[ { "id": 703062371, "name": "CVE-2023-44487", "full_name": "bcdannyboy\/CVE-2023-44487", "owner": { "login": "bcdannyboy", "id": 12553297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", "html_url": "https:\/\/github.com\/bcdannyboy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487", "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "fork": false, "created_at": "2023-10-10T14:20:42Z", "updated_at": "2025-01-16T07:38:47Z", "pushed_at": "2024-01-08T11:12:08Z", "stargazers_count": 226, "watchers_count": 226, "has_discussions": false, "forks_count": 48, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 48, "watchers": 226, "score": 0, "subscribers_count": 6 }, { "id": 703303512, "name": "CVE-2023-44487", "full_name": "imabee101\/CVE-2023-44487", "owner": { "login": "imabee101", "id": 29169122, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4", "html_url": "https:\/\/github.com\/imabee101", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487", "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", "updated_at": "2025-01-17T07:24:59Z", "pushed_at": "2023-10-13T11:19:10Z", "stargazers_count": 53, "watchers_count": 53, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2023-44487", "ddos", "dos", "dos-attack", "poc", "proof-of-concept" ], "visibility": "public", "forks": 16, "watchers": 53, "score": 0, "subscribers_count": 2 }, { "id": 703845749, "name": "CVE-2023-44487", "full_name": "ByteHackr\/CVE-2023-44487", "owner": { "login": "ByteHackr", "id": 30409831, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4", "html_url": "https:\/\/github.com\/ByteHackr", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487", "description": "Test Script for CVE-2023-44487", "fork": false, "created_at": "2023-10-12T03:14:34Z", "updated_at": "2023-10-12T03:30:38Z", "pushed_at": "2023-10-12T03:30:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 703914770, "name": "rapidreset", "full_name": "pabloec20\/rapidreset", "owner": { "login": "pabloec20", "id": 24191742, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4", "html_url": "https:\/\/github.com\/pabloec20", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/pabloec20\/rapidreset", "description": "CVE-2023-44487", "fork": false, "created_at": "2023-10-12T07:06:42Z", "updated_at": "2024-06-27T16:58:23Z", "pushed_at": "2023-10-12T07:11:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 704732969, "name": "rapidresetclient", "full_name": "secengjeff\/rapidresetclient", "owner": { "login": "secengjeff", "id": 146767590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4", "html_url": "https:\/\/github.com\/secengjeff", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient", "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", "updated_at": "2025-01-26T07:39:19Z", "pushed_at": "2023-10-30T20:22:37Z", "stargazers_count": 65, "watchers_count": 65, "has_discussions": false, "forks_count": 16, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 16, "watchers": 65, "score": 0, "subscribers_count": 4 }, { "id": 705614213, "name": "CVE-2023-44487", "full_name": "studiogangster\/CVE-2023-44487", "owner": { "login": "studiogangster", "id": 12793420, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4", "html_url": "https:\/\/github.com\/studiogangster", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487", "description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)", "fork": false, "created_at": "2023-10-16T11:07:50Z", "updated_at": "2024-08-11T14:52:28Z", "pushed_at": "2023-10-16T12:32:50Z", "stargazers_count": 16, "watchers_count": 16, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-44487", "cybersecurity", "exploit", "http2", "rapid", "rapid-reset", "reset", "security", "zero-day" ], "visibility": "public", "forks": 3, "watchers": 16, "score": 0, "subscribers_count": 1 }, { "id": 709722803, "name": "golang-CVE-2023-44487", "full_name": "ReToCode\/golang-CVE-2023-44487", "owner": { "login": "ReToCode", "id": 16611466, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4", "html_url": "https:\/\/github.com\/ReToCode", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487", "description": null, "fork": false, "created_at": "2023-10-25T09:11:46Z", "updated_at": "2024-09-26T01:42:32Z", "pushed_at": "2023-10-26T15:01:38Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 2 }, { "id": 716296930, "name": "http2-rst-stream-attacker", "full_name": "ndrscodes\/http2-rst-stream-attacker", "owner": { "login": "ndrscodes", "id": 62462135, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62462135?v=4", "html_url": "https:\/\/github.com\/ndrscodes", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ndrscodes\/http2-rst-stream-attacker", "description": "Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses.", "fork": false, "created_at": "2023-11-08T20:56:22Z", "updated_at": "2024-09-11T05:27:59Z", "pushed_at": "2024-01-11T17:44:09Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-44487", "go", "golang", "http2", "it-security", "itsec", "itsecurity", "research", "vulnerabilities", "vulnerability" ], "visibility": "public", "forks": 2, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 716960166, "name": "cve-2023-44487", "full_name": "nxenon\/cve-2023-44487", "owner": { "login": "nxenon", "id": 61124903, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61124903?v=4", "html_url": "https:\/\/github.com\/nxenon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/nxenon\/cve-2023-44487", "description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept", "fork": false, "created_at": "2023-11-10T08:38:51Z", "updated_at": "2024-12-07T10:49:09Z", "pushed_at": "2023-11-10T08:39:14Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-44487", "ddos", "dos", "http2", "rapid-reset", "rapid-reset-attack" ], "visibility": "public", "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 723118471, "name": "HTTP-2-Rapid-Reset-Client", "full_name": "terrorist\/HTTP-2-Rapid-Reset-Client", "owner": { "login": "terrorist", "id": 108696846, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108696846?v=4", "html_url": "https:\/\/github.com\/terrorist", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/terrorist\/HTTP-2-Rapid-Reset-Client", "description": "A tool to check how well a system can handle Rapid Reset DDoS attacks (CVE-2023-44487).", "fork": false, "created_at": "2023-11-24T18:26:36Z", "updated_at": "2024-09-02T12:43:28Z", "pushed_at": "2023-11-24T20:19:44Z", "stargazers_count": 48, "watchers_count": 48, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 48, "score": 0, "subscribers_count": 0 }, { "id": 730433558, "name": "CVE-2023-44487-", "full_name": "sigridou\/CVE-2023-44487-", "owner": { "login": "sigridou", "id": 101998818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101998818?v=4", "html_url": "https:\/\/github.com\/sigridou", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sigridou\/CVE-2023-44487-", "description": null, "fork": false, "created_at": "2023-12-11T23:12:03Z", "updated_at": "2023-12-11T23:13:25Z", "pushed_at": "2023-12-11T23:19:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 790095472, "name": "cve-2023-44487", "full_name": "TYuan0816\/cve-2023-44487", "owner": { "login": "TYuan0816", "id": 91544853, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91544853?v=4", "html_url": "https:\/\/github.com\/TYuan0816", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TYuan0816\/cve-2023-44487", "description": null, "fork": false, "created_at": "2024-04-22T08:56:39Z", "updated_at": "2024-04-22T08:56:43Z", "pushed_at": "2024-04-22T08:56:39Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 806127239, "name": "CVE-2023-44487", "full_name": "sn130hk\/CVE-2023-44487", "owner": { "login": "sn130hk", "id": 166270187, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166270187?v=4", "html_url": "https:\/\/github.com\/sn130hk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sn130hk\/CVE-2023-44487", "description": null, "fork": false, "created_at": "2024-05-26T13:01:01Z", "updated_at": "2024-05-26T13:01:01Z", "pushed_at": "2024-05-26T13:01:01Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 897966381, "name": "CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC", "full_name": "threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC", "owner": { "login": "threatlabindonesia", "id": 89779121, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89779121?v=4", "html_url": "https:\/\/github.com\/threatlabindonesia", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC", "description": null, "fork": false, "created_at": "2024-12-03T14:54:21Z", "updated_at": "2024-12-03T15:04:52Z", "pushed_at": "2024-12-03T15:03:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 918591329, "name": "CVE-2023-44487", "full_name": "aulauniversal\/CVE-2023-44487", "owner": { "login": "aulauniversal", "id": 168633732, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168633732?v=4", "html_url": "https:\/\/github.com\/aulauniversal", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/aulauniversal\/CVE-2023-44487", "description": "RapidResetClient", "fork": false, "created_at": "2025-01-18T10:39:58Z", "updated_at": "2025-01-18T11:39:56Z", "pushed_at": "2025-01-18T11:39:54Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]