[ { "name": "CVE-2020-0796", "full_name": "danigargu/CVE-2020-0796", "html_url": "https://github.com/danigargu/CVE-2020-0796", "description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost", "stargazers_count": 1315, "forks_count": 343, "created_at": "2020-03-30T11:42:56Z" }, { "name": "CVE-2020-0796-RCE-POC", "full_name": "jamf/CVE-2020-0796-RCE-POC", "html_url": "https://github.com/jamf/CVE-2020-0796-RCE-POC", "description": "CVE-2020-0796 Remote Code Execution POC", "stargazers_count": 549, "forks_count": 172, "created_at": "2020-04-20T14:35:48Z" }, { "name": "CVE-2020-0796-PoC", "full_name": "eerykitty/CVE-2020-0796-PoC", "html_url": "https://github.com/eerykitty/CVE-2020-0796-PoC", "description": "PoC for triggering buffer overflow via CVE-2020-0796", "stargazers_count": 325, "forks_count": 121, "created_at": "2020-03-12T18:34:40Z" }, { "name": "CVE-2020-0796-LPE-POC", "full_name": "jamf/CVE-2020-0796-LPE-POC", "html_url": "https://github.com/jamf/CVE-2020-0796-LPE-POC", "description": "CVE-2020-0796 Local Privilege Escalation POC", "stargazers_count": 241, "forks_count": 84, "created_at": "2020-03-30T16:06:50Z" }, { "name": "CVE_2020_0796_CNA", "full_name": "Rvn0xsy/CVE_2020_0796_CNA", "html_url": "https://github.com/Rvn0xsy/CVE_2020_0796_CNA", "description": "Cobalt Strike AggressorScripts CVE-2020-0796", "stargazers_count": 78, "forks_count": 22, "created_at": "2020-04-06T15:16:10Z" }, { "name": "CVE-2020-0796-BOF", "full_name": "rsmudge/CVE-2020-0796-BOF", "html_url": "https://github.com/rsmudge/CVE-2020-0796-BOF", "description": null, "stargazers_count": 70, "forks_count": 20, "created_at": "2020-09-17T01:48:37Z" }, { "name": "CVE-2020-0796", "full_name": "jiansiting/CVE-2020-0796", "html_url": "https://github.com/jiansiting/CVE-2020-0796", "description": null, "stargazers_count": 62, "forks_count": 23, "created_at": "2020-04-01T01:46:08Z" }, { "name": "CVE2020-0796", "full_name": "claroty/CVE2020-0796", "html_url": "https://github.com/claroty/CVE2020-0796", "description": "CVE2020-0796 SMBv3 RCE", "stargazers_count": 61, "forks_count": 15, "created_at": "2020-03-11T16:37:10Z" }, { "name": "CVE-2020-0796-SMB", "full_name": "eastmountyxz/CVE-2020-0796-SMB", "html_url": "https://github.com/eastmountyxz/CVE-2020-0796-SMB", "description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~", "stargazers_count": 33, "forks_count": 20, "created_at": "2020-04-02T12:12:03Z" }, { "name": "CVE-2020-0796", "full_name": "T13nn3s/CVE-2020-0796", "html_url": "https://github.com/T13nn3s/CVE-2020-0796", "description": "Powershell SMBv3 Compression checker", "stargazers_count": 28, "forks_count": 13, "created_at": "2020-03-11T09:13:48Z" }, { "name": "Unauthenticated-CVE-2020-0796-PoC", "full_name": "maxpl0it/Unauthenticated-CVE-2020-0796-PoC", "html_url": "https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC", "description": "An unauthenticated PoC for CVE-2020-0796", "stargazers_count": 21, "forks_count": 8, "created_at": "2020-03-15T22:17:50Z" }, { "name": "CVE-2020-0796-PoC", "full_name": "0x25bit/CVE-2020-0796-PoC", "html_url": "https://github.com/0x25bit/CVE-2020-0796-PoC", "description": "Weaponized PoC for SMBv3 TCP codec/compression vulnerability", "stargazers_count": 19, "forks_count": 4, "created_at": "2020-03-10T21:40:57Z" }, { "name": "CVE2020-0796", "full_name": "Aurum2008/CVE2020-0796", "html_url": "https://github.com/Aurum2008/CVE2020-0796", "description": "Exploit for win10 SMB3.1", "stargazers_count": 17, "forks_count": 8, "created_at": "2020-04-05T14:22:19Z" }, { "name": "CVE-2020-0796-LPE-EXP", "full_name": "f1tz/CVE-2020-0796-LPE-EXP", "html_url": "https://github.com/f1tz/CVE-2020-0796-LPE-EXP", "description": "Windows SMBv3 LPE exploit 已编译版", "stargazers_count": 17, "forks_count": 7, "created_at": "2020-03-31T11:25:50Z" }, { "name": "aioScan_CVE-2020-0796", "full_name": "GuoKerS/aioScan_CVE-2020-0796", "html_url": "https://github.com/GuoKerS/aioScan_CVE-2020-0796", "description": "基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。", "stargazers_count": 16, "forks_count": 14, "created_at": "2020-03-14T23:39:25Z" }, { "name": "cve-2020-0796", "full_name": "ButrintKomoni/cve-2020-0796", "html_url": "https://github.com/ButrintKomoni/cve-2020-0796", "description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly", "stargazers_count": 15, "forks_count": 15, "created_at": "2020-03-11T18:42:32Z" }, { "name": "cve-2020-0796-scanner", "full_name": "dickens88/cve-2020-0796-scanner", "html_url": "https://github.com/dickens88/cve-2020-0796-scanner", "description": "This project is used for scanning cve-2020-0796 SMB vulnerability", "stargazers_count": 14, "forks_count": 12, "created_at": "2020-03-12T02:20:07Z" }, { "name": "CVE-2020-0796-Checker", "full_name": "joaozietolie/CVE-2020-0796-Checker", "html_url": "https://github.com/joaozietolie/CVE-2020-0796-Checker", "description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)", "stargazers_count": 14, "forks_count": 7, "created_at": "2020-03-11T16:23:03Z" }, { "name": "CVE-2020-0796", "full_name": "thelostworldFree/CVE-2020-0796", "html_url": "https://github.com/thelostworldFree/CVE-2020-0796", "description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)", "stargazers_count": 11, "forks_count": 18, "created_at": "2020-04-22T09:09:02Z" }, { "name": "CVE-2020-0796-Scanner", "full_name": "jiansiting/CVE-2020-0796-Scanner", "html_url": "https://github.com/jiansiting/CVE-2020-0796-Scanner", "description": "CVE-2020-0796-Scanner", "stargazers_count": 9, "forks_count": 4, "created_at": "2020-03-15T03:17:47Z" }, { "name": "cve-2020-0796", "full_name": "0xeb-bp/cve-2020-0796", "html_url": "https://github.com/0xeb-bp/cve-2020-0796", "description": "CVE-2020-0796 (SMBGhost) LPE", "stargazers_count": 6, "forks_count": 6, "created_at": "2020-04-07T22:35:57Z" }, { "name": "CVE-2020-0796", "full_name": "dungnm24/CVE-2020-0796", "html_url": "https://github.com/dungnm24/CVE-2020-0796", "description": "WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc.", "stargazers_count": 6, "forks_count": 4, "created_at": "2023-05-29T06:31:51Z" }, { "name": "CVE-2020-0796", "full_name": "vysecurity/CVE-2020-0796", "html_url": "https://github.com/vysecurity/CVE-2020-0796", "description": "CVE-2020-0796 - Working PoC - 20200313", "stargazers_count": 5, "forks_count": 2, "created_at": "2020-03-13T08:34:31Z" }, { "name": "CVE-2020-0796", "full_name": "tango-j/CVE-2020-0796", "html_url": "https://github.com/tango-j/CVE-2020-0796", "description": "Coronablue exploit", "stargazers_count": 4, "forks_count": 2, "created_at": "2020-03-31T19:01:52Z" }, { "name": "CVE-2020-0796", "full_name": "orangmuda/CVE-2020-0796", "html_url": "https://github.com/orangmuda/CVE-2020-0796", "description": "Remote Code Execution POC for CVE-2020-0796", "stargazers_count": 4, "forks_count": 1, "created_at": "2021-10-09T04:52:55Z" }, { "name": "CVE-2020-0796", "full_name": "exp-sky/CVE-2020-0796", "html_url": "https://github.com/exp-sky/CVE-2020-0796", "description": "SMBv3 Ghost (CVE-2020-0796) Vulnerability", "stargazers_count": 3, "forks_count": 0, "created_at": "2020-06-09T06:18:54Z" }, { "name": "CVE-2020_0796-exp", "full_name": "RonnieNiu/CVE-2020_0796-exp", "html_url": "https://github.com/RonnieNiu/CVE-2020_0796-exp", "description": "CVE-2020_0796-exp", "stargazers_count": 3, "forks_count": 0, "created_at": "2020-06-03T04:58:45Z" }, { "name": "cve2020-0796", "full_name": "TinToSer/cve2020-0796", "html_url": "https://github.com/TinToSer/cve2020-0796", "description": "Microsoft SMV3.1.1 wormable Exploit", "stargazers_count": 2, "forks_count": 2, "created_at": "2020-03-13T06:58:59Z" }, { "name": "SMBGhost-CVE-2020-0796-", "full_name": "codewithpradhan/SMBGhost-CVE-2020-0796-", "html_url": "https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-", "description": "To crash Windows-10 easily", "stargazers_count": 2, "forks_count": 2, "created_at": "2020-09-28T05:23:20Z" }, { "name": "CVE-2020-0796-LPE", "full_name": "TinToSer/CVE-2020-0796-LPE", "html_url": "https://github.com/TinToSer/CVE-2020-0796-LPE", "description": "SMBGHOST local privilege escalation", "stargazers_count": 2, "forks_count": 2, "created_at": "2020-03-31T05:41:30Z" } ]