2019-12-08 22:19:20 +09:00
|
|
|
[
|
2020-04-16 12:08:05 +09:00
|
|
|
{
|
|
|
|
"id": 90210170,
|
|
|
|
"name": "CVE-2017-5689",
|
|
|
|
"full_name": "CerberusSecurity\/CVE-2017-5689",
|
|
|
|
"owner": {
|
|
|
|
"login": "CerberusSecurity",
|
|
|
|
"id": 21088337,
|
|
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/21088337?v=4",
|
|
|
|
"html_url": "https:\/\/github.com\/CerberusSecurity"
|
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/CerberusSecurity\/CVE-2017-5689",
|
|
|
|
"description": null,
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2017-05-04T01:51:26Z",
|
|
|
|
"updated_at": "2020-01-01T00:38:18Z",
|
|
|
|
"pushed_at": "2017-05-04T03:06:32Z",
|
|
|
|
"stargazers_count": 39,
|
|
|
|
"watchers_count": 39,
|
|
|
|
"forks_count": 9,
|
|
|
|
"forks": 9,
|
|
|
|
"watchers": 39,
|
|
|
|
"score": 0
|
|
|
|
},
|
2019-12-08 22:19:20 +09:00
|
|
|
{
|
|
|
|
"id": 90472957,
|
|
|
|
"name": "amthoneypot",
|
2020-01-13 01:00:02 +09:00
|
|
|
"full_name": "x1sec\/amthoneypot",
|
2019-12-08 22:19:20 +09:00
|
|
|
"owner": {
|
2020-01-13 01:00:02 +09:00
|
|
|
"login": "x1sec",
|
2019-12-08 22:19:20 +09:00
|
|
|
"id": 11153104,
|
|
|
|
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/11153104?v=4",
|
2020-01-13 01:00:02 +09:00
|
|
|
"html_url": "https:\/\/github.com\/x1sec"
|
2019-12-08 22:19:20 +09:00
|
|
|
},
|
2020-01-13 01:00:02 +09:00
|
|
|
"html_url": "https:\/\/github.com\/x1sec\/amthoneypot",
|
2019-12-08 22:19:20 +09:00
|
|
|
"description": "Honeypot for Intel's AMT Firmware Vulnerability CVE-2017-5689",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2017-05-06T15:35:42Z",
|
2020-04-10 18:07:56 +09:00
|
|
|
"updated_at": "2020-04-10T06:55:15Z",
|
2020-01-04 12:30:02 +09:00
|
|
|
"pushed_at": "2020-01-03T21:50:36Z",
|
2020-04-10 18:07:56 +09:00
|
|
|
"stargazers_count": 12,
|
|
|
|
"watchers_count": 12,
|
2020-04-22 18:08:05 +09:00
|
|
|
"forks_count": 4,
|
|
|
|
"forks": 4,
|
2020-04-10 18:07:56 +09:00
|
|
|
"watchers": 12,
|
2019-12-10 00:05:38 +09:00
|
|
|
"score": 0
|
2020-04-13 00:10:36 +09:00
|
|
|
},
|
2020-04-16 12:08:05 +09:00
|
|
|
{
|
|
|
|
"id": 90724328,
|
|
|
|
"name": "intel_amt_bypass",
|
|
|
|
"full_name": "Bijaye\/intel_amt_bypass",
|
|
|
|
"owner": {
|
|
|
|
"login": "Bijaye",
|
|
|
|
"id": 4318412,
|
|
|
|
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/4318412?v=4",
|
|
|
|
"html_url": "https:\/\/github.com\/Bijaye"
|
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/Bijaye\/intel_amt_bypass",
|
|
|
|
"description": "simple python poc for CVE-2017-5689",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2017-05-09T08:55:39Z",
|
|
|
|
"updated_at": "2019-06-28T19:35:09Z",
|
|
|
|
"pushed_at": "2017-05-09T00:42:12Z",
|
|
|
|
"stargazers_count": 2,
|
|
|
|
"watchers_count": 2,
|
|
|
|
"forks_count": 7,
|
|
|
|
"forks": 7,
|
|
|
|
"watchers": 2,
|
|
|
|
"score": 0
|
|
|
|
},
|
2020-04-13 00:10:36 +09:00
|
|
|
{
|
|
|
|
"id": 98579784,
|
|
|
|
"name": "amt_auth_bypass_poc",
|
|
|
|
"full_name": "embedi\/amt_auth_bypass_poc",
|
|
|
|
"owner": {
|
|
|
|
"login": "embedi",
|
|
|
|
"id": 24190344,
|
|
|
|
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24190344?v=4",
|
|
|
|
"html_url": "https:\/\/github.com\/embedi"
|
|
|
|
},
|
|
|
|
"html_url": "https:\/\/github.com\/embedi\/amt_auth_bypass_poc",
|
|
|
|
"description": "CVE-2017-5689 Proof-of-Concept exploit",
|
|
|
|
"fork": false,
|
|
|
|
"created_at": "2017-07-27T21:06:08Z",
|
|
|
|
"updated_at": "2020-03-05T17:32:09Z",
|
|
|
|
"pushed_at": "2017-07-27T21:08:49Z",
|
|
|
|
"stargazers_count": 48,
|
|
|
|
"watchers_count": 48,
|
|
|
|
"forks_count": 16,
|
|
|
|
"forks": 16,
|
|
|
|
"watchers": 48,
|
|
|
|
"score": 0
|
2019-12-08 22:19:20 +09:00
|
|
|
}
|
|
|
|
]
|