272 lines
No EOL
9.1 KiB
JSON
272 lines
No EOL
9.1 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "lockedbyte/CVE-2021-40444",
|
||
"html_url": "https://github.com/lockedbyte/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 PoC",
|
||
"stargazers_count": 1618,
|
||
"forks_count": 481,
|
||
"created_at": "2021-09-10T16:55:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "klezVirus/CVE-2021-40444",
|
||
"html_url": "https://github.com/klezVirus/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 - Fully Weaponized Microsoft Office Word RCE Exploit",
|
||
"stargazers_count": 805,
|
||
"forks_count": 170,
|
||
"created_at": "2021-09-15T22:34:35Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444_builders",
|
||
"full_name": "aslitsecurity/CVE-2021-40444_builders",
|
||
"html_url": "https://github.com/aslitsecurity/CVE-2021-40444_builders",
|
||
"description": "This repo contain builders of cab file, html file, and docx file for CVE-2021-40444 exploit",
|
||
"stargazers_count": 171,
|
||
"forks_count": 43,
|
||
"created_at": "2021-09-12T18:05:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444--CABless",
|
||
"full_name": "Edubr2020/CVE-2021-40444--CABless",
|
||
"html_url": "https://github.com/Edubr2020/CVE-2021-40444--CABless",
|
||
"description": "Modified code so that we don´t need to rely on CAB archives",
|
||
"stargazers_count": 101,
|
||
"forks_count": 22,
|
||
"created_at": "2021-09-19T19:46:28Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "k8gege/CVE-2021-40444",
|
||
"html_url": "https://github.com/k8gege/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 19,
|
||
"forks_count": 6,
|
||
"created_at": "2021-09-14T17:10:48Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "ozergoker/CVE-2021-40444",
|
||
"html_url": "https://github.com/ozergoker/CVE-2021-40444",
|
||
"description": "Microsoft MSHTML Remote Code Execution Vulnerability CVE-2021-40444",
|
||
"stargazers_count": 17,
|
||
"forks_count": 7,
|
||
"created_at": "2021-09-08T08:32:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "rfcxv/CVE-2021-40444-POC",
|
||
"html_url": "https://github.com/rfcxv/CVE-2021-40444-POC",
|
||
"description": null,
|
||
"stargazers_count": 14,
|
||
"forks_count": 14,
|
||
"created_at": "2021-09-09T03:15:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "H0j3n/CVE-2021-40444",
|
||
"html_url": "https://github.com/H0j3n/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 9,
|
||
"forks_count": 4,
|
||
"created_at": "2021-10-03T01:13:42Z"
|
||
},
|
||
{
|
||
"name": "CVE2021-40444",
|
||
"full_name": "aydianosec/CVE2021-40444",
|
||
"html_url": "https://github.com/aydianosec/CVE2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 8,
|
||
"forks_count": 5,
|
||
"created_at": "2021-09-14T01:37:25Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "kagura-maru/CVE-2021-40444-POC",
|
||
"html_url": "https://github.com/kagura-maru/CVE-2021-40444-POC",
|
||
"description": "An attempt to reproduce Microsoft MSHTML Remote Code Execution (RCE) Vulnerability and using Metasploit Framework.",
|
||
"stargazers_count": 8,
|
||
"forks_count": 1,
|
||
"created_at": "2021-10-28T14:55:46Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "DarkSprings/CVE-2021-40444",
|
||
"html_url": "https://github.com/DarkSprings/CVE-2021-40444",
|
||
"description": "CVE-2021-40444 POC",
|
||
"stargazers_count": 6,
|
||
"forks_count": 9,
|
||
"created_at": "2021-09-09T02:30:26Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-docx-Generate",
|
||
"full_name": "fengjixuchui/CVE-2021-40444-docx-Generate",
|
||
"html_url": "https://github.com/fengjixuchui/CVE-2021-40444-docx-Generate",
|
||
"description": null,
|
||
"stargazers_count": 4,
|
||
"forks_count": 3,
|
||
"created_at": "2021-09-11T02:49:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444_EXP_JS",
|
||
"full_name": "bambooqj/CVE-2021-40444_EXP_JS",
|
||
"html_url": "https://github.com/bambooqj/CVE-2021-40444_EXP_JS",
|
||
"description": "根据已知样本反编译代码",
|
||
"stargazers_count": 3,
|
||
"forks_count": 4,
|
||
"created_at": "2021-09-09T09:46:00Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "vysecurity/CVE-2021-40444",
|
||
"html_url": "https://github.com/vysecurity/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-09T23:41:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "MRacumen/CVE-2021-40444",
|
||
"html_url": "https://github.com/MRacumen/CVE-2021-40444",
|
||
"description": "Microsoft-Office-Word-MSHTML-Remote-Code-Execution-Exploit",
|
||
"stargazers_count": 2,
|
||
"forks_count": 1,
|
||
"created_at": "2021-12-28T06:33:25Z"
|
||
},
|
||
{
|
||
"name": "CVE2021-40444-document-Scanner",
|
||
"full_name": "InfoSecPolkCounty/CVE2021-40444-document-Scanner",
|
||
"html_url": "https://github.com/InfoSecPolkCounty/CVE2021-40444-document-Scanner",
|
||
"description": "Scans Microsoft office documents for malicious xml entries",
|
||
"stargazers_count": 1,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-14T19:59:53Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-CAB",
|
||
"full_name": "Phuong39/CVE-2021-40444-CAB",
|
||
"html_url": "https://github.com/Phuong39/CVE-2021-40444-CAB",
|
||
"description": "CVE-2021-40444 - Custom CAB templates from MakeCAB",
|
||
"stargazers_count": 0,
|
||
"forks_count": 5,
|
||
"created_at": "2021-09-16T10:32:23Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "Alexcot25051999/CVE-2021-40444",
|
||
"html_url": "https://github.com/Alexcot25051999/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-11-22T13:29:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "RedLeavesChilde/CVE-2021-40444",
|
||
"html_url": "https://github.com/RedLeavesChilde/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2022-04-28T02:14:10Z"
|
||
},
|
||
{
|
||
"name": "cve-2021-40444",
|
||
"full_name": "jamesrep/cve-2021-40444",
|
||
"html_url": "https://github.com/jamesrep/cve-2021-40444",
|
||
"description": "Reverse engineering the \"A Letter Before Court 4.docx\" malicious files exploting cve-2021-40444",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-12T09:27:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "khoaduynu/CVE-2021-40444",
|
||
"html_url": "https://github.com/khoaduynu/CVE-2021-40444",
|
||
"description": "POC for CVE-2021-40444",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-09-13T09:46:04Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "hqdat809/CVE-2021-40444",
|
||
"html_url": "https://github.com/hqdat809/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2023-06-05T02:27:21Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "MohamedAboHelal/CVE-2021-40444",
|
||
"html_url": "https://github.com/MohamedAboHelal/CVE-2021-40444",
|
||
"description": "CVE-2021-40444",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2023-12-24T16:20:39Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444",
|
||
"full_name": "tiagob0b/CVE-2021-40444",
|
||
"html_url": "https://github.com/tiagob0b/CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-10-24T23:17:12Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-exp",
|
||
"full_name": "lisinan988/CVE-2021-40444-exp",
|
||
"html_url": "https://github.com/lisinan988/CVE-2021-40444-exp",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-11-25T05:13:05Z"
|
||
},
|
||
{
|
||
"name": "MSHTML-CVE-2021-40444",
|
||
"full_name": "metehangenel/MSHTML-CVE-2021-40444",
|
||
"html_url": "https://github.com/metehangenel/MSHTML-CVE-2021-40444",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2021-10-15T13:52:34Z"
|
||
},
|
||
{
|
||
"name": "cve-2021-40444-analysis",
|
||
"full_name": "Immersive-Labs-Sec/cve-2021-40444-analysis",
|
||
"html_url": "https://github.com/Immersive-Labs-Sec/cve-2021-40444-analysis",
|
||
"description": null,
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2021-09-09T15:43:08Z"
|
||
},
|
||
{
|
||
"name": "Follina-CVE-and-CVE-2021-40444",
|
||
"full_name": "basim-ahmad/Follina-CVE-and-CVE-2021-40444",
|
||
"html_url": "https://github.com/basim-ahmad/Follina-CVE-and-CVE-2021-40444",
|
||
"description": "This repository contains scripts and resources for exploiting the Follina CVE and CVE-2021-40444 vulnerabilities in Microsoft Office. The scripts generate malicious document files that can execute arbitrary code on the target system.",
|
||
"stargazers_count": 0,
|
||
"forks_count": 0,
|
||
"created_at": "2024-07-28T17:23:43Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-Sample",
|
||
"full_name": "k4k4/CVE-2021-40444-Sample",
|
||
"html_url": "https://github.com/k4k4/CVE-2021-40444-Sample",
|
||
"description": "CVE-2021-40444 Sample ",
|
||
"stargazers_count": 0,
|
||
"forks_count": 48,
|
||
"created_at": "2021-09-10T10:19:42Z"
|
||
},
|
||
{
|
||
"name": "CVE-2021-40444-POC",
|
||
"full_name": "skitkat/CVE-2021-40444-POC",
|
||
"html_url": "https://github.com/skitkat/CVE-2021-40444-POC",
|
||
"description": "For learning purpose did a complete analysis on CVE-2021-40444 POC (proof of concept)",
|
||
"stargazers_count": 0,
|
||
"forks_count": 1,
|
||
"created_at": "2024-06-14T19:04:02Z"
|
||
}
|
||
] |