2025-01-08 01:32:44 +01:00
[
{
"id" : 703062371 ,
"name" : "CVE-2023-44487" ,
"full_name" : "bcdannyboy\/CVE-2023-44487" ,
"owner" : {
"login" : "bcdannyboy" ,
"id" : 12553297 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4" ,
"html_url" : "https:\/\/github.com\/bcdannyboy" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487" ,
"description" : "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487" ,
"fork" : false ,
"created_at" : "2023-10-10T14:20:42Z" ,
"updated_at" : "2025-01-02T01:39:15Z" ,
"pushed_at" : "2024-01-08T11:12:08Z" ,
"stargazers_count" : 226 ,
"watchers_count" : 226 ,
"has_discussions" : false ,
2025-01-09 13:33:52 +01:00
"forks_count" : 48 ,
2025-01-08 01:32:44 +01:00
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
2025-01-09 13:33:52 +01:00
"forks" : 48 ,
2025-01-08 01:32:44 +01:00
"watchers" : 226 ,
"score" : 0 ,
"subscribers_count" : 6
} ,
{
"id" : 703303512 ,
"name" : "CVE-2023-44487" ,
"full_name" : "imabee101\/CVE-2023-44487" ,
"owner" : {
"login" : "imabee101" ,
"id" : 29169122 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4" ,
"html_url" : "https:\/\/github.com\/imabee101" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/imabee101\/CVE-2023-44487" ,
"description" : "Proof of concept for DoS exploit " ,
"fork" : false ,
"created_at" : "2023-10-11T01:59:47Z" ,
"updated_at" : "2024-10-11T01:41:10Z" ,
"pushed_at" : "2023-10-13T11:19:10Z" ,
"stargazers_count" : 52 ,
"watchers_count" : 52 ,
"has_discussions" : false ,
"forks_count" : 16 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve" ,
"cve-2023-44487" ,
"ddos" ,
"dos" ,
"dos-attack" ,
"poc" ,
"proof-of-concept"
] ,
"visibility" : "public" ,
"forks" : 16 ,
"watchers" : 52 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 703845749 ,
"name" : "CVE-2023-44487" ,
"full_name" : "ByteHackr\/CVE-2023-44487" ,
"owner" : {
"login" : "ByteHackr" ,
"id" : 30409831 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4" ,
"html_url" : "https:\/\/github.com\/ByteHackr" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ByteHackr\/CVE-2023-44487" ,
"description" : "Test Script for CVE-2023-44487" ,
"fork" : false ,
"created_at" : "2023-10-12T03:14:34Z" ,
"updated_at" : "2023-10-12T03:30:38Z" ,
"pushed_at" : "2023-10-12T03:30:35Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 703914770 ,
"name" : "rapidreset" ,
"full_name" : "pabloec20\/rapidreset" ,
"owner" : {
"login" : "pabloec20" ,
"id" : 24191742 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4" ,
"html_url" : "https:\/\/github.com\/pabloec20" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/pabloec20\/rapidreset" ,
"description" : "CVE-2023-44487" ,
"fork" : false ,
"created_at" : "2023-10-12T07:06:42Z" ,
"updated_at" : "2024-06-27T16:58:23Z" ,
"pushed_at" : "2023-10-12T07:11:17Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 704732969 ,
"name" : "rapidresetclient" ,
"full_name" : "secengjeff\/rapidresetclient" ,
"owner" : {
"login" : "secengjeff" ,
"id" : 146767590 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4" ,
"html_url" : "https:\/\/github.com\/secengjeff" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/secengjeff\/rapidresetclient" ,
"description" : "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)" ,
"fork" : false ,
"created_at" : "2023-10-13T23:55:32Z" ,
"updated_at" : "2024-12-26T23:11:01Z" ,
"pushed_at" : "2023-10-30T20:22:37Z" ,
"stargazers_count" : 64 ,
"watchers_count" : 64 ,
"has_discussions" : false ,
"forks_count" : 16 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 16 ,
"watchers" : 64 ,
"score" : 0 ,
"subscribers_count" : 4
} ,
{
"id" : 705614213 ,
"name" : "CVE-2023-44487" ,
"full_name" : "studiogangster\/CVE-2023-44487" ,
"owner" : {
"login" : "studiogangster" ,
"id" : 12793420 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4" ,
"html_url" : "https:\/\/github.com\/studiogangster" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/studiogangster\/CVE-2023-44487" ,
"description" : "A python based exploit to test out rapid reset attack (CVE-2023-44487)" ,
"fork" : false ,
"created_at" : "2023-10-16T11:07:50Z" ,
"updated_at" : "2024-08-11T14:52:28Z" ,
"pushed_at" : "2023-10-16T12:32:50Z" ,
"stargazers_count" : 16 ,
"watchers_count" : 16 ,
"has_discussions" : false ,
"forks_count" : 3 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-44487" ,
"cybersecurity" ,
"exploit" ,
"http2" ,
"rapid" ,
"rapid-reset" ,
"reset" ,
"security" ,
"zero-day"
] ,
"visibility" : "public" ,
"forks" : 3 ,
"watchers" : 16 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 709722803 ,
"name" : "golang-CVE-2023-44487" ,
"full_name" : "ReToCode\/golang-CVE-2023-44487" ,
"owner" : {
"login" : "ReToCode" ,
"id" : 16611466 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4" ,
"html_url" : "https:\/\/github.com\/ReToCode" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-10-25T09:11:46Z" ,
"updated_at" : "2024-09-26T01:42:32Z" ,
"pushed_at" : "2023-10-26T15:01:38Z" ,
"stargazers_count" : 2 ,
"watchers_count" : 2 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 2 ,
"score" : 0 ,
"subscribers_count" : 2
} ,
{
"id" : 716296930 ,
"name" : "http2-rst-stream-attacker" ,
"full_name" : "ndrscodes\/http2-rst-stream-attacker" ,
"owner" : {
"login" : "ndrscodes" ,
"id" : 62462135 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/62462135?v=4" ,
"html_url" : "https:\/\/github.com\/ndrscodes" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/ndrscodes\/http2-rst-stream-attacker" ,
"description" : "Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses." ,
"fork" : false ,
"created_at" : "2023-11-08T20:56:22Z" ,
"updated_at" : "2024-09-11T05:27:59Z" ,
"pushed_at" : "2024-01-11T17:44:09Z" ,
"stargazers_count" : 3 ,
"watchers_count" : 3 ,
"has_discussions" : false ,
"forks_count" : 2 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-44487" ,
"go" ,
"golang" ,
"http2" ,
"it-security" ,
"itsec" ,
"itsecurity" ,
"research" ,
"vulnerabilities" ,
"vulnerability"
] ,
"visibility" : "public" ,
"forks" : 2 ,
"watchers" : 3 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 716960166 ,
"name" : "cve-2023-44487" ,
"full_name" : "nxenon\/cve-2023-44487" ,
"owner" : {
"login" : "nxenon" ,
"id" : 61124903 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/61124903?v=4" ,
"html_url" : "https:\/\/github.com\/nxenon" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/nxenon\/cve-2023-44487" ,
"description" : "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept" ,
"fork" : false ,
"created_at" : "2023-11-10T08:38:51Z" ,
"updated_at" : "2024-12-07T10:49:09Z" ,
"pushed_at" : "2023-11-10T08:39:14Z" ,
"stargazers_count" : 8 ,
"watchers_count" : 8 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [
"cve-2023-44487" ,
"ddos" ,
"dos" ,
"http2" ,
"rapid-reset" ,
"rapid-reset-attack"
] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 8 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 723118471 ,
"name" : "HTTP-2-Rapid-Reset-Client" ,
"full_name" : "terrorist\/HTTP-2-Rapid-Reset-Client" ,
"owner" : {
"login" : "terrorist" ,
"id" : 108696846 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/108696846?v=4" ,
"html_url" : "https:\/\/github.com\/terrorist" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/terrorist\/HTTP-2-Rapid-Reset-Client" ,
"description" : "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487)." ,
"fork" : false ,
"created_at" : "2023-11-24T18:26:36Z" ,
"updated_at" : "2024-09-02T12:43:28Z" ,
"pushed_at" : "2023-11-24T20:19:44Z" ,
"stargazers_count" : 48 ,
"watchers_count" : 48 ,
"has_discussions" : false ,
"forks_count" : 4 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 4 ,
"watchers" : 48 ,
"score" : 0 ,
"subscribers_count" : 0
} ,
{
"id" : 730433558 ,
"name" : "CVE-2023-44487-" ,
"full_name" : "sigridou\/CVE-2023-44487-" ,
"owner" : {
"login" : "sigridou" ,
"id" : 101998818 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/101998818?v=4" ,
"html_url" : "https:\/\/github.com\/sigridou" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sigridou\/CVE-2023-44487-" ,
"description" : null ,
"fork" : false ,
"created_at" : "2023-12-11T23:12:03Z" ,
"updated_at" : "2023-12-11T23:13:25Z" ,
"pushed_at" : "2023-12-11T23:19:25Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 790095472 ,
"name" : "cve-2023-44487" ,
"full_name" : "TYuan0816\/cve-2023-44487" ,
"owner" : {
"login" : "TYuan0816" ,
"id" : 91544853 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/91544853?v=4" ,
"html_url" : "https:\/\/github.com\/TYuan0816" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/TYuan0816\/cve-2023-44487" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-04-22T08:56:39Z" ,
"updated_at" : "2024-04-22T08:56:43Z" ,
"pushed_at" : "2024-04-22T08:56:39Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 806127239 ,
"name" : "CVE-2023-44487" ,
"full_name" : "sn130hk\/CVE-2023-44487" ,
"owner" : {
"login" : "sn130hk" ,
"id" : 166270187 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/166270187?v=4" ,
"html_url" : "https:\/\/github.com\/sn130hk" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/sn130hk\/CVE-2023-44487" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-05-26T13:01:01Z" ,
"updated_at" : "2024-05-26T13:01:01Z" ,
"pushed_at" : "2024-05-26T13:01:01Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
} ,
{
"id" : 897966381 ,
"name" : "CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC" ,
"full_name" : "threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC" ,
"owner" : {
"login" : "threatlabindonesia" ,
"id" : 89779121 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/89779121?v=4" ,
"html_url" : "https:\/\/github.com\/threatlabindonesia" ,
"user_view_type" : "public"
} ,
"html_url" : "https:\/\/github.com\/threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC" ,
"description" : null ,
"fork" : false ,
"created_at" : "2024-12-03T14:54:21Z" ,
"updated_at" : "2024-12-03T15:04:52Z" ,
"pushed_at" : "2024-12-03T15:03:04Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 1 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 1 ,
"watchers" : 0 ,
"score" : 0 ,
"subscribers_count" : 1
}
]