PoC-in-GitHub/2019/CVE-2019-1040.json
2025-12-12 03:46:24 +09:00

205 lines
No EOL
6.9 KiB
JSON

[
{
"id": 191930336,
"name": "CVE-2019-1040",
"full_name": "Ridter\/CVE-2019-1040",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2019-1040",
"description": "CVE-2019-1040 with Exchange",
"fork": false,
"created_at": "2019-06-14T11:16:03Z",
"updated_at": "2025-12-04T16:20:36Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 252,
"watchers_count": 252,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 252,
"score": 0,
"subscribers_count": 3
},
{
"id": 192532911,
"name": "CVE-2019-1040-dcpwn",
"full_name": "Ridter\/CVE-2019-1040-dcpwn",
"owner": {
"login": "Ridter",
"id": 6007471,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6007471?v=4",
"html_url": "https:\/\/github.com\/Ridter",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Ridter\/CVE-2019-1040-dcpwn",
"description": "CVE-2019-1040 with Kerberos delegation",
"fork": false,
"created_at": "2019-06-18T12:10:26Z",
"updated_at": "2025-05-31T23:32:01Z",
"pushed_at": "2021-06-18T18:43:46Z",
"stargazers_count": 34,
"watchers_count": 34,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 6,
"watchers": 34,
"score": 0,
"subscribers_count": 1
},
{
"id": 192691928,
"name": "UltraRealy_with_CVE-2019-1040",
"full_name": "lazaars\/UltraRealy_with_CVE-2019-1040",
"owner": {
"login": "lazaars",
"id": 36127186,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36127186?v=4",
"html_url": "https:\/\/github.com\/lazaars",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lazaars\/UltraRealy_with_CVE-2019-1040",
"description": "Updated version for the tool UltraRealy with support of the CVE-2019-1040 exploit",
"fork": false,
"created_at": "2019-06-19T08:32:31Z",
"updated_at": "2024-08-12T19:50:14Z",
"pushed_at": "2019-06-19T09:15:16Z",
"stargazers_count": 20,
"watchers_count": 20,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 20,
"score": 0,
"subscribers_count": 2
},
{
"id": 193532426,
"name": "cve-2019-1040-scanner",
"full_name": "fox-it\/cve-2019-1040-scanner",
"owner": {
"login": "fox-it",
"id": 468621,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/468621?v=4",
"html_url": "https:\/\/github.com\/fox-it",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fox-it\/cve-2019-1040-scanner",
"description": null,
"fork": false,
"created_at": "2019-06-24T15:33:50Z",
"updated_at": "2025-10-15T07:57:04Z",
"pushed_at": "2020-11-09T07:33:12Z",
"stargazers_count": 298,
"watchers_count": 298,
"has_discussions": false,
"forks_count": 59,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 59,
"watchers": 298,
"score": 0,
"subscribers_count": 6
},
{
"id": 325925728,
"name": "dcpwn",
"full_name": "QAX-A-Team\/dcpwn",
"owner": {
"login": "QAX-A-Team",
"id": 35417332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35417332?v=4",
"html_url": "https:\/\/github.com\/QAX-A-Team",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/QAX-A-Team\/dcpwn",
"description": "an impacket-dependent script exploiting CVE-2019-1040",
"fork": false,
"created_at": "2021-01-01T05:59:06Z",
"updated_at": "2025-05-31T23:32:19Z",
"pushed_at": "2021-01-01T06:10:58Z",
"stargazers_count": 72,
"watchers_count": 72,
"has_discussions": false,
"forks_count": 15,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 15,
"watchers": 72,
"score": 0,
"subscribers_count": 1
},
{
"id": 1111369633,
"name": "PrintSpoofer-ReflectiveDLL",
"full_name": "JonyFilc\/PrintSpoofer-ReflectiveDLL",
"owner": {
"login": "JonyFilc",
"id": 248210425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/248210425?v=4",
"html_url": "https:\/\/github.com\/JonyFilc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JonyFilc\/PrintSpoofer-ReflectiveDLL",
"description": "The Windows Print Spooler privilege escalation vulnerability (CVE-2019-1040\/CVE-2019-1019) has been implemented as a Reflective DLL for penetration testing.",
"fork": false,
"created_at": "2025-12-06T19:56:12Z",
"updated_at": "2025-12-11T17:56:53Z",
"pushed_at": "2025-12-11T17:56:49Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cobalt-strike",
"cve-2019-1019",
"cve-2019-1040",
"exploit",
"exploit-development",
"lpe",
"print-spooler",
"printspoofer",
"privilege-escalation",
"reflective-dll",
"rpc-exploit",
"token-impersonation",
"windows-api",
"windows-development",
"windows-exploitation",
"windows-security"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
}
]