[
    {
        "id": 116822376,
        "name": "RAU_crypto",
        "full_name": "bao7uo\/RAU_crypto",
        "owner": {
            "login": "bao7uo",
            "id": 21125224,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21125224?v=4",
            "html_url": "https:\/\/github.com\/bao7uo"
        },
        "html_url": "https:\/\/github.com\/bao7uo\/RAU_crypto",
        "description": "Telerik UI for ASP.NET AJAX File upload and .NET deserialisation exploit (CVE-2017-11317, CVE-2017-11357, CVE-2019-18935)",
        "fork": false,
        "created_at": "2018-01-09T13:53:57Z",
        "updated_at": "2024-04-01T11:16:11Z",
        "pushed_at": "2020-08-22T06:15:54Z",
        "stargazers_count": 164,
        "watchers_count": 164,
        "has_discussions": false,
        "forks_count": 47,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 47,
        "watchers": 164,
        "score": 0,
        "subscribers_count": 9
    },
    {
        "id": 550908047,
        "name": "Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut",
        "full_name": "KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut",
        "owner": {
            "login": "KasunPriyashan",
            "id": 97877907,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4",
            "html_url": "https:\/\/github.com\/KasunPriyashan"
        },
        "html_url": "https:\/\/github.com\/KasunPriyashan\/Unrestricted-File-Upload-by-Weak-Encryption-affected-versions-CVE-2017-11317-Remote-Code-Execut",
        "description": "Arbitrary code execution analysis based on Telerik-UI. This will be done so that the article can be read by others. The document provides an in-depth explanation of the various vectors involved with Telerik-UI for ASP.NET AJAX, as well as POST requests, the architecture of ASP.NET AJAX,",
        "fork": false,
        "created_at": "2022-10-13T14:19:12Z",
        "updated_at": "2022-10-13T14:19:12Z",
        "pushed_at": "2022-10-13T14:19:13Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 550909457,
        "name": "Telerik-UI-ASP.NET-AJAX-Exploitation",
        "full_name": "KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation",
        "owner": {
            "login": "KasunPriyashan",
            "id": 97877907,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/97877907?v=4",
            "html_url": "https:\/\/github.com\/KasunPriyashan"
        },
        "html_url": "https:\/\/github.com\/KasunPriyashan\/Telerik-UI-ASP.NET-AJAX-Exploitation",
        "description": "Unrestricted File Upload by Weak Encryption affected versions (CVE-2017-11317) 2. Remote Code Execution by Insecure Deserialization - (CVE-2019-18935)",
        "fork": false,
        "created_at": "2022-10-13T14:21:31Z",
        "updated_at": "2022-10-13T14:21:31Z",
        "pushed_at": "2022-10-13T14:22:09Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    }
]