PoC-in-GitHub/2025/CVE-2025-33073.json
2025-12-07 03:43:21 +09:00

266 lines
No EOL
9.3 KiB
JSON

[
{
"id": 250571335,
"name": "CVE-2025-33073",
"full_name": "sleepasleepzzz\/CVE-2025-33073",
"owner": {
"login": "sleepasleepzzz",
"id": 62759294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62759294?v=4",
"html_url": "https:\/\/github.com\/sleepasleepzzz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sleepasleepzzz\/CVE-2025-33073",
"description": "🛠️ Exploit the NTLM reflection SMB flaw with this PoC tool for Kali Linux, enhancing your understanding of CVE-2025-33073 through practical application.",
"fork": false,
"created_at": "2020-03-27T15:29:37Z",
"updated_at": "2025-12-06T17:24:15Z",
"pushed_at": "2025-12-06T17:24:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2025-33073",
"cybersecurity",
"exploit",
"incident-response",
"malware",
"network-security",
"open-source",
"patch",
"risk-management",
"security-vulnerability",
"software-development",
"software-security",
"system-security",
"threat-analysis",
"vulnerability-report"
],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 1001457531,
"name": "CVE-2025-33073",
"full_name": "mverschu\/CVE-2025-33073",
"owner": {
"login": "mverschu",
"id": 69352107,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69352107?v=4",
"html_url": "https:\/\/github.com\/mverschu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mverschu\/CVE-2025-33073",
"description": "PoC Exploit for the NTLM reflection SMB flaw.",
"fork": false,
"created_at": "2025-06-13T12:15:14Z",
"updated_at": "2025-12-06T00:09:46Z",
"pushed_at": "2025-06-15T17:52:49Z",
"stargazers_count": 604,
"watchers_count": 604,
"has_discussions": false,
"forks_count": 124,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 124,
"watchers": 604,
"score": 0,
"subscribers_count": 5
},
{
"id": 1010277137,
"name": "CVE-2025-33073",
"full_name": "obscura-cert\/CVE-2025-33073",
"owner": {
"login": "obscura-cert",
"id": 218393010,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/218393010?v=4",
"html_url": "https:\/\/github.com\/obscura-cert",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/obscura-cert\/CVE-2025-33073",
"description": null,
"fork": false,
"created_at": "2025-06-28T18:17:28Z",
"updated_at": "2025-07-04T22:49:57Z",
"pushed_at": "2025-06-28T18:19:29Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 1029600184,
"name": "CVE-2025-33073-checker",
"full_name": "matejsmycka\/CVE-2025-33073-checker",
"owner": {
"login": "matejsmycka",
"id": 45017046,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/45017046?v=4",
"html_url": "https:\/\/github.com\/matejsmycka",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/matejsmycka\/CVE-2025-33073-checker",
"description": "This rough PoC checker script tests targets for CVE-2025-33073 vulnerability by attempting to perform NTLM reflection attacks using NTLM auth coercion via samba RPC, to do this you need to have account with access to the samba.",
"fork": false,
"created_at": "2025-07-31T09:34:55Z",
"updated_at": "2025-08-27T11:16:53Z",
"pushed_at": "2025-07-31T11:13:27Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1051835892,
"name": "cve-2025-33073",
"full_name": "cve-2025-33073\/cve-2025-33073",
"owner": {
"login": "cve-2025-33073",
"id": 67454687,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67454687?v=4",
"html_url": "https:\/\/github.com\/cve-2025-33073",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cve-2025-33073\/cve-2025-33073",
"description": null,
"fork": false,
"created_at": "2025-09-06T20:24:22Z",
"updated_at": "2025-09-06T20:47:53Z",
"pushed_at": "2025-09-06T20:47:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 1078802285,
"name": "windows-smb-vulnerability-framework-cve-2025-33073",
"full_name": "SFRDevelopment\/windows-smb-vulnerability-framework-cve-2025-33073",
"owner": {
"login": "SFRDevelopment",
"id": 195757226,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/195757226?v=4",
"html_url": "https:\/\/github.com\/SFRDevelopment",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SFRDevelopment\/windows-smb-vulnerability-framework-cve-2025-33073",
"description": "Proof-of-Concept",
"fork": false,
"created_at": "2025-10-18T13:05:29Z",
"updated_at": "2025-12-01T18:47:55Z",
"pushed_at": "2025-10-18T13:16:02Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 0
},
{
"id": 1096398873,
"name": "CVE-2025-33073",
"full_name": "uziii2208\/CVE-2025-33073",
"owner": {
"login": "uziii2208",
"id": 112312970,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112312970?v=4",
"html_url": "https:\/\/github.com\/uziii2208",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/uziii2208\/CVE-2025-33073",
"description": "Universal exploitation tool for CVE-2025-33073 targeting Windows Domain Controllers with DNSAdmins privileges and WinRM enabled.",
"fork": false,
"created_at": "2025-11-14T11:17:00Z",
"updated_at": "2025-12-06T09:07:09Z",
"pushed_at": "2025-11-14T11:50:13Z",
"stargazers_count": 61,
"watchers_count": 61,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 61,
"score": 0,
"subscribers_count": 0
},
{
"id": 1096924027,
"name": "Blackash-CVE-2025-33073",
"full_name": "Ashwesker\/Blackash-CVE-2025-33073",
"owner": {
"login": "Ashwesker",
"id": 215029052,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/215029052?v=4",
"html_url": "https:\/\/github.com\/Ashwesker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ashwesker\/Blackash-CVE-2025-33073",
"description": "CVE-2025-33073",
"fork": false,
"created_at": "2025-11-15T07:35:43Z",
"updated_at": "2025-11-28T01:24:48Z",
"pushed_at": "2025-11-15T07:50:39Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 0
}
]