[
    {
        "id": 372590733,
        "name": "CVE-2021-28476",
        "full_name": "0vercl0k\/CVE-2021-28476",
        "owner": {
            "login": "0vercl0k",
            "id": 1476421,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
            "html_url": "https:\/\/github.com\/0vercl0k",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-28476",
        "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
        "fork": false,
        "created_at": "2021-05-31T18:02:39Z",
        "updated_at": "2024-10-26T16:47:30Z",
        "pushed_at": "2021-06-01T15:08:23Z",
        "stargazers_count": 218,
        "watchers_count": 218,
        "has_discussions": false,
        "forks_count": 37,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve-2021-28476",
            "guest-to-host",
            "hyper-v",
            "network-service-provider",
            "nvsp",
            "rndis",
            "vmswitch"
        ],
        "visibility": "public",
        "forks": 37,
        "watchers": 218,
        "score": 0,
        "subscribers_count": 4
    },
    {
        "id": 373204692,
        "name": "CVE-2021-28476",
        "full_name": "bluefrostsecurity\/CVE-2021-28476",
        "owner": {
            "login": "bluefrostsecurity",
            "id": 4976074,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4976074?v=4",
            "html_url": "https:\/\/github.com\/bluefrostsecurity",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/bluefrostsecurity\/CVE-2021-28476",
        "description": null,
        "fork": false,
        "created_at": "2021-06-02T14:50:56Z",
        "updated_at": "2024-11-30T08:01:38Z",
        "pushed_at": "2021-06-02T14:54:14Z",
        "stargazers_count": 10,
        "watchers_count": 10,
        "has_discussions": false,
        "forks_count": 3,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 3,
        "watchers": 10,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 396338187,
        "name": "CVE-2021-28476-tools-env",
        "full_name": "LaCeeKa\/CVE-2021-28476-tools-env",
        "owner": {
            "login": "LaCeeKa",
            "id": 88970302,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88970302?v=4",
            "html_url": "https:\/\/github.com\/LaCeeKa",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/LaCeeKa\/CVE-2021-28476-tools-env",
        "description": "tools for automate configure Ubuntu 20.04 enviroment for testing CVE-2021-28476.",
        "fork": false,
        "created_at": "2021-08-15T12:06:44Z",
        "updated_at": "2024-10-26T16:43:59Z",
        "pushed_at": "2021-08-15T11:44:02Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 0
    },
    {
        "id": 448441625,
        "name": "CVE-2021-28476",
        "full_name": "australeo\/CVE-2021-28476",
        "owner": {
            "login": "australeo",
            "id": 47684814,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47684814?v=4",
            "html_url": "https:\/\/github.com\/australeo",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/australeo\/CVE-2021-28476",
        "description": "CVE-2021-28476: Hyper-V vmswitch.sys arbitrary pointer dereference from guest VM",
        "fork": false,
        "created_at": "2022-01-16T02:45:26Z",
        "updated_at": "2024-12-26T13:58:06Z",
        "pushed_at": "2022-01-16T02:46:22Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 3,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 471563181,
        "name": "0vercl0k",
        "full_name": "2273852279qqs\/0vercl0k",
        "owner": {
            "login": "2273852279qqs",
            "id": 101910961,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101910961?v=4",
            "html_url": "https:\/\/github.com\/2273852279qqs",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/2273852279qqs\/0vercl0k",
        "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
        "fork": false,
        "created_at": "2022-03-19T01:33:04Z",
        "updated_at": "2022-03-19T01:33:04Z",
        "pushed_at": "2022-03-19T01:33:04Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 482583152,
        "name": "0vercl0k",
        "full_name": "dengyang123x\/0vercl0k",
        "owner": {
            "login": "dengyang123x",
            "id": 103896519,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/103896519?v=4",
            "html_url": "https:\/\/github.com\/dengyang123x",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/dengyang123x\/0vercl0k",
        "description": "PoC for CVE-2021-28476 a guest-to-host \"Hyper-V Remote Code Execution Vulnerability\" in vmswitch.sys.",
        "fork": false,
        "created_at": "2022-04-17T17:00:49Z",
        "updated_at": "2022-05-31T07:42:57Z",
        "pushed_at": "2022-04-17T17:00:50Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    }
]