[
    {
        "id": 391818469,
        "name": "CVE-2021-31630-OpenPLC_RCE",
        "full_name": "hev0x\/CVE-2021-31630-OpenPLC_RCE",
        "owner": {
            "login": "hev0x",
            "id": 6265911,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6265911?v=4",
            "html_url": "https:\/\/github.com\/hev0x"
        },
        "html_url": "https:\/\/github.com\/hev0x\/CVE-2021-31630-OpenPLC_RCE",
        "description": "Exploit for Authenticated Remote Code Execution on OpenPLC v3 Webserver",
        "fork": false,
        "created_at": "2021-08-02T04:48:24Z",
        "updated_at": "2024-08-12T20:15:12Z",
        "pushed_at": "2021-08-02T04:48:25Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 775165945,
        "name": "CVE-2021-31630-HTB",
        "full_name": "Hunt3r0x\/CVE-2021-31630-HTB",
        "owner": {
            "login": "Hunt3r0x",
            "id": 106396603,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/106396603?v=4",
            "html_url": "https:\/\/github.com\/Hunt3r0x"
        },
        "html_url": "https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB",
        "description": "proof of Concept (PoC) exploit for CVE-2021-31630, targeting the OpenPLC service running on the WifineticTwo box on the Hack The Box platform.",
        "fork": false,
        "created_at": "2024-03-20T22:02:53Z",
        "updated_at": "2024-07-21T09:16:48Z",
        "pushed_at": "2024-03-21T15:50:45Z",
        "stargazers_count": 8,
        "watchers_count": 8,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 8,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 779013491,
        "name": "cve-2021-31630",
        "full_name": "thewhiteh4t\/cve-2021-31630",
        "owner": {
            "login": "thewhiteh4t",
            "id": 36354846,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36354846?v=4",
            "html_url": "https:\/\/github.com\/thewhiteh4t"
        },
        "html_url": "https:\/\/github.com\/thewhiteh4t\/cve-2021-31630",
        "description": "Python script for exploiting command injection in Open PLC Webserver v3",
        "fork": false,
        "created_at": "2024-03-28T21:31:45Z",
        "updated_at": "2024-08-01T09:33:59Z",
        "pushed_at": "2024-07-12T00:16:13Z",
        "stargazers_count": 15,
        "watchers_count": 15,
        "has_discussions": false,
        "forks_count": 4,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve",
            "exploit",
            "openplc",
            "rce"
        ],
        "visibility": "public",
        "forks": 4,
        "watchers": 15,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 786978803,
        "name": "CVE-2021-31630",
        "full_name": "mind2hex\/CVE-2021-31630",
        "owner": {
            "login": "mind2hex",
            "id": 51345640,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51345640?v=4",
            "html_url": "https:\/\/github.com\/mind2hex"
        },
        "html_url": "https:\/\/github.com\/mind2hex\/CVE-2021-31630",
        "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
        "fork": false,
        "created_at": "2024-04-15T16:55:30Z",
        "updated_at": "2024-04-15T16:56:49Z",
        "pushed_at": "2024-04-15T17:07:01Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 800033894,
        "name": "CVE-2021-31630-PoC",
        "full_name": "sealldeveloper\/CVE-2021-31630-PoC",
        "owner": {
            "login": "sealldeveloper",
            "id": 120470330,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/120470330?v=4",
            "html_url": "https:\/\/github.com\/sealldeveloper"
        },
        "html_url": "https:\/\/github.com\/sealldeveloper\/CVE-2021-31630-PoC",
        "description": "A version of the PoC for CVE-2021-31630 from https:\/\/github.com\/Hunt3r0x\/CVE-2021-31630-HTB but without the political messages, because they are unneccessary.",
        "fork": false,
        "created_at": "2024-05-13T15:17:38Z",
        "updated_at": "2024-05-13T15:21:58Z",
        "pushed_at": "2024-05-13T15:21:54Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 810053844,
        "name": "CVE-2021-31630",
        "full_name": "junnythemarksman\/CVE-2021-31630",
        "owner": {
            "login": "junnythemarksman",
            "id": 20056452,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20056452?v=4",
            "html_url": "https:\/\/github.com\/junnythemarksman"
        },
        "html_url": "https:\/\/github.com\/junnythemarksman\/CVE-2021-31630",
        "description": "Modified the PoC CVE-2021-31630 script by Fellipe Oliveira for HTB ",
        "fork": false,
        "created_at": "2024-06-04T00:44:47Z",
        "updated_at": "2024-06-04T00:46:34Z",
        "pushed_at": "2024-06-04T00:46:31Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 818448931,
        "name": "cve-2021-31630",
        "full_name": "adibabdala123\/cve-2021-31630",
        "owner": {
            "login": "adibabdala123",
            "id": 76139191,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76139191?v=4",
            "html_url": "https:\/\/github.com\/adibabdala123"
        },
        "html_url": "https:\/\/github.com\/adibabdala123\/cve-2021-31630",
        "description": "This is a automation of cve-2021-31630 exploitation",
        "fork": false,
        "created_at": "2024-06-21T22:10:49Z",
        "updated_at": "2024-06-29T17:40:49Z",
        "pushed_at": "2024-06-29T17:40:46Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 833217533,
        "name": "CVE-2021-31630",
        "full_name": "manuelsantosiglesias\/CVE-2021-31630",
        "owner": {
            "login": "manuelsantosiglesias",
            "id": 29311335,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29311335?v=4",
            "html_url": "https:\/\/github.com\/manuelsantosiglesias"
        },
        "html_url": "https:\/\/github.com\/manuelsantosiglesias\/CVE-2021-31630",
        "description": "OpenPLC 3 WebServer Authenticated Remote Code Execution.",
        "fork": false,
        "created_at": "2024-07-24T15:28:47Z",
        "updated_at": "2024-07-24T16:22:41Z",
        "pushed_at": "2024-07-24T16:22:38Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 834167517,
        "name": "CVE-2021-31630",
        "full_name": "FlojBoj\/CVE-2021-31630",
        "owner": {
            "login": "FlojBoj",
            "id": 170850781,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/170850781?v=4",
            "html_url": "https:\/\/github.com\/FlojBoj"
        },
        "html_url": "https:\/\/github.com\/FlojBoj\/CVE-2021-31630",
        "description": "POC Exploit for CVE-2021-31630 written in Python3 and using C reverse shell with non-blocking mode",
        "fork": false,
        "created_at": "2024-07-26T15:06:44Z",
        "updated_at": "2024-07-27T14:33:18Z",
        "pushed_at": "2024-07-27T14:33:15Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    }
]