PoC-in-GitHub/2025/CVE-2025-44228.json
2025-04-20 03:33:06 +09:00

106 lines
No EOL
3.8 KiB
JSON

[
{
"id": 960889517,
"name": "Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"full_name": "Kariaoston\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"owner": {
"login": "Kariaoston",
"id": 206317876,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/206317876?v=4",
"html_url": "https:\/\/github.com\/Kariaoston",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Kariaoston\/Lnk-Exploit-FileBinder-Certificate-Spoofer-Reg-Doc-Cve-Rce",
"description": "Exploit development involves tools like exploitation frameworks and CVE databases. LNK exploits, such as LNK builder or LNK payload techniques, leverage vulnerabilities like CVE-2025-44228 for silent RCE execution through shortcut files.",
"fork": false,
"created_at": "2025-04-05T09:35:00Z",
"updated_at": "2025-04-19T17:54:05Z",
"pushed_at": "2025-04-19T17:54:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-44228",
"cve-scanning",
"exploit",
"exploit-code",
"exploit-database",
"exploit-development",
"exploit-exercises",
"exploit-kit",
"exploitation",
"exploitation-framework",
"lnk",
"lnk-builder",
"lnk-cve",
"lnk-exploit",
"lnk-payloads",
"lnk-rce",
"lnk-shortcut",
"lnk-stomping",
"slient-exploit-builder"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 960896990,
"name": "Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"full_name": "Karitosmuan\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"owner": {
"login": "Karitosmuan",
"id": 206319240,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/206319240?v=4",
"html_url": "https:\/\/github.com\/Karitosmuan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Karitosmuan\/Office-Exploit-Cve2025-Xml-Doc-Docx-Rce-Builder-Fud",
"description": "Exploit development targets vulnerabilities like CVE-2025-44228, often using tools like silent exploit builders. Office documents, including DOC files, are exploited through malware payloads and CVE exploits, impacting platforms like Office 365.",
"fork": false,
"created_at": "2025-04-05T09:56:10Z",
"updated_at": "2025-04-19T17:53:58Z",
"pushed_at": "2025-04-19T17:53:54Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2025-44228",
"cve-scanning",
"doc",
"doc-builder",
"doc-cve",
"doc-exploit",
"doc-malware",
"doc-payloads",
"exploit",
"exploit-code",
"exploit-database",
"exploit-development",
"exploit-exercises",
"exploit-kit",
"exploitation",
"exploitation-framework",
"office",
"office-365",
"slient-exploit-builder"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]