2022-01-06 09:14:00 +09:00
[
{
"id" : 401652275 ,
"name" : "dheater" ,
"full_name" : "Balasys\/dheater" ,
"owner" : {
"login" : "Balasys" ,
"id" : 15004892 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/15004892?v=4" ,
"html_url" : "https:\/\/github.com\/Balasys"
} ,
"html_url" : "https:\/\/github.com\/Balasys\/dheater" ,
"description" : "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange." ,
"fork" : false ,
"created_at" : "2021-08-31T09:51:12Z" ,
2022-12-16 09:19:56 +09:00
"updated_at" : "2022-12-15T21:51:49Z" ,
2022-10-29 03:17:53 +09:00
"pushed_at" : "2022-10-28T13:26:02Z" ,
2022-12-16 09:19:56 +09:00
"stargazers_count" : 138 ,
"watchers_count" : 138 ,
2022-11-08 15:19:29 +09:00
"has_discussions" : false ,
2022-10-27 21:18:38 +09:00
"forks_count" : 11 ,
2022-01-06 09:14:00 +09:00
"allow_forking" : true ,
"is_template" : false ,
2022-06-29 03:20:29 +09:00
"web_commit_signoff_required" : false ,
2022-01-06 09:14:00 +09:00
"topics" : [
"attack" ,
2022-01-07 21:14:05 +09:00
"ddos" ,
"ddos-attack" ,
"ddos-attack-tool" ,
"ddos-tool" ,
2022-01-06 09:14:00 +09:00
"denial-of-service" ,
"dhe" ,
"diffie-hellman-algorithm" ,
2022-09-16 21:17:24 +09:00
"diffie-hellman-groups" ,
"diffie-hellman-key" ,
2022-01-06 09:14:00 +09:00
"exploit" ,
"overloading" ,
"poc" ,
2022-01-07 21:14:05 +09:00
"security" ,
2022-01-06 09:14:00 +09:00
"security-tools" ,
"ssh" ,
"ssl" ,
"tls" ,
2022-01-31 21:14:22 +09:00
"tls13" ,
2022-01-06 09:14:00 +09:00
"vulnerability"
] ,
"visibility" : "public" ,
2022-10-27 21:18:38 +09:00
"forks" : 11 ,
2022-12-16 09:19:56 +09:00
"watchers" : 138 ,
2022-01-06 09:14:00 +09:00
"score" : 0
2022-12-28 21:24:18 +09:00
} ,
{
"id" : 582969598 ,
"name" : "CVE-2002-20001" ,
"full_name" : "Live-Hack-CVE\/CVE-2002-20001" ,
"owner" : {
"login" : "Live-Hack-CVE" ,
"id" : 121191732 ,
"avatar_url" : "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4" ,
"html_url" : "https:\/\/github.com\/Live-Hack-CVE"
} ,
"html_url" : "https:\/\/github.com\/Live-Hack-CVE\/CVE-2002-20001" ,
"description" : "The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The a CVE project by @Sn0wAlice" ,
"fork" : false ,
"created_at" : "2022-12-28T11:32:18Z" ,
"updated_at" : "2022-12-28T11:32:18Z" ,
"pushed_at" : "2022-12-28T11:32:20Z" ,
"stargazers_count" : 0 ,
"watchers_count" : 0 ,
"has_discussions" : false ,
"forks_count" : 0 ,
"allow_forking" : true ,
"is_template" : false ,
"web_commit_signoff_required" : false ,
"topics" : [ ] ,
"visibility" : "public" ,
"forks" : 0 ,
"watchers" : 0 ,
"score" : 0
2022-01-06 09:14:00 +09:00
}
]