272 lines
No EOL
9.2 KiB
JSON
272 lines
No EOL
9.2 KiB
JSON
[
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "danigargu/CVE-2020-0796",
|
||
"html_url": "https://github.com/danigargu/CVE-2020-0796",
|
||
"description": "CVE-2020-0796 - Windows SMBv3 LPE exploit #SMBGhost",
|
||
"stargazers_count": 1315,
|
||
"forks_count": 343,
|
||
"created_at": "2020-03-30T11:42:56Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-RCE-POC",
|
||
"full_name": "jamf/CVE-2020-0796-RCE-POC",
|
||
"html_url": "https://github.com/jamf/CVE-2020-0796-RCE-POC",
|
||
"description": "CVE-2020-0796 Remote Code Execution POC",
|
||
"stargazers_count": 549,
|
||
"forks_count": 172,
|
||
"created_at": "2020-04-20T14:35:48Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-PoC",
|
||
"full_name": "eerykitty/CVE-2020-0796-PoC",
|
||
"html_url": "https://github.com/eerykitty/CVE-2020-0796-PoC",
|
||
"description": "PoC for triggering buffer overflow via CVE-2020-0796",
|
||
"stargazers_count": 325,
|
||
"forks_count": 121,
|
||
"created_at": "2020-03-12T18:34:40Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-LPE-POC",
|
||
"full_name": "jamf/CVE-2020-0796-LPE-POC",
|
||
"html_url": "https://github.com/jamf/CVE-2020-0796-LPE-POC",
|
||
"description": "CVE-2020-0796 Local Privilege Escalation POC",
|
||
"stargazers_count": 241,
|
||
"forks_count": 84,
|
||
"created_at": "2020-03-30T16:06:50Z"
|
||
},
|
||
{
|
||
"name": "CVE_2020_0796_CNA",
|
||
"full_name": "Rvn0xsy/CVE_2020_0796_CNA",
|
||
"html_url": "https://github.com/Rvn0xsy/CVE_2020_0796_CNA",
|
||
"description": "Cobalt Strike AggressorScripts CVE-2020-0796",
|
||
"stargazers_count": 78,
|
||
"forks_count": 22,
|
||
"created_at": "2020-04-06T15:16:10Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-BOF",
|
||
"full_name": "rsmudge/CVE-2020-0796-BOF",
|
||
"html_url": "https://github.com/rsmudge/CVE-2020-0796-BOF",
|
||
"description": null,
|
||
"stargazers_count": 70,
|
||
"forks_count": 20,
|
||
"created_at": "2020-09-17T01:48:37Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "jiansiting/CVE-2020-0796",
|
||
"html_url": "https://github.com/jiansiting/CVE-2020-0796",
|
||
"description": null,
|
||
"stargazers_count": 62,
|
||
"forks_count": 23,
|
||
"created_at": "2020-04-01T01:46:08Z"
|
||
},
|
||
{
|
||
"name": "CVE2020-0796",
|
||
"full_name": "claroty/CVE2020-0796",
|
||
"html_url": "https://github.com/claroty/CVE2020-0796",
|
||
"description": "CVE2020-0796 SMBv3 RCE",
|
||
"stargazers_count": 61,
|
||
"forks_count": 15,
|
||
"created_at": "2020-03-11T16:37:10Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-SMB",
|
||
"full_name": "eastmountyxz/CVE-2020-0796-SMB",
|
||
"html_url": "https://github.com/eastmountyxz/CVE-2020-0796-SMB",
|
||
"description": "该资源为CVE-2020-0796漏洞复现,包括Python版本和C++版本。主要是集合了github大神们的资源,希望您喜欢~",
|
||
"stargazers_count": 33,
|
||
"forks_count": 20,
|
||
"created_at": "2020-04-02T12:12:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "T13nn3s/CVE-2020-0796",
|
||
"html_url": "https://github.com/T13nn3s/CVE-2020-0796",
|
||
"description": "Powershell SMBv3 Compression checker",
|
||
"stargazers_count": 28,
|
||
"forks_count": 13,
|
||
"created_at": "2020-03-11T09:13:48Z"
|
||
},
|
||
{
|
||
"name": "Unauthenticated-CVE-2020-0796-PoC",
|
||
"full_name": "maxpl0it/Unauthenticated-CVE-2020-0796-PoC",
|
||
"html_url": "https://github.com/maxpl0it/Unauthenticated-CVE-2020-0796-PoC",
|
||
"description": "An unauthenticated PoC for CVE-2020-0796",
|
||
"stargazers_count": 21,
|
||
"forks_count": 8,
|
||
"created_at": "2020-03-15T22:17:50Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-PoC",
|
||
"full_name": "0x25bit/CVE-2020-0796-PoC",
|
||
"html_url": "https://github.com/0x25bit/CVE-2020-0796-PoC",
|
||
"description": "Weaponized PoC for SMBv3 TCP codec/compression vulnerability",
|
||
"stargazers_count": 19,
|
||
"forks_count": 4,
|
||
"created_at": "2020-03-10T21:40:57Z"
|
||
},
|
||
{
|
||
"name": "CVE2020-0796",
|
||
"full_name": "Aurum2008/CVE2020-0796",
|
||
"html_url": "https://github.com/Aurum2008/CVE2020-0796",
|
||
"description": "Exploit for win10 SMB3.1",
|
||
"stargazers_count": 17,
|
||
"forks_count": 8,
|
||
"created_at": "2020-04-05T14:22:19Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-LPE-EXP",
|
||
"full_name": "f1tz/CVE-2020-0796-LPE-EXP",
|
||
"html_url": "https://github.com/f1tz/CVE-2020-0796-LPE-EXP",
|
||
"description": "Windows SMBv3 LPE exploit 已编译版",
|
||
"stargazers_count": 17,
|
||
"forks_count": 7,
|
||
"created_at": "2020-03-31T11:25:50Z"
|
||
},
|
||
{
|
||
"name": "aioScan_CVE-2020-0796",
|
||
"full_name": "GuoKerS/aioScan_CVE-2020-0796",
|
||
"html_url": "https://github.com/GuoKerS/aioScan_CVE-2020-0796",
|
||
"description": "基于asyncio(协程)的CVE-2020-0796 速度还是十分可观的,方便运维师傅们对内网做下快速检测。",
|
||
"stargazers_count": 16,
|
||
"forks_count": 14,
|
||
"created_at": "2020-03-14T23:39:25Z"
|
||
},
|
||
{
|
||
"name": "cve-2020-0796",
|
||
"full_name": "ButrintKomoni/cve-2020-0796",
|
||
"html_url": "https://github.com/ButrintKomoni/cve-2020-0796",
|
||
"description": "Identifying and Mitigating the CVE-2020–0796 flaw in the fly",
|
||
"stargazers_count": 15,
|
||
"forks_count": 15,
|
||
"created_at": "2020-03-11T18:42:32Z"
|
||
},
|
||
{
|
||
"name": "cve-2020-0796-scanner",
|
||
"full_name": "dickens88/cve-2020-0796-scanner",
|
||
"html_url": "https://github.com/dickens88/cve-2020-0796-scanner",
|
||
"description": "This project is used for scanning cve-2020-0796 SMB vulnerability",
|
||
"stargazers_count": 14,
|
||
"forks_count": 12,
|
||
"created_at": "2020-03-12T02:20:07Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-Checker",
|
||
"full_name": "joaozietolie/CVE-2020-0796-Checker",
|
||
"html_url": "https://github.com/joaozietolie/CVE-2020-0796-Checker",
|
||
"description": "Script that checks if the system is vulnerable to CVE-2020-0796 (SMB v3.1.1)",
|
||
"stargazers_count": 14,
|
||
"forks_count": 7,
|
||
"created_at": "2020-03-11T16:23:03Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "thelostworldFree/CVE-2020-0796",
|
||
"html_url": "https://github.com/thelostworldFree/CVE-2020-0796",
|
||
"description": "PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)",
|
||
"stargazers_count": 11,
|
||
"forks_count": 18,
|
||
"created_at": "2020-04-22T09:09:02Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-Scanner",
|
||
"full_name": "jiansiting/CVE-2020-0796-Scanner",
|
||
"html_url": "https://github.com/jiansiting/CVE-2020-0796-Scanner",
|
||
"description": "CVE-2020-0796-Scanner",
|
||
"stargazers_count": 9,
|
||
"forks_count": 4,
|
||
"created_at": "2020-03-15T03:17:47Z"
|
||
},
|
||
{
|
||
"name": "cve-2020-0796",
|
||
"full_name": "0xeb-bp/cve-2020-0796",
|
||
"html_url": "https://github.com/0xeb-bp/cve-2020-0796",
|
||
"description": "CVE-2020-0796 (SMBGhost) LPE",
|
||
"stargazers_count": 6,
|
||
"forks_count": 6,
|
||
"created_at": "2020-04-07T22:35:57Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "dungnm24/CVE-2020-0796",
|
||
"html_url": "https://github.com/dungnm24/CVE-2020-0796",
|
||
"description": "WindowsProtocolTestSuites is to trigger BSoD, and full exploit poc.",
|
||
"stargazers_count": 6,
|
||
"forks_count": 4,
|
||
"created_at": "2023-05-29T06:31:51Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "vysecurity/CVE-2020-0796",
|
||
"html_url": "https://github.com/vysecurity/CVE-2020-0796",
|
||
"description": "CVE-2020-0796 - Working PoC - 20200313",
|
||
"stargazers_count": 5,
|
||
"forks_count": 2,
|
||
"created_at": "2020-03-13T08:34:31Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "tango-j/CVE-2020-0796",
|
||
"html_url": "https://github.com/tango-j/CVE-2020-0796",
|
||
"description": "Coronablue exploit",
|
||
"stargazers_count": 4,
|
||
"forks_count": 2,
|
||
"created_at": "2020-03-31T19:01:52Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "orangmuda/CVE-2020-0796",
|
||
"html_url": "https://github.com/orangmuda/CVE-2020-0796",
|
||
"description": "Remote Code Execution POC for CVE-2020-0796",
|
||
"stargazers_count": 4,
|
||
"forks_count": 1,
|
||
"created_at": "2021-10-09T04:52:55Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796",
|
||
"full_name": "exp-sky/CVE-2020-0796",
|
||
"html_url": "https://github.com/exp-sky/CVE-2020-0796",
|
||
"description": "SMBv3 Ghost (CVE-2020-0796) Vulnerability",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2020-06-09T06:18:54Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020_0796-exp",
|
||
"full_name": "RonnieNiu/CVE-2020_0796-exp",
|
||
"html_url": "https://github.com/RonnieNiu/CVE-2020_0796-exp",
|
||
"description": "CVE-2020_0796-exp",
|
||
"stargazers_count": 3,
|
||
"forks_count": 0,
|
||
"created_at": "2020-06-03T04:58:45Z"
|
||
},
|
||
{
|
||
"name": "cve2020-0796",
|
||
"full_name": "TinToSer/cve2020-0796",
|
||
"html_url": "https://github.com/TinToSer/cve2020-0796",
|
||
"description": "Microsoft SMV3.1.1 wormable Exploit",
|
||
"stargazers_count": 2,
|
||
"forks_count": 2,
|
||
"created_at": "2020-03-13T06:58:59Z"
|
||
},
|
||
{
|
||
"name": "SMBGhost-CVE-2020-0796-",
|
||
"full_name": "codewithpradhan/SMBGhost-CVE-2020-0796-",
|
||
"html_url": "https://github.com/codewithpradhan/SMBGhost-CVE-2020-0796-",
|
||
"description": "To crash Windows-10 easily",
|
||
"stargazers_count": 2,
|
||
"forks_count": 2,
|
||
"created_at": "2020-09-28T05:23:20Z"
|
||
},
|
||
{
|
||
"name": "CVE-2020-0796-LPE",
|
||
"full_name": "TinToSer/CVE-2020-0796-LPE",
|
||
"html_url": "https://github.com/TinToSer/CVE-2020-0796-LPE",
|
||
"description": "SMBGHOST local privilege escalation",
|
||
"stargazers_count": 2,
|
||
"forks_count": 2,
|
||
"created_at": "2020-03-31T05:41:30Z"
|
||
}
|
||
] |