[ { "name": "CVE-2024-38063", "full_name": "ynwarcs/CVE-2024-38063", "html_url": "https://github.com/ynwarcs/CVE-2024-38063", "description": "poc for CVE-2024-38063 (RCE in tcpip.sys)", "stargazers_count": 655, "forks_count": 119, "created_at": "2024-08-24T18:25:46Z" }, { "name": "CVE-2024-38063-poc", "full_name": "Sachinart/CVE-2024-38063-poc", "html_url": "https://github.com/Sachinart/CVE-2024-38063-poc", "description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.", "stargazers_count": 87, "forks_count": 30, "created_at": "2024-08-17T14:58:36Z" }, { "name": "CVE-2024-38063", "full_name": "ThemeHackers/CVE-2024-38063", "html_url": "https://github.com/ThemeHackers/CVE-2024-38063", "description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)", "stargazers_count": 22, "forks_count": 5, "created_at": "2024-08-31T13:56:26Z" }, { "name": "CVE-2024-38063", "full_name": "patchpoint/CVE-2024-38063", "html_url": "https://github.com/patchpoint/CVE-2024-38063", "description": null, "stargazers_count": 20, "forks_count": 3, "created_at": "2024-08-27T15:21:25Z" }, { "name": "CVE-2024-38063", "full_name": "diegoalbuquerque/CVE-2024-38063", "html_url": "https://github.com/diegoalbuquerque/CVE-2024-38063", "description": "mitigation script by disabling ipv6 of all interfaces", "stargazers_count": 15, "forks_count": 3, "created_at": "2024-08-15T12:41:01Z" }, { "name": "CVE-2024-3806-AND-CVE-2024-3807-Poc", "full_name": "truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc", "html_url": "https://github.com/truonghuuphuc/CVE-2024-3806-AND-CVE-2024-3807-Poc", "description": "CVE-2024-3806: Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts CVE-2024-3807: Porto <= 7.1.0 - Authenticated (Contributor+) Local File Inclusion via Post Meta", "stargazers_count": 8, "forks_count": 0, "created_at": "2024-05-10T16:13:07Z" }, { "name": "CVE-2024-38063-POC", "full_name": "zenzue/CVE-2024-38063-POC", "html_url": "https://github.com/zenzue/CVE-2024-38063-POC", "description": "potential memory corruption vulnerabilities in IPv6 networks.", "stargazers_count": 7, "forks_count": 6, "created_at": "2024-08-28T08:57:23Z" }, { "name": "CVE-2024-38063_PoC", "full_name": "KernelKraze/CVE-2024-38063_PoC", "html_url": "https://github.com/KernelKraze/CVE-2024-38063_PoC", "description": "This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.", "stargazers_count": 7, "forks_count": 2, "created_at": "2024-09-01T09:20:02Z" }, { "name": "CVE-2024-38063-Research-Tool", "full_name": "haroonawanofficial/CVE-2024-38063-Research-Tool", "html_url": "https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool", "description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP/IP vulnerabilities in CVEs", "stargazers_count": 5, "forks_count": 1, "created_at": "2024-08-24T15:04:54Z" }, { "name": "Windows-CVE-2024-38063", "full_name": "PumpkinBridge/Windows-CVE-2024-38063", "html_url": "https://github.com/PumpkinBridge/Windows-CVE-2024-38063", "description": "Windows TCP/IP IPv6(CVE-2024-38063)", "stargazers_count": 4, "forks_count": 0, "created_at": "2024-08-28T01:46:44Z" }, { "name": "CVE-2024-38063", "full_name": "thanawee321/CVE-2024-38063", "html_url": "https://github.com/thanawee321/CVE-2024-38063", "description": "Vulnerability CVE-2024-38063", "stargazers_count": 3, "forks_count": 0, "created_at": "2024-10-15T03:18:51Z" }, { "name": "CVE-2024-38063", "full_name": "Th3Tr1ckst3r/CVE-2024-38063", "html_url": "https://github.com/Th3Tr1ckst3r/CVE-2024-38063", "description": "CVE-2024-38063 research so you don't have to.", "stargazers_count": 2, "forks_count": 0, "created_at": "2024-08-23T06:28:03Z" }, { "name": "CVE-2024-38063-", "full_name": "AdminPentester/CVE-2024-38063-", "html_url": "https://github.com/AdminPentester/CVE-2024-38063-", "description": "Remotely Exploiting The Kernel Via IPv6", "stargazers_count": 2, "forks_count": 1, "created_at": "2024-08-28T15:28:14Z" }, { "name": "CVE-2024-38063", "full_name": "becrevex/CVE-2024-38063", "html_url": "https://github.com/becrevex/CVE-2024-38063", "description": null, "stargazers_count": 1, "forks_count": 0, "created_at": "2024-10-08T06:24:54Z" }, { "name": "CVE-2024-38063", "full_name": "Dragkob/CVE-2024-38063", "html_url": "https://github.com/Dragkob/CVE-2024-38063", "description": "PoC for Windows' IPv6 CVE-2024-38063", "stargazers_count": 1, "forks_count": 0, "created_at": "2024-11-16T17:22:08Z" }, { "name": "CVE-2024-38063", "full_name": "Faizan-Khanx/CVE-2024-38063", "html_url": "https://github.com/Faizan-Khanx/CVE-2024-38063", "description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6", "stargazers_count": 1, "forks_count": 0, "created_at": "2024-09-10T07:15:20Z" }, { "name": "cve_2024_38063_research", "full_name": "zaneoblaneo/cve_2024_38063_research", "html_url": "https://github.com/zaneoblaneo/cve_2024_38063_research", "description": "CVE 2024-38063 Research and POC development", "stargazers_count": 1, "forks_count": 0, "created_at": "2024-08-22T03:51:43Z" }, { "name": "CVE-2024-38063-scanner", "full_name": "jip-0-0-0-0-0/CVE-2024-38063-scanner", "html_url": "https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner", "description": "A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks", "stargazers_count": 1, "forks_count": 0, "created_at": "2025-01-16T10:31:43Z" }, { "name": "Cve-2024-38063", "full_name": "brownpanda29/Cve-2024-38063", "html_url": "https://github.com/brownpanda29/Cve-2024-38063", "description": null, "stargazers_count": 0, "forks_count": 3, "created_at": "2024-09-03T14:36:35Z" }, { "name": "CVE-2024-3806", "full_name": "RandomRobbieBF/CVE-2024-3806", "html_url": "https://github.com/RandomRobbieBF/CVE-2024-3806", "description": "Porto <= 7.1.0 - Unauthenticated Local File Inclusion via porto_ajax_posts", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-11-18T16:23:07Z" }, { "name": "cve-2024-38063", "full_name": "ps-interactive/cve-2024-38063", "html_url": "https://github.com/ps-interactive/cve-2024-38063", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-09-02T14:16:31Z" }, { "name": "cve-2024-38063", "full_name": "p33d/cve-2024-38063", "html_url": "https://github.com/p33d/cve-2024-38063", "description": "Poc for cve-2024-38063 ", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-08-18T22:24:43Z" }, { "name": "CVE-2024-38063", "full_name": "selenagomez25/CVE-2024-38063", "html_url": "https://github.com/selenagomez25/CVE-2024-38063", "description": "poc for exploiting cve-2024-38063", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-11-18T15:20:24Z" }, { "name": "cve-2024-38063", "full_name": "lnx-dvlpr/cve-2024-38063", "html_url": "https://github.com/lnx-dvlpr/cve-2024-38063", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-09-23T11:45:42Z" }, { "name": "CVE-2024-38063", "full_name": "idkwastaken/CVE-2024-38063", "html_url": "https://github.com/idkwastaken/CVE-2024-38063", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-10-14T17:46:58Z" }, { "name": "CVE-2024-38063-Medium", "full_name": "ArenaldyP/CVE-2024-38063-Medium", "html_url": "https://github.com/ArenaldyP/CVE-2024-38063-Medium", "description": "Kode Eksploitasi CVE-2024-38063", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-09-21T17:33:52Z" }, { "name": "CVE-2024-38063-Remediation", "full_name": "dweger-scripts/CVE-2024-38063-Remediation", "html_url": "https://github.com/dweger-scripts/CVE-2024-38063-Remediation", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-08-19T19:44:37Z" }, { "name": "Windows-CVE-2024-38063", "full_name": "Laukage/Windows-CVE-2024-38063", "html_url": "https://github.com/Laukage/Windows-CVE-2024-38063", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-12-06T21:45:09Z" }, { "name": "cve-2024-38063-Anonyvader", "full_name": "AliHj98/cve-2024-38063-Anonyvader", "html_url": "https://github.com/AliHj98/cve-2024-38063-Anonyvader", "description": null, "stargazers_count": 0, "forks_count": 0, "created_at": "2024-11-07T09:36:32Z" }, { "name": "CVE-2024-38063-VB", "full_name": "noradlb1/CVE-2024-38063-VB", "html_url": "https://github.com/noradlb1/CVE-2024-38063-VB", "description": "CVE-2024-38063 VB", "stargazers_count": 0, "forks_count": 0, "created_at": "2024-08-17T01:11:12Z" } ]