[ { "id": 10198831, "name": "nginx-1.4.0", "full_name": "danghvu\/nginx-1.4.0", "owner": { "login": "danghvu", "id": 1152714, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1152714?v=4", "html_url": "https:\/\/github.com\/danghvu", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/danghvu\/nginx-1.4.0", "description": "For the analysis of CVE-2013-2028", "fork": false, "created_at": "2013-05-21T15:20:05Z", "updated_at": "2024-08-12T19:11:50Z", "pushed_at": "2018-06-07T23:22:38Z", "stargazers_count": 30, "watchers_count": 30, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 30, "score": 0, "subscribers_count": 4 }, { "id": 54551843, "name": "nginxpwn", "full_name": "kitctf\/nginxpwn", "owner": { "login": "kitctf", "id": 8018062, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8018062?v=4", "html_url": "https:\/\/github.com\/kitctf", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kitctf\/nginxpwn", "description": "Exploitation Training -- CVE-2013-2028: Nginx Stack Based Buffer Overflow", "fork": false, "created_at": "2016-03-23T10:41:00Z", "updated_at": "2024-11-08T18:41:20Z", "pushed_at": "2016-03-23T12:05:38Z", "stargazers_count": 54, "watchers_count": 54, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 54, "score": 0, "subscribers_count": 6 }, { "id": 200347068, "name": "CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", "full_name": "tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", "owner": { "login": "tachibana51", "id": 29031994, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29031994?v=4", "html_url": "https:\/\/github.com\/tachibana51", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/tachibana51\/CVE-2013-2028-x64-bypass-ssp-and-pie-PoC", "description": "this is not stable", "fork": false, "created_at": "2019-08-03T07:38:18Z", "updated_at": "2019-10-26T18:48:26Z", "pushed_at": "2019-08-03T07:58:04Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 275396332, "name": "CVE-2013-2028-Exploit", "full_name": "m4drat\/CVE-2013-2028-Exploit", "owner": { "login": "m4drat", "id": 39669467, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39669467?v=4", "html_url": "https:\/\/github.com\/m4drat", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/m4drat\/CVE-2013-2028-Exploit", "description": "CVE-2013-2028 python exploit", "fork": false, "created_at": "2020-06-27T15:08:26Z", "updated_at": "2024-05-04T22:51:29Z", "pushed_at": "2020-06-27T15:08:58Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "exploit", "nginx", "pwn" ], "visibility": "public", "forks": 1, "watchers": 13, "score": 0, "subscribers_count": 2 }, { "id": 384198605, "name": "nginxhack", "full_name": "jptr218\/nginxhack", "owner": { "login": "jptr218", "id": 84092766, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84092766?v=4", "html_url": "https:\/\/github.com\/jptr218", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jptr218\/nginxhack", "description": "A CVE-2013-2028 implementation", "fork": false, "created_at": "2021-07-08T17:17:34Z", "updated_at": "2021-07-27T10:19:45Z", "pushed_at": "2021-07-27T10:19:42Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 524887947, "name": "CVE-2013-2028-reproduction", "full_name": "Sunqiz\/CVE-2013-2028-reproduction", "owner": { "login": "Sunqiz", "id": 59192636, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59192636?v=4", "html_url": "https:\/\/github.com\/Sunqiz", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sunqiz\/CVE-2013-2028-reproduction", "description": "CVE-2013-2028复现", "fork": false, "created_at": "2022-08-15T07:06:23Z", "updated_at": "2022-08-15T07:09:13Z", "pushed_at": "2022-08-15T07:09:08Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 832619909, "name": "CVE-2013-2028_Checker", "full_name": "xiw1ll\/CVE-2013-2028_Checker", "owner": { "login": "xiw1ll", "id": 69167284, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69167284?v=4", "html_url": "https:\/\/github.com\/xiw1ll", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xiw1ll\/CVE-2013-2028_Checker", "description": "Tool for checking Nginx CVE-2013-2028", "fork": false, "created_at": "2024-07-23T11:40:26Z", "updated_at": "2024-07-23T11:40:55Z", "pushed_at": "2024-07-23T11:40:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 } ]