PoC-in-GitHub/2023/CVE-2023-44487.json

368 lines
12 KiB
JSON
Raw Normal View History

2023-10-11 03:38:01 +09:00
[
{
"id": 703062371,
"name": "CVE-2023-44487",
"full_name": "bcdannyboy\/CVE-2023-44487",
"owner": {
"login": "bcdannyboy",
"id": 12553297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
"html_url": "https:\/\/github.com\/bcdannyboy"
},
"html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487",
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
2024-01-25 21:45:05 +09:00
"updated_at": "2024-01-25T10:36:02Z",
2024-01-08 21:45:34 +09:00
"pushed_at": "2024-01-08T11:12:08Z",
2024-01-25 21:45:05 +09:00
"stargazers_count": 205,
"watchers_count": 205,
2023-10-11 03:38:01 +09:00
"has_discussions": false,
2024-01-11 15:35:18 +09:00
"forks_count": 46,
2023-10-11 03:38:01 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-11 15:35:18 +09:00
"forks": 46,
2024-01-25 21:45:05 +09:00
"watchers": 205,
2023-10-11 15:46:19 +09:00
"score": 0,
2024-01-09 15:37:17 +09:00
"subscribers_count": 5
2023-10-11 15:46:19 +09:00
},
{
"id": 703303512,
"name": "CVE-2023-44487",
"full_name": "imabee101\/CVE-2023-44487",
"owner": {
"login": "imabee101",
"id": 29169122,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4",
"html_url": "https:\/\/github.com\/imabee101"
},
"html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487",
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
2024-01-11 22:23:07 +09:00
"updated_at": "2024-01-11T06:55:22Z",
2023-10-13 21:43:07 +09:00
"pushed_at": "2023-10-13T11:19:10Z",
2024-01-11 22:23:07 +09:00
"stargazers_count": 42,
"watchers_count": 42,
2023-10-11 15:46:19 +09:00
"has_discussions": false,
2023-11-30 15:36:30 +09:00
"forks_count": 14,
2023-10-11 15:46:19 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
2023-10-11 22:36:59 +09:00
"cve",
"cve-2023-44487",
2023-10-11 15:46:19 +09:00
"ddos",
"dos",
"dos-attack",
"poc",
"proof-of-concept"
],
"visibility": "public",
2023-11-30 15:36:30 +09:00
"forks": 14,
2024-01-11 22:23:07 +09:00
"watchers": 42,
2023-10-11 03:38:01 +09:00
"score": 0,
2023-10-14 15:29:53 +09:00
"subscribers_count": 2
2023-10-12 16:40:55 +09:00
},
{
"id": 703845749,
"name": "CVE-2023-44487",
"full_name": "ByteHackr\/CVE-2023-44487",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr"
},
"html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487",
"description": "Test Script for CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T03:14:34Z",
"updated_at": "2023-10-12T03:30:38Z",
"pushed_at": "2023-10-12T03:30:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-10-13 15:55:48 +09:00
"subscribers_count": 1
2023-10-13 09:34:16 +09:00
},
{
"id": 703914770,
"name": "rapidreset",
"full_name": "pabloec20\/rapidreset",
"owner": {
"login": "pabloec20",
"id": 24191742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
"html_url": "https:\/\/github.com\/pabloec20"
},
"html_url": "https:\/\/github.com\/pabloec20\/rapidreset",
"description": "CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T07:06:42Z",
2023-12-10 21:39:22 +09:00
"updated_at": "2023-12-10T09:24:05Z",
2023-10-13 09:34:16 +09:00
"pushed_at": "2023-10-12T07:11:17Z",
2023-12-10 21:39:22 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-10-13 09:34:16 +09:00
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
2023-12-10 21:39:22 +09:00
"watchers": 1,
2023-10-13 09:34:16 +09:00
"score": 0,
2023-10-13 15:55:48 +09:00
"subscribers_count": 1
2023-10-14 09:35:32 +09:00
},
{
"id": 704732969,
"name": "rapidresetclient",
"full_name": "secengjeff\/rapidresetclient",
"owner": {
"login": "secengjeff",
"id": 146767590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4",
"html_url": "https:\/\/github.com\/secengjeff"
},
"html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient",
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
2024-02-11 21:26:00 +09:00
"updated_at": "2024-02-11T09:23:26Z",
2023-10-31 09:24:53 +09:00
"pushed_at": "2023-10-30T20:22:37Z",
2024-01-13 09:35:55 +09:00
"stargazers_count": 35,
"watchers_count": 35,
2023-10-14 09:35:32 +09:00
"has_discussions": false,
2024-01-17 09:34:44 +09:00
"forks_count": 14,
2023-10-14 09:35:32 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2024-01-17 09:34:44 +09:00
"forks": 14,
2024-01-13 09:35:55 +09:00
"watchers": 35,
2023-10-14 09:35:32 +09:00
"score": 0,
2023-12-11 15:35:15 +09:00
"subscribers_count": 3
2023-10-16 22:42:56 +09:00
},
{
"id": 705614213,
"name": "CVE-2023-44487",
"full_name": "studiogangster\/CVE-2023-44487",
"owner": {
"login": "studiogangster",
"id": 12793420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4",
"html_url": "https:\/\/github.com\/studiogangster"
},
"html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487",
2023-10-17 15:40:03 +09:00
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
2023-10-16 22:42:56 +09:00
"fork": false,
"created_at": "2023-10-16T11:07:50Z",
2024-02-07 21:26:17 +09:00
"updated_at": "2024-02-07T09:26:32Z",
2023-10-16 22:42:56 +09:00
"pushed_at": "2023-10-16T12:32:50Z",
2024-02-07 21:26:17 +09:00
"stargazers_count": 13,
"watchers_count": 13,
2023-10-16 22:42:56 +09:00
"has_discussions": false,
2023-12-01 03:39:22 +09:00
"forks_count": 3,
2023-10-16 22:42:56 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
2023-10-17 09:28:37 +09:00
"topics": [
"cve-2023-44487",
"cybersecurity",
"exploit",
"http2",
"rapid",
"rapid-reset",
"reset",
"security",
"zero-day"
],
2023-10-16 22:42:56 +09:00
"visibility": "public",
2023-12-01 03:39:22 +09:00
"forks": 3,
2024-02-07 21:26:17 +09:00
"watchers": 13,
2023-10-16 22:42:56 +09:00
"score": 0,
2023-10-17 15:40:03 +09:00
"subscribers_count": 1
2023-10-27 03:25:13 +09:00
},
{
"id": 709722803,
"name": "golang-CVE-2023-44487",
"full_name": "ReToCode\/golang-CVE-2023-44487",
"owner": {
"login": "ReToCode",
"id": 16611466,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4",
"html_url": "https:\/\/github.com\/ReToCode"
},
"html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487",
"description": null,
"fork": false,
"created_at": "2023-10-25T09:11:46Z",
"updated_at": "2023-10-26T15:03:08Z",
"pushed_at": "2023-10-26T15:01:38Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
2024-01-28 15:25:46 +09:00
"subscribers_count": 2
2023-11-05 09:25:08 +09:00
},
2023-11-16 09:32:02 +09:00
{
"id": 716296930,
"name": "http2-rst-stream-attacker",
"full_name": "ndrscodes\/http2-rst-stream-attacker",
"owner": {
"login": "ndrscodes",
"id": 62462135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62462135?v=4",
"html_url": "https:\/\/github.com\/ndrscodes"
},
"html_url": "https:\/\/github.com\/ndrscodes\/http2-rst-stream-attacker",
"description": "Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses.",
"fork": false,
"created_at": "2023-11-08T20:56:22Z",
2024-02-01 21:26:11 +09:00
"updated_at": "2024-02-01T10:39:42Z",
2024-01-12 03:52:24 +09:00
"pushed_at": "2024-01-11T17:44:09Z",
2024-02-01 21:26:11 +09:00
"stargazers_count": 1,
"watchers_count": 1,
2023-11-16 09:32:02 +09:00
"has_discussions": false,
2023-12-01 03:39:22 +09:00
"forks_count": 1,
2023-11-16 09:32:02 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-44487",
"go",
"golang",
"http2",
"it-security",
"itsec",
"itsecurity",
"research",
"vulnerabilities",
"vulnerability"
],
"visibility": "public",
2023-12-01 03:39:22 +09:00
"forks": 1,
2024-02-01 21:26:11 +09:00
"watchers": 1,
2023-11-16 09:32:02 +09:00
"score": 0,
2023-11-16 15:39:24 +09:00
"subscribers_count": 1
2023-11-16 09:32:02 +09:00
},
2023-11-10 21:52:10 +09:00
{
"id": 716960166,
"name": "cve-2023-44487",
"full_name": "nxenon\/cve-2023-44487",
"owner": {
"login": "nxenon",
"id": 61124903,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61124903?v=4",
"html_url": "https:\/\/github.com\/nxenon"
},
"html_url": "https:\/\/github.com\/nxenon\/cve-2023-44487",
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
"fork": false,
"created_at": "2023-11-10T08:38:51Z",
2024-02-07 03:26:17 +09:00
"updated_at": "2024-02-06T14:05:43Z",
2023-11-10 21:52:10 +09:00
"pushed_at": "2023-11-10T08:39:14Z",
2024-02-07 03:26:17 +09:00
"stargazers_count": 5,
"watchers_count": 5,
2023-11-10 21:52:10 +09:00
"has_discussions": false,
2023-11-11 21:28:25 +09:00
"forks_count": 1,
2023-11-10 21:52:10 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-44487",
"ddos",
"dos",
"http2",
"rapid-reset",
"rapid-reset-attack"
],
"visibility": "public",
2023-11-11 21:28:25 +09:00
"forks": 1,
2024-02-07 03:26:17 +09:00
"watchers": 5,
2023-11-10 21:52:10 +09:00
"score": 0,
2023-11-11 15:26:33 +09:00
"subscribers_count": 1
2023-11-25 03:32:13 +09:00
},
{
"id": 723118471,
2023-11-25 09:31:56 +09:00
"name": "HTTP-2-Rapid-Reset-Client",
"full_name": "terrorist\/HTTP-2-Rapid-Reset-Client",
2023-11-25 03:32:13 +09:00
"owner": {
"login": "terrorist",
"id": 108696846,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108696846?v=4",
"html_url": "https:\/\/github.com\/terrorist"
},
2023-11-25 09:31:56 +09:00
"html_url": "https:\/\/github.com\/terrorist\/HTTP-2-Rapid-Reset-Client",
2023-11-25 03:32:13 +09:00
"description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).",
"fork": false,
"created_at": "2023-11-24T18:26:36Z",
2023-12-26 03:28:00 +09:00
"updated_at": "2023-12-25T16:42:19Z",
2023-11-25 09:31:56 +09:00
"pushed_at": "2023-11-24T20:19:44Z",
2023-12-26 03:28:00 +09:00
"stargazers_count": 49,
"watchers_count": 49,
2023-11-25 03:32:13 +09:00
"has_discussions": false,
2023-12-01 21:40:37 +09:00
"forks_count": 4,
2023-11-25 03:32:13 +09:00
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
2023-12-01 21:40:37 +09:00
"forks": 4,
2023-12-26 03:28:00 +09:00
"watchers": 49,
2023-11-25 03:32:13 +09:00
"score": 0,
2023-11-25 15:28:41 +09:00
"subscribers_count": 1
2023-12-12 09:27:20 +09:00
},
{
"id": 730433558,
"name": "CVE-2023-44487-",
"full_name": "sigridou\/CVE-2023-44487-",
"owner": {
"login": "sigridou",
"id": 101998818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101998818?v=4",
"html_url": "https:\/\/github.com\/sigridou"
},
"html_url": "https:\/\/github.com\/sigridou\/CVE-2023-44487-",
"description": null,
"fork": false,
"created_at": "2023-12-11T23:12:03Z",
"updated_at": "2023-12-11T23:13:25Z",
"pushed_at": "2023-12-11T23:19:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
2023-12-12 15:51:33 +09:00
"subscribers_count": 1
2023-10-11 03:38:01 +09:00
}
]