
"updated_at": "2024-08-12T20:23:45Z",
|
||
"pushed_at": "2023-04-20T20:34:05Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 4,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 4,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 498888452,
|
||
"name": "Follina-Remediation",
|
||
"full_name": "Cosmo121\/Follina-Remediation",
|
||
"owner": {
|
||
"login": "Cosmo121",
|
||
"id": 3526206,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
|
||
"html_url": "https:\/\/github.com\/Cosmo121",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
|
||
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
|
||
"fork": false,
|
||
"created_at": "2022-06-01T20:26:56Z",
|
||
"updated_at": "2023-01-27T20:26:21Z",
|
||
"pushed_at": "2022-10-08T23:22:12Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499022838,
|
||
"name": "FollinaScanner",
|
||
"full_name": "ErrorNoInternet\/FollinaScanner",
|
||
"owner": {
|
||
"login": "ErrorNoInternet",
|
||
"id": 61157623,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61157623?v=4",
|
||
"html_url": "https:\/\/github.com\/ErrorNoInternet",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ErrorNoInternet\/FollinaScanner",
|
||
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T06:45:19Z",
|
||
"updated_at": "2024-11-16T19:54:48Z",
|
||
"pushed_at": "2022-09-13T10:05:02Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 6,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"antivirus",
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"golang",
|
||
"scanner",
|
||
"vulnerability-scanners"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 6,
|
||
"watchers": 24,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499127993,
|
||
"name": "CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"full_name": "komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"owner": {
|
||
"login": "komomon",
|
||
"id": 52700174,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
|
||
"html_url": "https:\/\/github.com\/komomon",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
|
||
"description": "CVE-2022-30190-follina.py-修改版,可以自定义word模板,方便实战中钓鱼使用。",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T12:33:18Z",
|
||
"updated_at": "2025-01-22T21:26:56Z",
|
||
"pushed_at": "2023-04-13T16:46:26Z",
|
||
"stargazers_count": 397,
|
||
"watchers_count": 397,
|
||
"has_discussions": false,
|
||
"forks_count": 54,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 54,
|
||
"watchers": 397,
|
||
"score": 0,
|
||
"subscribers_count": 4
|
||
},
|
||
{
|
||
"id": 499137152,
|
||
"name": "CVE-2022-30190-Fix",
|
||
"full_name": "swaiist\/CVE-2022-30190-Fix",
|
||
"owner": {
|
||
"login": "swaiist",
|
||
"id": 67833362,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833362?v=4",
|
||
"html_url": "https:\/\/github.com\/swaiist",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/swaiist\/CVE-2022-30190-Fix",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-02T13:01:46Z",
|
||
"updated_at": "2023-01-09T11:28:21Z",
|
||
"pushed_at": "2022-12-16T15:09:34Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 3,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499205371,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "arozx\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "arozx",
|
||
"id": 87201477,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87201477?v=4",
|
||
"html_url": "https:\/\/github.com\/arozx",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/arozx\/CVE-2022-30190",
|
||
"description": "A very simple MSDT \"Follina\" exploit **patched**",
|
||
"fork": false,
|
||
"created_at": "2022-06-02T16:14:13Z",
|
||
"updated_at": "2023-02-14T18:19:06Z",
|
||
"pushed_at": "2022-11-01T16:53:17Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"exploit",
|
||
"follina",
|
||
"patched",
|
||
"poc",
|
||
"security",
|
||
"vulnerability",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499331391,
|
||
"name": "follina",
|
||
"full_name": "Noxtal\/follina",
|
||
"owner": {
|
||
"login": "Noxtal",
|
||
"id": 44851191,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44851191?v=4",
|
||
"html_url": "https:\/\/github.com\/Noxtal",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Noxtal\/follina",
|
||
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
|
||
"fork": false,
|
||
"created_at": "2022-06-03T00:25:37Z",
|
||
"updated_at": "2025-01-13T07:54:46Z",
|
||
"pushed_at": "2022-08-06T01:04:51Z",
|
||
"stargazers_count": 24,
|
||
"watchers_count": 24,
|
||
"has_discussions": false,
|
||
"forks_count": 5,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 5,
|
||
"watchers": 24,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 499846982,
|
||
"name": "Follina",
|
||
"full_name": "AbdulRKB\/Follina",
|
||
"owner": {
|
||
"login": "AbdulRKB",
|
||
"id": 82715493,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82715493?v=4",
|
||
"html_url": "https:\/\/github.com\/AbdulRKB",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/AbdulRKB\/Follina",
|
||
"description": "Remote Access Shell for Windows (based on cve-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2022-06-04T14:18:38Z",
|
||
"updated_at": "2024-08-12T20:23:50Z",
|
||
"pushed_at": "2024-02-09T17:18:42Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"mstd",
|
||
"reverse-shell",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 499922590,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "DerZiad\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "DerZiad",
|
||
"id": 40337316,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40337316?v=4",
|
||
"html_url": "https:\/\/github.com\/DerZiad",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DerZiad\/CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-04T19:48:37Z",
|
||
"updated_at": "2025-02-14T17:11:09Z",
|
||
"pushed_at": "2023-07-25T07:47:33Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"has_discussions": true,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 6,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 500111558,
|
||
"name": "Follina-CVE-2022-30190-POC",
|
||
"full_name": "ItsNee\/Follina-CVE-2022-30190-POC",
|
||
"owner": {
|
||
"login": "ItsNee",
|
||
"id": 28183719,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
|
||
"html_url": "https:\/\/github.com\/ItsNee",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ItsNee\/Follina-CVE-2022-30190-POC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-05T13:54:04Z",
|
||
"updated_at": "2023-02-09T18:20:51Z",
|
||
"pushed_at": "2022-07-04T13:27:13Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 5,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 501212142,
|
||
"name": "Deathnote",
|
||
"full_name": "Malwareman007\/Deathnote",
|
||
"owner": {
|
||
"login": "Malwareman007",
|
||
"id": 86009160,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
|
||
"html_url": "https:\/\/github.com\/Malwareman007",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Malwareman007\/Deathnote",
|
||
"description": "Proof of Concept of CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2022-06-08T10:58:23Z",
|
||
"updated_at": "2024-09-08T14:28:01Z",
|
||
"pushed_at": "2022-10-06T14:49:56Z",
|
||
"stargazers_count": 37,
|
||
"watchers_count": 37,
|
||
"has_discussions": false,
|
||
"forks_count": 7,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2022-30190",
|
||
"follina",
|
||
"microsoft",
|
||
"msdt",
|
||
"msword",
|
||
"vulnerability",
|
||
"zeroday"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 7,
|
||
"watchers": 37,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 501283166,
|
||
"name": "Follina-Workaround-CVE-2022-30190",
|
||
"full_name": "sentrium-security\/Follina-Workaround-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "sentrium-security",
|
||
"id": 53477514,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53477514?v=4",
|
||
"html_url": "https:\/\/github.com\/sentrium-security",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sentrium-security\/Follina-Workaround-CVE-2022-30190",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2022-06-08T14:20:50Z",
|
||
"updated_at": "2022-06-08T14:29:37Z",
|
||
"pushed_at": "2022-07-14T16:18:28Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 1,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 507979018,
|
||
"name": "go_follina",
|
||
"full_name": "Zitchev\/go_follina",
|
||
"owner": {
|
||
"login": "Zitchev",
|
||
"id": 61007904,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007904?v=4",
|
||
"html_url": "https:\/\/github.com\/Zitchev",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Zitchev\/go_follina",
|
||
"description": "Follina (CVE-2022-30190) proof-of-concept",
|
||
"fork": false,
|
||
"created_at": "2022-06-27T16:14:34Z",
|
||
"updated_at": "2023-07-26T14:55:32Z",
|
||
"pushed_at": "2023-02-21T19:21:48Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 508614565,
|
||
"name": "CVE-2022-30190_EXP_PowerPoint",
|
||
"full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||
"owner": {
|
||
"login": "Gra3s",
|
||
"id": 76804515,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4",
|
||
"html_url": "https:\/\/github.com\/Gra3s",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint",
|
||
"description": "This is exploit of CVE-2022-30190 on PowerPoint.",
|
||
"fork": false,
|
||
"created_at": "2022-06-29T08:48:12Z",
|
||
"updated_at": "2024-08-12T20:24:36Z",
|
||
"pushed_at": "2023-03-23T03:18:46Z",
|
||
"stargazers_count": 8,
|
||
"watchers_count": 8,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 8,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 537107690,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "winstxnhdw\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "winstxnhdw",
|
||
"id": 56998716,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56998716?v=4",
|
||
"html_url": "https:\/\/github.com\/winstxnhdw",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
|
||
"description": "A proof of concept for CVE-2022-30190 (Follina).",
|
||
"fork": false,
|
||
"created_at": "2022-09-15T16:12:57Z",
|
||
"updated_at": "2023-08-29T16:29:42Z",
|
||
"pushed_at": "2024-03-01T16:26:36Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"cve-2021-40444",
|
||
"follina",
|
||
"msdt",
|
||
"remote-code-execution",
|
||
"trojan"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 613736106,
|
||
"name": "FOLLINA-CVE-2022-30190",
|
||
"full_name": "ToxicEnvelope\/FOLLINA-CVE-2022-30190",
|
||
"owner": {
|
||
"login": "ToxicEnvelope",
|
||
"id": 23465872,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4",
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ToxicEnvelope\/FOLLINA-CVE-2022-30190",
|
||
"description": "Implementation of FOLLINA-CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2023-03-14T07:00:47Z",
|
||
"updated_at": "2024-06-20T18:44:33Z",
|
||
"pushed_at": "2023-08-27T09:39:26Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 2
|
||
},
|
||
{
|
||
"id": 635211834,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "hycheng15\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "hycheng15",
|
||
"id": 74200918,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74200918?v=4",
|
||
"html_url": "https:\/\/github.com\/hycheng15",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hycheng15\/CVE-2022-30190",
|
||
"description": "An exploitation of CVE-2022-30190 (Follina)",
|
||
"fork": false,
|
||
"created_at": "2023-05-02T07:56:28Z",
|
||
"updated_at": "2023-07-26T14:55:29Z",
|
||
"pushed_at": "2023-11-14T10:19:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 724428602,
|
||
"name": "AmzWord",
|
||
"full_name": "Jump-Wang-111\/AmzWord",
|
||
"owner": {
|
||
"login": "Jump-Wang-111",
|
||
"id": 69379868,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69379868?v=4",
|
||
"html_url": "https:\/\/github.com\/Jump-Wang-111",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Jump-Wang-111\/AmzWord",
|
||
"description": "An automated attack chain based on CVE-2022-30190, 163 email backdoor, and image steganography.",
|
||
"fork": false,
|
||
"created_at": "2023-11-28T03:47:32Z",
|
||
"updated_at": "2024-09-04T02:59:22Z",
|
||
"pushed_at": "2023-11-28T10:16:25Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 758899750,
|
||
"name": "ZipScan",
|
||
"full_name": "shri142\/ZipScan",
|
||
"owner": {
|
||
"login": "shri142",
|
||
"id": 81535914,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81535914?v=4",
|
||
"html_url": "https:\/\/github.com\/shri142",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/shri142\/ZipScan",
|
||
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
|
||
"fork": false,
|
||
"created_at": "2024-02-17T12:10:12Z",
|
||
"updated_at": "2024-02-24T17:59:28Z",
|
||
"pushed_at": "2024-02-24T17:59:25Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 784462275,
|
||
"name": "CVE-2022-30190",
|
||
"full_name": "alien-keric\/CVE-2022-30190",
|
||
"owner": {
|
||
"login": "alien-keric",
|
||
"id": 102582785,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102582785?v=4",
|
||
"html_url": "https:\/\/github.com\/alien-keric",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/alien-keric\/CVE-2022-30190",
|
||
"description": "The script is from https:\/\/github.com\/JohnHammond\/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link",
|
||
"fork": false,
|
||
"created_at": "2024-04-09T22:40:09Z",
|
||
"updated_at": "2024-04-10T01:26:23Z",
|
||
"pushed_at": "2024-04-09T22:41:53Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 831490675,
|
||
"name": "Follina-CVE-2022-30190-Sample",
|
||
"full_name": "ethicalblue\/Follina-CVE-2022-30190-Sample",
|
||
"owner": {
|
||
"login": "ethicalblue",
|
||
"id": 82314652,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82314652?v=4",
|
||
"html_url": "https:\/\/github.com\/ethicalblue",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ethicalblue\/Follina-CVE-2022-30190-Sample",
|
||
"description": "Educational exploit for CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2024-07-20T17:50:48Z",
|
||
"updated_at": "2024-07-20T19:56:33Z",
|
||
"pushed_at": "2024-07-20T18:23:38Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 2,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 928632164,
|
||
"name": "CVE-2022-30190_page",
|
||
"full_name": "Potato-9257\/CVE-2022-30190_page",
|
||
"owner": {
|
||
"login": "Potato-9257",
|
||
"id": 198144657,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/198144657?v=4",
|
||
"html_url": "https:\/\/github.com\/Potato-9257",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Potato-9257\/CVE-2022-30190_page",
|
||
"description": "PoC of CVE-2022-30190",
|
||
"fork": false,
|
||
"created_at": "2025-02-07T00:35:46Z",
|
||
"updated_at": "2025-02-07T00:37:28Z",
|
||
"pushed_at": "2025-02-07T00:37:24Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 941432225,
|
||
"name": "ICT287_CVE-2022-30190_Exploit",
|
||
"full_name": "yeep1115\/ICT287_CVE-2022-30190_Exploit",
|
||
"owner": {
|
||
"login": "yeep1115",
|
||
"id": 107627976,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107627976?v=4",
|
||
"html_url": "https:\/\/github.com\/yeep1115",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yeep1115\/ICT287_CVE-2022-30190_Exploit",
|
||
"description": "Project on CVE-2022-30190 exploitation and mitigation strategies",
|
||
"fork": false,
|
||
"created_at": "2025-03-02T09:25:27Z",
|
||
"updated_at": "2025-03-02T09:27:47Z",
|
||
"pushed_at": "2025-03-02T09:27:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
}
|
||
] |