[ { "id": 382021281, "name": "CVE-2021-34527", "full_name": "DenizSe\/CVE-2021-34527", "owner": { "login": "DenizSe", "id": 43039427, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43039427?v=4", "html_url": "https:\/\/github.com\/DenizSe", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DenizSe\/CVE-2021-34527", "description": "Small Powershell Script to detect Running Printer Spoolers on Domain Controller", "fork": false, "created_at": "2021-07-01T12:12:16Z", "updated_at": "2021-07-02T07:49:06Z", "pushed_at": "2021-07-02T07:45:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-1675", "cve-2021-34527", "domaincontroller", "printnightmare", "printspooler" ], "visibility": "public", "forks": 2, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 382267064, "name": "PrintNightmare", "full_name": "thomas-lauer\/PrintNightmare", "owner": { "login": "thomas-lauer", "id": 7205231, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7205231?v=4", "html_url": "https:\/\/github.com\/thomas-lauer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thomas-lauer\/PrintNightmare", "description": "Kritische Sicherheitslücke PrintNightmare CVE-2021-34527", "fork": false, "created_at": "2021-07-02T07:30:52Z", "updated_at": "2024-08-12T20:14:24Z", "pushed_at": "2021-07-12T15:07:05Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 382335385, "name": "CVE-2021-34527", "full_name": "JohnHammond\/CVE-2021-34527", "owner": { "login": "JohnHammond", "id": 6288722, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6288722?v=4", "html_url": "https:\/\/github.com\/JohnHammond", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JohnHammond\/CVE-2021-34527", "description": null, "fork": false, "created_at": "2021-07-02T12:10:49Z", "updated_at": "2025-01-05T10:14:44Z", "pushed_at": "2021-07-02T12:17:50Z", "stargazers_count": 267, "watchers_count": 267, "has_discussions": false, "forks_count": 68, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 68, "watchers": 267, "score": 0, "subscribers_count": 11 }, { "id": 382645654, "name": "PrintNightmare-CVE-2021-34527", "full_name": "nemo-wq\/PrintNightmare-CVE-2021-34527", "owner": { "login": "nemo-wq", "id": 28733668, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28733668?v=4", "html_url": "https:\/\/github.com\/nemo-wq", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nemo-wq\/PrintNightmare-CVE-2021-34527", "description": "PrintNightmare - Windows Print Spooler RCE\/LPE Vulnerability (CVE-2021-34527, CVE-2021-1675) proof of concept exploits", "fork": false, "created_at": "2021-07-03T15:15:12Z", "updated_at": "2025-01-12T19:41:20Z", "pushed_at": "2021-09-13T12:12:17Z", "stargazers_count": 132, "watchers_count": 132, "has_discussions": false, "forks_count": 39, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-1675", "cve-2021-34527", "howto-tutorial", "printnightmare", "rce", "windowsexploits" ], "visibility": "public", "forks": 39, "watchers": 132, "score": 0, "subscribers_count": 7 }, { "id": 382894525, "name": "CVE-2021-34527-1675", "full_name": "CnOxx1\/CVE-2021-34527-1675", "owner": { "login": "CnOxx1", "id": 86923954, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86923954?v=4", "html_url": "https:\/\/github.com\/CnOxx1", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CnOxx1\/CVE-2021-34527-1675", "description": "Cve-2021-1675 or cve-2021-34527? Detailed analysis and exploitation of windows print spooler 0day vulnerability!!!", "fork": false, "created_at": "2021-07-04T16:09:18Z", "updated_at": "2021-09-06T06:08:09Z", "pushed_at": "2021-07-04T16:31:21Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": true, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0, "subscribers_count": 2 }, { "id": 383207766, "name": "disable-RegisterSpoolerRemoteRpcEndPoint", "full_name": "rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint", "owner": { "login": "rdboboia", "id": 37208426, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37208426?v=4", "html_url": "https:\/\/github.com\/rdboboia", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rdboboia\/disable-RegisterSpoolerRemoteRpcEndPoint", "description": "Workaround for Windows Print Spooler Remote Code Execution Vulnerability(CVE-2021-34527). See: https:\/\/msrc.microsoft.com\/update-guide\/vulnerability\/CVE-2021-34527", "fork": false, "created_at": "2021-07-05T16:49:32Z", "updated_at": "2021-07-08T21:11:43Z", "pushed_at": "2021-07-08T21:11:40Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 383223006, "name": "CVE-2021-34527-PrintNightmare-Workaround", "full_name": "geekbrett\/CVE-2021-34527-PrintNightmare-Workaround", "owner": { "login": "geekbrett", "id": 22183376, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22183376?v=4", "html_url": "https:\/\/github.com\/geekbrett", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/geekbrett\/CVE-2021-34527-PrintNightmare-Workaround", "description": "This simple PowerShell script is in response to the \"PrintNightmare\" vulnerability. This was designed to give a end user the ability to stop and disable the \"Print Spooler\" service on their computer while awaiting a fix from Microsoft.", "fork": false, "created_at": "2021-07-05T17:50:56Z", "updated_at": "2024-08-24T16:04:56Z", "pushed_at": "2021-07-07T17:18:07Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 383254488, "name": "ItWasAllADream", "full_name": "byt3bl33d3r\/ItWasAllADream", "owner": { "login": "byt3bl33d3r", "id": 5151193, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5151193?v=4", "html_url": "https:\/\/github.com\/byt3bl33d3r", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/byt3bl33d3r\/ItWasAllADream", "description": "A PrintNightmare (CVE-2021-34527) Python Scanner. Scan entire subnets for hosts vulnerable to the PrintNightmare RCE", "fork": false, "created_at": "2021-07-05T20:13:49Z", "updated_at": "2025-01-02T00:37:03Z", "pushed_at": "2024-05-19T16:25:52Z", "stargazers_count": 789, "watchers_count": 789, "has_discussions": false, "forks_count": 122, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 122, "watchers": 789, "score": 0, "subscribers_count": 10 }, { "id": 383699836, "name": "Disable-Spooler-Service-PrintNightmare-CVE-2021-34527", "full_name": "vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527", "owner": { "login": "vinaysudheer", "id": 29897973, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29897973?v=4", "html_url": "https:\/\/github.com\/vinaysudheer", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vinaysudheer\/Disable-Spooler-Service-PrintNightmare-CVE-2021-34527", "description": "Simple batch script to disable the Microsoft Print Spooler service from system", "fork": false, "created_at": "2021-07-07T06:41:15Z", "updated_at": "2021-07-07T06:47:16Z", "pushed_at": "2021-07-07T06:47:13Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 383719689, "name": "PrintNightmare-CVE-2021-34527", "full_name": "powershellpr0mpt\/PrintNightmare-CVE-2021-34527", "owner": { "login": "powershellpr0mpt", "id": 9294993, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9294993?v=4", "html_url": "https:\/\/github.com\/powershellpr0mpt", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/powershellpr0mpt\/PrintNightmare-CVE-2021-34527", "description": "How to fix the PrintNightmare vulnerability", "fork": false, "created_at": "2021-07-07T07:58:53Z", "updated_at": "2024-08-24T16:05:17Z", "pushed_at": "2021-07-07T10:00:32Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 383968301, "name": "CVE-2021-34527_ACL_mitigation", "full_name": "WidespreadPandemic\/CVE-2021-34527_ACL_mitigation", "owner": { "login": "WidespreadPandemic", "id": 75406207, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75406207?v=4", "html_url": "https:\/\/github.com\/WidespreadPandemic", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/WidespreadPandemic\/CVE-2021-34527_ACL_mitigation", "description": "Mitigation for CVE-2021-34527 RCE by setting WRITE ACLs", "fork": false, "created_at": "2021-07-08T01:32:18Z", "updated_at": "2021-07-09T03:54:14Z", "pushed_at": "2021-07-09T03:54:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 384221697, "name": "printnightmare", "full_name": "glorisonlai\/printnightmare", "owner": { "login": "glorisonlai", "id": 26339805, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/26339805?v=4", "html_url": "https:\/\/github.com\/glorisonlai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/glorisonlai\/printnightmare", "description": "CVE-2021-34527 implementation", "fork": false, "created_at": "2021-07-08T18:56:04Z", "updated_at": "2021-07-08T18:56:07Z", "pushed_at": "2021-07-08T18:56:05Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 384372251, "name": "CVE-2021-34527-Scanner-Based-On-cube0x0-POC", "full_name": "dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC", "owner": { "login": "dywhoami", "id": 87174410, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87174410?v=4", "html_url": "https:\/\/github.com\/dywhoami", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dywhoami\/CVE-2021-34527-Scanner-Based-On-cube0x0-POC", "description": null, "fork": false, "created_at": "2021-07-09T08:27:36Z", "updated_at": "2024-12-10T21:47:36Z", "pushed_at": "2021-07-11T00:23:19Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 384385967, "name": "Printnightmare", "full_name": "Eutectico\/Printnightmare", "owner": { "login": "Eutectico", "id": 30925137, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30925137?v=4", "html_url": "https:\/\/github.com\/Eutectico", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Eutectico\/Printnightmare", "description": "Fix for PrintNightmare CVE-2021-34527", "fork": false, "created_at": "2021-07-09T09:22:03Z", "updated_at": "2021-07-09T11:02:54Z", "pushed_at": "2021-07-09T11:02:51Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 384554464, "name": "PowerShell-PrintNightmare", "full_name": "syntaxbearror\/PowerShell-PrintNightmare", "owner": { "login": "syntaxbearror", "id": 53105897, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53105897?v=4", "html_url": "https:\/\/github.com\/syntaxbearror", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/syntaxbearror\/PowerShell-PrintNightmare", "description": "A collection of scripts to help set the appropriate registry keys for CVE-2021-34527", "fork": false, "created_at": "2021-07-09T21:28:16Z", "updated_at": "2021-07-11T16:21:00Z", "pushed_at": "2021-07-09T21:46:57Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 385271497, "name": "PrintNightmare-Patcher", "full_name": "0xirison\/PrintNightmare-Patcher", "owner": { "login": "0xirison", "id": 87223944, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87223944?v=4", "html_url": "https:\/\/github.com\/0xirison", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0xirison\/PrintNightmare-Patcher", "description": "A patch for PrintNightmare vulnerability that occurs to print spooler service for Windows machines [CVE-2021-34527]", "fork": false, "created_at": "2021-07-12T14:14:29Z", "updated_at": "2024-08-24T16:05:05Z", "pushed_at": "2021-07-23T05:03:06Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2021-34527", "printnightmare", "python3", "security", "security-tools", "vulnerability", "windows" ], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 390263988, "name": "PrintNightmare", "full_name": "Tomparte\/PrintNightmare", "owner": { "login": "Tomparte", "id": 88080067, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88080067?v=4", "html_url": "https:\/\/github.com\/Tomparte", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Tomparte\/PrintNightmare", "description": "To fight against Windows security breach PrintNightmare! (CVE-2021-34527, CVE-2021-1675)", "fork": false, "created_at": "2021-07-28T07:55:42Z", "updated_at": "2023-08-01T13:42:52Z", "pushed_at": "2021-08-20T11:41:18Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "batch-script", "cve-2021-1675", "cve-2021-34527", "cve-2021-36958", "cve-2021-40447", "cybersecurity", "powershell-script", "print", "printnightmare", "security", "spooler", "to-do", "windows" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 437822133, "name": "CVE-2021-34527", "full_name": "Amaranese\/CVE-2021-34527", "owner": { "login": "Amaranese", "id": 32201849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32201849?v=4", "html_url": "https:\/\/github.com\/Amaranese", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Amaranese\/CVE-2021-34527", "description": null, "fork": false, "created_at": "2021-12-13T10:04:49Z", "updated_at": "2021-12-13T10:21:38Z", "pushed_at": "2021-12-13T10:21:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 2 }, { "id": 507019653, "name": "CVE-2021-34527", "full_name": "cyb3rpeace\/CVE-2021-34527", "owner": { "login": "cyb3rpeace", "id": 108078112, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108078112?v=4", "html_url": "https:\/\/github.com\/cyb3rpeace", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/cyb3rpeace\/CVE-2021-34527", "description": null, "fork": false, "created_at": "2022-06-24T13:25:25Z", "updated_at": "2024-03-06T16:11:56Z", "pushed_at": "2022-06-24T13:25:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 528150029, "name": "CVE-2021-34527", "full_name": "m8sec\/CVE-2021-34527", "owner": { "login": "m8sec", "id": 13889819, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13889819?v=4", "html_url": "https:\/\/github.com\/m8sec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/m8sec\/CVE-2021-34527", "description": "PrintNightmare (CVE-2021-34527) PoC Exploit", "fork": false, "created_at": "2022-08-23T20:20:45Z", "updated_at": "2024-11-21T14:55:56Z", "pushed_at": "2022-12-17T16:10:46Z", "stargazers_count": 107, "watchers_count": 107, "has_discussions": false, "forks_count": 19, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 19, "watchers": 107, "score": 0, "subscribers_count": 4 }, { "id": 533095208, "name": "cve-2021-34527", "full_name": "hackerhouse-opensource\/cve-2021-34527", "owner": { "login": "hackerhouse-opensource", "id": 43967630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43967630?v=4", "html_url": "https:\/\/github.com\/hackerhouse-opensource", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hackerhouse-opensource\/cve-2021-34527", "description": "CVE-2021-34527 AddPrinterDriverEx() Privilege Escalation", "fork": false, "created_at": "2022-09-05T23:48:44Z", "updated_at": "2024-12-26T12:55:56Z", "pushed_at": "2022-09-06T14:07:31Z", "stargazers_count": 21, "watchers_count": 21, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 21, "score": 0, "subscribers_count": 5 }, { "id": 680787340, "name": "CVE-2021-34527", "full_name": "d0rb\/CVE-2021-34527", "owner": { "login": "d0rb", "id": 10403781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4", "html_url": "https:\/\/github.com\/d0rb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/d0rb\/CVE-2021-34527", "description": "CVE-2021-34527 PrintNightmare PoC", "fork": false, "created_at": "2023-08-20T12:04:18Z", "updated_at": "2023-08-20T12:06:06Z", "pushed_at": "2023-08-20T12:18:10Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 711103414, "name": "detect_bruteforce", "full_name": "TieuLong21Prosper\/detect_bruteforce", "owner": { "login": "TieuLong21Prosper", "id": 128500598, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/128500598?v=4", "html_url": "https:\/\/github.com\/TieuLong21Prosper", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TieuLong21Prosper\/detect_bruteforce", "description": "detect bruteforce using for cve-2021-34527", "fork": false, "created_at": "2023-10-28T08:16:36Z", "updated_at": "2023-10-28T08:20:15Z", "pushed_at": "2023-10-28T08:20:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 819687370, "name": "CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "full_name": "Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "owner": { "login": "Hirusha-N", "id": 76760906, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76760906?v=4", "html_url": "https:\/\/github.com\/Hirusha-N", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Hirusha-N\/CVE-2021-34527-CVE-2023-38831-and-CVE-2023-32784", "description": null, "fork": false, "created_at": "2024-06-25T02:30:31Z", "updated_at": "2024-06-25T02:32:40Z", "pushed_at": "2024-06-25T02:32:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]