mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-26 06:05:33 +01:00
230 lines
No EOL
8.3 KiB
JSON
230 lines
No EOL
8.3 KiB
JSON
[
|
||
{
|
||
"id": 916896042,
|
||
"name": "CVE-2024-49138-POC",
|
||
"full_name": "MrAle98\/CVE-2024-49138-POC",
|
||
"owner": {
|
||
"login": "MrAle98",
|
||
"id": 74059030,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74059030?v=4",
|
||
"html_url": "https:\/\/github.com\/MrAle98",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/MrAle98\/CVE-2024-49138-POC",
|
||
"description": "POC exploit for CVE-2024-49138",
|
||
"fork": false,
|
||
"created_at": "2025-01-15T00:43:37Z",
|
||
"updated_at": "2025-11-22T01:56:44Z",
|
||
"pushed_at": "2025-02-14T22:04:41Z",
|
||
"stargazers_count": 265,
|
||
"watchers_count": 265,
|
||
"has_discussions": false,
|
||
"forks_count": 61,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"clfs",
|
||
"exploitation",
|
||
"kernel",
|
||
"windows"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 61,
|
||
"watchers": 265,
|
||
"score": 0,
|
||
"subscribers_count": 3
|
||
},
|
||
{
|
||
"id": 919776614,
|
||
"name": "CVE-2024-49138-POC",
|
||
"full_name": "bananoname\/CVE-2024-49138-POC",
|
||
"owner": {
|
||
"login": "bananoname",
|
||
"id": 177087379,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/177087379?v=4",
|
||
"html_url": "https:\/\/github.com\/bananoname",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/bananoname\/CVE-2024-49138-POC",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-01-21T01:50:34Z",
|
||
"updated_at": "2025-01-21T02:06:03Z",
|
||
"pushed_at": "2025-01-21T02:06:00Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 948461482,
|
||
"name": "SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"full_name": "DeividasTerechovas\/SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"owner": {
|
||
"login": "DeividasTerechovas",
|
||
"id": 74025143,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74025143?v=4",
|
||
"html_url": "https:\/\/github.com\/DeividasTerechovas",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DeividasTerechovas\/SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-03-14T11:32:13Z",
|
||
"updated_at": "2025-03-14T13:10:23Z",
|
||
"pushed_at": "2025-03-14T13:10:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 971575084,
|
||
"name": "letsdefend-cve-2024-49138-investigation",
|
||
"full_name": "CyprianAtsyor\/letsdefend-cve-2024-49138-investigation",
|
||
"owner": {
|
||
"login": "CyprianAtsyor",
|
||
"id": 172041723,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172041723?v=4",
|
||
"html_url": "https:\/\/github.com\/CyprianAtsyor",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/CyprianAtsyor\/letsdefend-cve-2024-49138-investigation",
|
||
"description": "Hands-on SOC investigation of CVE-2024-49138 using LetsDefend, VirusTotal, Hybrid Analysis, TrueFort, and ChatGPT.",
|
||
"fork": false,
|
||
"created_at": "2025-04-23T18:20:19Z",
|
||
"updated_at": "2025-04-23T19:03:50Z",
|
||
"pushed_at": "2025-04-23T19:03:47Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 977691462,
|
||
"name": "SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"full_name": "Bridg3Ops\/SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"owner": {
|
||
"login": "Bridg3Ops",
|
||
"id": 191380070,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/191380070?v=4",
|
||
"html_url": "https:\/\/github.com\/Bridg3Ops",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Bridg3Ops\/SOC335-CVE-2024-49138-Exploitation-Detected",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2025-05-04T19:05:49Z",
|
||
"updated_at": "2025-05-07T16:04:23Z",
|
||
"pushed_at": "2025-05-07T16:04:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 1
|
||
},
|
||
{
|
||
"id": 992606524,
|
||
"name": "SCRAPPED",
|
||
"full_name": "1rhino2\/SCRAPPED",
|
||
"owner": {
|
||
"login": "1rhino2",
|
||
"id": 195818135,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195818135?v=4",
|
||
"html_url": "https:\/\/github.com\/1rhino2",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/1rhino2\/SCRAPPED",
|
||
"description": "This is my biggest project yet: a DLang file encryptor that escalates privileges using CVE-2024-49138 and disables Windows Defender.",
|
||
"fork": false,
|
||
"created_at": "2025-05-29T12:31:34Z",
|
||
"updated_at": "2025-09-06T01:52:09Z",
|
||
"pushed_at": "2025-09-06T01:52:06Z",
|
||
"stargazers_count": 4,
|
||
"watchers_count": 4,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 4,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
},
|
||
{
|
||
"id": 1000862061,
|
||
"name": "SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
|
||
"full_name": "onixgod\/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
|
||
"owner": {
|
||
"login": "onixgod",
|
||
"id": 44310990,
|
||
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44310990?v=4",
|
||
"html_url": "https:\/\/github.com\/onixgod",
|
||
"user_view_type": "public"
|
||
},
|
||
"html_url": "https:\/\/github.com\/onixgod\/SOC335-Event-ID-313-CVE-2024-49138-Exploitation-Detected--Lest-Defend-Writeup",
|
||
"description": "In this lab I walked through an end-to-end intrusion that began with an external RDP break-in, used a brand-new CLFS privilege-escalation exploit (CVE-2024–49138), and ended with SYSTEM-level cloud credential harvesting. Below is the story, the evidence, and the lessons I drew from it.",
|
||
"fork": false,
|
||
"created_at": "2025-06-12T12:40:36Z",
|
||
"updated_at": "2025-06-12T13:02:58Z",
|
||
"pushed_at": "2025-06-12T13:01:15Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"has_discussions": false,
|
||
"forks_count": 0,
|
||
"allow_forking": true,
|
||
"is_template": false,
|
||
"web_commit_signoff_required": false,
|
||
"topics": [
|
||
"alerts",
|
||
"brute-force",
|
||
"cybersecurity",
|
||
"privilege-escalation",
|
||
"soc"
|
||
],
|
||
"visibility": "public",
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0,
|
||
"subscribers_count": 0
|
||
}
|
||
] |