[ { "id": 66172446, "name": "mountain_goat", "full_name": "Gnoxter\/mountain_goat", "owner": { "login": "Gnoxter", "id": 974856, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/974856?v=4", "html_url": "https:\/\/github.com\/Gnoxter" }, "html_url": "https:\/\/github.com\/Gnoxter\/mountain_goat", "description": "A PoC demonstrating techniques exploiting CVE-2016-5696 Off-Path TCP Exploits: Global Rate Limit Considered Dangerous ", "fork": false, "created_at": "2016-08-20T23:28:41Z", "updated_at": "2021-05-16T11:51:47Z", "pushed_at": "2016-08-23T21:06:44Z", "stargazers_count": 41, "watchers_count": 41, "forks_count": 22, "forks": 22, "watchers": 41, "score": 0 }, { "id": 66173781, "name": "rover", "full_name": "violentshell\/rover", "owner": { "login": "violentshell", "id": 21149221, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21149221?v=4", "html_url": "https:\/\/github.com\/violentshell" }, "html_url": "https:\/\/github.com\/violentshell\/rover", "description": "Proof of Concept code for CVE-2016-5696", "fork": false, "created_at": "2016-08-21T00:17:20Z", "updated_at": "2020-12-01T03:07:29Z", "pushed_at": "2016-08-24T07:56:39Z", "stargazers_count": 101, "watchers_count": 101, "forks_count": 39, "forks": 39, "watchers": 101, "score": 0 }, { "id": 66317906, "name": "challack", "full_name": "jduck\/challack", "owner": { "login": "jduck", "id": 479840, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/479840?v=4", "html_url": "https:\/\/github.com\/jduck" }, "html_url": "https:\/\/github.com\/jduck\/challack", "description": "Proof-of-concept exploit code for CVE-2016-5696", "fork": false, "created_at": "2016-08-23T00:21:18Z", "updated_at": "2021-02-15T12:54:27Z", "pushed_at": "2016-08-30T06:32:43Z", "stargazers_count": 71, "watchers_count": 71, "forks_count": 33, "forks": 33, "watchers": 71, "score": 0 }, { "id": 66661635, "name": "chackd", "full_name": "bplinux\/chackd", "owner": { "login": "bplinux", "id": 16133169, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16133169?v=4", "html_url": "https:\/\/github.com\/bplinux" }, "html_url": "https:\/\/github.com\/bplinux\/chackd", "description": "Daemon to randomize tcp_challenge_ack_limit to prevent side channel attacks CVE-2016-5696", "fork": false, "created_at": "2016-08-26T16:11:03Z", "updated_at": "2020-10-18T04:17:12Z", "pushed_at": "2016-08-29T17:39:17Z", "stargazers_count": 2, "watchers_count": 2, "forks_count": 3, "forks": 3, "watchers": 2, "score": 0 }, { "id": 75864853, "name": "grill", "full_name": "nogoegst\/grill", "owner": { "login": "nogoegst", "id": 19829265, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19829265?v=4", "html_url": "https:\/\/github.com\/nogoegst" }, "html_url": "https:\/\/github.com\/nogoegst\/grill", "description": "global rate-limiting in Linux (CVE-2016-5696) scanner", "fork": false, "created_at": "2016-12-07T18:40:47Z", "updated_at": "2020-03-09T10:14:31Z", "pushed_at": "2017-04-27T10:51:33Z", "stargazers_count": 0, "watchers_count": 0, "forks_count": 0, "forks": 0, "watchers": 0, "score": 0 } ]