272 lines
No EOL
9.9 KiB
JSON
272 lines
No EOL
9.9 KiB
JSON
[
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "ynwarcs/CVE-2024-38063",
|
|
"html_url": "https://github.com/ynwarcs/CVE-2024-38063",
|
|
"description": "poc for CVE-2024-38063 (RCE in tcpip.sys)",
|
|
"stargazers_count": 655,
|
|
"forks_count": 119,
|
|
"created_at": "2024-08-24T18:25:46Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-poc",
|
|
"full_name": "Sachinart/CVE-2024-38063-poc",
|
|
"html_url": "https://github.com/Sachinart/CVE-2024-38063-poc",
|
|
"description": "Note: I am not responsible for any bad act. This is written by Chirag Artani to demonstrate the vulnerability.",
|
|
"stargazers_count": 87,
|
|
"forks_count": 30,
|
|
"created_at": "2024-08-17T14:58:36Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "ThemeHackers/CVE-2024-38063",
|
|
"html_url": "https://github.com/ThemeHackers/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 is a critical security vulnerability in the Windows TCP/IP stack that allows for remote code execution (RCE)",
|
|
"stargazers_count": 22,
|
|
"forks_count": 5,
|
|
"created_at": "2024-08-31T13:56:26Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "patchpoint/CVE-2024-38063",
|
|
"html_url": "https://github.com/patchpoint/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 20,
|
|
"forks_count": 3,
|
|
"created_at": "2024-08-27T15:21:25Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "diegoalbuquerque/CVE-2024-38063",
|
|
"html_url": "https://github.com/diegoalbuquerque/CVE-2024-38063",
|
|
"description": "mitigation script by disabling ipv6 of all interfaces",
|
|
"stargazers_count": 15,
|
|
"forks_count": 3,
|
|
"created_at": "2024-08-15T12:41:01Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-POC",
|
|
"full_name": "zenzue/CVE-2024-38063-POC",
|
|
"html_url": "https://github.com/zenzue/CVE-2024-38063-POC",
|
|
"description": "potential memory corruption vulnerabilities in IPv6 networks.",
|
|
"stargazers_count": 7,
|
|
"forks_count": 6,
|
|
"created_at": "2024-08-28T08:57:23Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063_PoC",
|
|
"full_name": "KernelKraze/CVE-2024-38063_PoC",
|
|
"html_url": "https://github.com/KernelKraze/CVE-2024-38063_PoC",
|
|
"description": "This is a C language program designed to test the Windows TCP/IP Remote Code Execution Vulnerability (CVE-2024-38063). It sends specially crafted IPv6 packets with embedded shellcode to exploit the vulnerability.",
|
|
"stargazers_count": 7,
|
|
"forks_count": 2,
|
|
"created_at": "2024-09-01T09:20:02Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Research-Tool",
|
|
"full_name": "haroonawanofficial/CVE-2024-38063-Research-Tool",
|
|
"html_url": "https://github.com/haroonawanofficial/CVE-2024-38063-Research-Tool",
|
|
"description": "This is a functional proof of concept (PoC) for CVE-2024-38063. However, it's important to note that this CVE is theoretical and not exploitable in a real-world scenario. To enhance understanding for learners, I have developed a research tool that covers both past and newly reported TCP/IP vulnerabilities in CVEs",
|
|
"stargazers_count": 5,
|
|
"forks_count": 1,
|
|
"created_at": "2024-08-24T15:04:54Z"
|
|
},
|
|
{
|
|
"name": "Windows-CVE-2024-38063",
|
|
"full_name": "PumpkinBridge/Windows-CVE-2024-38063",
|
|
"html_url": "https://github.com/PumpkinBridge/Windows-CVE-2024-38063",
|
|
"description": "Windows TCP/IP IPv6(CVE-2024-38063)",
|
|
"stargazers_count": 4,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-28T01:46:44Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "thanawee321/CVE-2024-38063",
|
|
"html_url": "https://github.com/thanawee321/CVE-2024-38063",
|
|
"description": "Vulnerability CVE-2024-38063",
|
|
"stargazers_count": 3,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-15T03:18:51Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Th3Tr1ckst3r/CVE-2024-38063",
|
|
"html_url": "https://github.com/Th3Tr1ckst3r/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 research so you don't have to.",
|
|
"stargazers_count": 2,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-23T06:28:03Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-",
|
|
"full_name": "AdminPentester/CVE-2024-38063-",
|
|
"html_url": "https://github.com/AdminPentester/CVE-2024-38063-",
|
|
"description": "Remotely Exploiting The Kernel Via IPv6",
|
|
"stargazers_count": 2,
|
|
"forks_count": 1,
|
|
"created_at": "2024-08-28T15:28:14Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "becrevex/CVE-2024-38063",
|
|
"html_url": "https://github.com/becrevex/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-08T06:24:54Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Faizan-Khanx/CVE-2024-38063",
|
|
"html_url": "https://github.com/Faizan-Khanx/CVE-2024-38063",
|
|
"description": "CVE-2024-38063 - Remotely Exploiting The Kernel Via IPv6",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-10T07:15:20Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "Dragkob/CVE-2024-38063",
|
|
"html_url": "https://github.com/Dragkob/CVE-2024-38063",
|
|
"description": "PoC for Windows' IPv6 CVE-2024-38063",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-16T17:22:08Z"
|
|
},
|
|
{
|
|
"name": "cve_2024_38063_research",
|
|
"full_name": "zaneoblaneo/cve_2024_38063_research",
|
|
"html_url": "https://github.com/zaneoblaneo/cve_2024_38063_research",
|
|
"description": "CVE 2024-38063 Research and POC development",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-22T03:51:43Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-scanner",
|
|
"full_name": "jip-0-0-0-0-0/CVE-2024-38063-scanner",
|
|
"html_url": "https://github.com/jip-0-0-0-0-0/CVE-2024-38063-scanner",
|
|
"description": "A Python tool leveraging Shodan and Scapy to identify and exploit Windows systems vulnerable to CVE-2024-38063, enabling targeted Denial of Service attacks",
|
|
"stargazers_count": 1,
|
|
"forks_count": 0,
|
|
"created_at": "2025-01-16T10:31:43Z"
|
|
},
|
|
{
|
|
"name": "Cve-2024-38063",
|
|
"full_name": "brownpanda29/Cve-2024-38063",
|
|
"html_url": "https://github.com/brownpanda29/Cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 3,
|
|
"created_at": "2024-09-03T14:36:35Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "ps-interactive/cve-2024-38063",
|
|
"html_url": "https://github.com/ps-interactive/cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-02T14:16:31Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "selenagomez25/CVE-2024-38063",
|
|
"html_url": "https://github.com/selenagomez25/CVE-2024-38063",
|
|
"description": "poc for exploiting cve-2024-38063",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-18T15:20:24Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "p33d/cve-2024-38063",
|
|
"html_url": "https://github.com/p33d/cve-2024-38063",
|
|
"description": "Poc for cve-2024-38063 ",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-18T22:24:43Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063",
|
|
"full_name": "lnx-dvlpr/cve-2024-38063",
|
|
"html_url": "https://github.com/lnx-dvlpr/cve-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-23T11:45:42Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063",
|
|
"full_name": "idkwastaken/CVE-2024-38063",
|
|
"html_url": "https://github.com/idkwastaken/CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-10-14T17:46:58Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Medium",
|
|
"full_name": "ArenaldyP/CVE-2024-38063-Medium",
|
|
"html_url": "https://github.com/ArenaldyP/CVE-2024-38063-Medium",
|
|
"description": "Kode Eksploitasi CVE-2024-38063",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-21T17:33:52Z"
|
|
},
|
|
{
|
|
"name": "Windows-CVE-2024-38063",
|
|
"full_name": "Laukage/Windows-CVE-2024-38063",
|
|
"html_url": "https://github.com/Laukage/Windows-CVE-2024-38063",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-12-06T21:45:09Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-VB",
|
|
"full_name": "noradlb1/CVE-2024-38063-VB",
|
|
"html_url": "https://github.com/noradlb1/CVE-2024-38063-VB",
|
|
"description": "CVE-2024-38063 VB",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-17T01:11:12Z"
|
|
},
|
|
{
|
|
"name": "cve-2024-38063-Anonyvader",
|
|
"full_name": "AliHj98/cve-2024-38063-Anonyvader",
|
|
"html_url": "https://github.com/AliHj98/cve-2024-38063-Anonyvader",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-11-07T09:36:32Z"
|
|
},
|
|
{
|
|
"name": "CVE-2024-38063-Remediation",
|
|
"full_name": "dweger-scripts/CVE-2024-38063-Remediation",
|
|
"html_url": "https://github.com/dweger-scripts/CVE-2024-38063-Remediation",
|
|
"description": null,
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-19T19:44:37Z"
|
|
},
|
|
{
|
|
"name": "quick-fix-cve-2024-38063",
|
|
"full_name": "FrancescoDiSalesGithub/quick-fix-cve-2024-38063",
|
|
"html_url": "https://github.com/FrancescoDiSalesGithub/quick-fix-cve-2024-38063",
|
|
"description": "quick powershell script to fix cve-2024-38063",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-09-07T16:27:27Z"
|
|
},
|
|
{
|
|
"name": "Disable-IPv6-CVE-2024-38063-Fix",
|
|
"full_name": "almogopp/Disable-IPv6-CVE-2024-38063-Fix",
|
|
"html_url": "https://github.com/almogopp/Disable-IPv6-CVE-2024-38063-Fix",
|
|
"description": "A PowerShell script to temporarily mitigate the CVE-2024-38063 vulnerability by disabling IPv6 on Windows systems. This workaround modifies the registry to reduce the risk of exploitation without needing the immediate installation of the official Microsoft KB update. Intended as a temporary fix",
|
|
"stargazers_count": 0,
|
|
"forks_count": 0,
|
|
"created_at": "2024-08-20T08:48:08Z"
|
|
}
|
|
] |