PoC-in-GitHub/2024/CVE-2024-49138.json
2025-11-22 15:42:17 +09:00

230 lines
No EOL
8.3 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 916896042,
"name": "CVE-2024-49138-POC",
"full_name": "MrAle98\/CVE-2024-49138-POC",
"owner": {
"login": "MrAle98",
"id": 74059030,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74059030?v=4",
"html_url": "https:\/\/github.com\/MrAle98",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrAle98\/CVE-2024-49138-POC",
"description": "POC exploit for CVE-2024-49138",
"fork": false,
"created_at": "2025-01-15T00:43:37Z",
"updated_at": "2025-11-22T01:56:44Z",
"pushed_at": "2025-02-14T22:04:41Z",
"stargazers_count": 265,
"watchers_count": 265,
"has_discussions": false,
"forks_count": 61,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"clfs",
"exploitation",
"kernel",
"windows"
],
"visibility": "public",
"forks": 61,
"watchers": 265,
"score": 0,
"subscribers_count": 3
},
{
"id": 919776614,
"name": "CVE-2024-49138-POC",
"full_name": "bananoname\/CVE-2024-49138-POC",
"owner": {
"login": "bananoname",
"id": 177087379,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177087379?v=4",
"html_url": "https:\/\/github.com\/bananoname",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bananoname\/CVE-2024-49138-POC",
"description": null,
"fork": false,
"created_at": "2025-01-21T01:50:34Z",
"updated_at": "2025-01-21T02:06:03Z",
"pushed_at": "2025-01-21T02:06:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 948461482,
"name": "SOC335-CVE-2024-49138-Exploitation-Detected",
"full_name": "DeividasTerechovas\/SOC335-CVE-2024-49138-Exploitation-Detected",
"owner": {
"login": "DeividasTerechovas",
"id": 74025143,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74025143?v=4",
"html_url": "https:\/\/github.com\/DeividasTerechovas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DeividasTerechovas\/SOC335-CVE-2024-49138-Exploitation-Detected",
"description": null,
"fork": false,
"created_at": "2025-03-14T11:32:13Z",
"updated_at": "2025-03-14T13:10:23Z",
"pushed_at": "2025-03-14T13:10:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 971575084,
"name": "letsdefend-cve-2024-49138-investigation",
"full_name": "CyprianAtsyor\/letsdefend-cve-2024-49138-investigation",
"owner": {
"login": "CyprianAtsyor",
"id": 172041723,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172041723?v=4",
"html_url": "https:\/\/github.com\/CyprianAtsyor",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CyprianAtsyor\/letsdefend-cve-2024-49138-investigation",
"description": "Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.",
"fork": false,
"created_at": "2025-04-23T18:20:19Z",
"updated_at": "2025-04-23T19:03:50Z",
"pushed_at": "2025-04-23T19:03:47Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 977691462,
"name": "SOC335-CVE-2024-49138-Exploitation-Detected",
"full_name": "Bridg3Ops\/SOC335-CVE-2024-49138-Exploitation-Detected",
"owner": {
"login": "Bridg3Ops",
"id": 191380070,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191380070?v=4",
"html_url": "https:\/\/github.com\/Bridg3Ops",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Bridg3Ops\/SOC335-CVE-2024-49138-Exploitation-Detected",
"description": null,
"fork": false,
"created_at": "2025-05-04T19:05:49Z",
"updated_at": "2025-05-07T16:04:23Z",
"pushed_at": "2025-05-07T16:04:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 992606524,
"name": "SCRAPPED",
"full_name": "1rhino2\/SCRAPPED",
"owner": {
"login": "1rhino2",
"id": 195818135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195818135?v=4",
"html_url": "https:\/\/github.com\/1rhino2",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/1rhino2\/SCRAPPED",
"description": "This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender.",
"fork": false,
"created_at": "2025-05-29T12:31:34Z",
"updated_at": "2025-09-06T01:52:09Z",
"pushed_at": "2025-09-06T01:52:06Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 4,
"score": 0,
"subscribers_count": 0
},
{
"id": 1000862061,
"name": "SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
"full_name": "onixgod\/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
"owner": {
"login": "onixgod",
"id": 44310990,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44310990?v=4",
"html_url": "https:\/\/github.com\/onixgod",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/onixgod\/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
"description": "In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE-202449138), and ended with SYSTEM-level cloud credential harvesting. Below is the story, the evidence, and the lessons I drew from it.",
"fork": false,
"created_at": "2025-06-12T12:40:36Z",
"updated_at": "2025-06-12T13:02:58Z",
"pushed_at": "2025-06-12T13:01:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"alerts",
"brute-force",
"cybersecurity",
"privilege-escalation",
"soc"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]