[
    {
        "id": 367930039,
        "name": "CVE-2021-31166",
        "full_name": "0vercl0k\/CVE-2021-31166",
        "owner": {
            "login": "0vercl0k",
            "id": 1476421,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1476421?v=4",
            "html_url": "https:\/\/github.com\/0vercl0k"
        },
        "html_url": "https:\/\/github.com\/0vercl0k\/CVE-2021-31166",
        "description": "Proof of concept for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely.",
        "fork": false,
        "created_at": "2021-05-16T16:15:56Z",
        "updated_at": "2022-03-02T14:57:55Z",
        "pushed_at": "2021-06-12T08:27:09Z",
        "stargazers_count": 810,
        "watchers_count": 810,
        "forks_count": 134,
        "allow_forking": true,
        "is_template": false,
        "topics": [
            "accept-encoding",
            "cve-2021-31166",
            "http",
            "ulpparsecontentcoding"
        ],
        "visibility": "public",
        "forks": 134,
        "watchers": 810,
        "score": 0
    },
    {
        "id": 368156601,
        "name": "CVE-2021-31166",
        "full_name": "zha0gongz1\/CVE-2021-31166",
        "owner": {
            "login": "zha0gongz1",
            "id": 41460798,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41460798?v=4",
            "html_url": "https:\/\/github.com\/zha0gongz1"
        },
        "html_url": "https:\/\/github.com\/zha0gongz1\/CVE-2021-31166",
        "description": "PoC for CVE-2021-31166, a remote HTTP.sys use-after-free triggered remotely. Although it was defined as remote command execution, it can only cause the system to crash.",
        "fork": false,
        "created_at": "2021-05-17T11:12:45Z",
        "updated_at": "2022-02-22T01:47:50Z",
        "pushed_at": "2021-05-17T11:30:26Z",
        "stargazers_count": 8,
        "watchers_count": 8,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [
            "accept-encoding",
            "cve-2021-31166",
            "rce"
        ],
        "visibility": "public",
        "forks": 1,
        "watchers": 8,
        "score": 0
    },
    {
        "id": 368306577,
        "name": "CVE-2021-31166-detection-rules",
        "full_name": "mvlnetdev\/CVE-2021-31166-detection-rules",
        "owner": {
            "login": "mvlnetdev",
            "id": 41307333,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41307333?v=4",
            "html_url": "https:\/\/github.com\/mvlnetdev"
        },
        "html_url": "https:\/\/github.com\/mvlnetdev\/CVE-2021-31166-detection-rules",
        "description": "Different rules to detect if CVE-2021-31166 is being exploited",
        "fork": false,
        "created_at": "2021-05-17T19:55:41Z",
        "updated_at": "2022-02-26T12:52:41Z",
        "pushed_at": "2022-02-26T12:52:37Z",
        "stargazers_count": 4,
        "watchers_count": 4,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 4,
        "score": 0
    },
    {
        "id": 368350830,
        "name": "CVE-2021-31166",
        "full_name": "corelight\/CVE-2021-31166",
        "owner": {
            "login": "corelight",
            "id": 21672558,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21672558?v=4",
            "html_url": "https:\/\/github.com\/corelight"
        },
        "html_url": "https:\/\/github.com\/corelight\/CVE-2021-31166",
        "description": "HTTP Protocol Stack CVE-2021-31166",
        "fork": false,
        "created_at": "2021-05-17T23:54:12Z",
        "updated_at": "2021-10-24T07:14:11Z",
        "pushed_at": "2021-05-28T00:41:52Z",
        "stargazers_count": 15,
        "watchers_count": 15,
        "forks_count": 5,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 5,
        "watchers": 15,
        "score": 0
    },
    {
        "id": 368786720,
        "name": "CVE-2021-31166",
        "full_name": "zecopro\/CVE-2021-31166",
        "owner": {
            "login": "zecopro",
            "id": 23106986,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23106986?v=4",
            "html_url": "https:\/\/github.com\/zecopro"
        },
        "html_url": "https:\/\/github.com\/zecopro\/CVE-2021-31166",
        "description": "simple bash script for exploit CVE-2021-31166",
        "fork": false,
        "created_at": "2021-05-19T07:50:40Z",
        "updated_at": "2021-10-11T02:23:12Z",
        "pushed_at": "2021-05-19T08:18:56Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 370131263,
        "name": "WIn-CVE-2021-31166",
        "full_name": "bgsilvait\/WIn-CVE-2021-31166",
        "owner": {
            "login": "bgsilvait",
            "id": 38823062,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38823062?v=4",
            "html_url": "https:\/\/github.com\/bgsilvait"
        },
        "html_url": "https:\/\/github.com\/bgsilvait\/WIn-CVE-2021-31166",
        "description": null,
        "fork": false,
        "created_at": "2021-05-23T18:41:48Z",
        "updated_at": "2021-05-23T19:32:43Z",
        "pushed_at": "2021-05-23T19:32:41Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 370268982,
        "name": "CVE-2021-31166",
        "full_name": "Udyz\/CVE-2021-31166",
        "owner": {
            "login": "Udyz",
            "id": 39673284,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
            "html_url": "https:\/\/github.com\/Udyz"
        },
        "html_url": "https:\/\/github.com\/Udyz\/CVE-2021-31166",
        "description": "http.sys remote UAF to Leak Credential",
        "fork": false,
        "created_at": "2021-05-24T07:42:18Z",
        "updated_at": "2021-09-13T21:22:31Z",
        "pushed_at": "2021-05-25T04:03:31Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 410758909,
        "name": "CVE-2021-31166",
        "full_name": "antx-code\/CVE-2021-31166",
        "owner": {
            "login": "antx-code",
            "id": 7877940,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
            "html_url": "https:\/\/github.com\/antx-code"
        },
        "html_url": "https:\/\/github.com\/antx-code\/CVE-2021-31166",
        "description": "Windows HTTP协议栈远程代码执行漏洞 CVE-2021-31166",
        "fork": false,
        "created_at": "2021-09-27T05:56:45Z",
        "updated_at": "2022-02-15T04:18:47Z",
        "pushed_at": "2021-11-04T02:23:11Z",
        "stargazers_count": 16,
        "watchers_count": 16,
        "forks_count": 7,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 7,
        "watchers": 16,
        "score": 0
    },
    {
        "id": 419230261,
        "name": "CVE-2021-31166-exploit",
        "full_name": "ConMiko\/CVE-2021-31166-exploit",
        "owner": {
            "login": "ConMiko",
            "id": 92157170,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92157170?v=4",
            "html_url": "https:\/\/github.com\/ConMiko"
        },
        "html_url": "https:\/\/github.com\/ConMiko\/CVE-2021-31166-exploit",
        "description": "Just a simple CVE-2021-31166 exploit tool",
        "fork": false,
        "created_at": "2021-10-20T07:37:46Z",
        "updated_at": "2021-10-20T10:00:18Z",
        "pushed_at": "2021-10-20T07:50:52Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 467221883,
        "name": "CVE-2021-31166",
        "full_name": "mauricelambert\/CVE-2021-31166",
        "owner": {
            "login": "mauricelambert",
            "id": 50479118,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50479118?v=4",
            "html_url": "https:\/\/github.com\/mauricelambert"
        },
        "html_url": "https:\/\/github.com\/mauricelambert\/CVE-2021-31166",
        "description": "CVE-2022-21907: exploitation with Powershell, Python, Ruby, NMAP and Metasploit.",
        "fork": false,
        "created_at": "2022-03-07T18:56:52Z",
        "updated_at": "2022-03-08T13:20:20Z",
        "pushed_at": "2022-03-07T19:47:48Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "topics": [
            "bluescreen",
            "crash",
            "cve",
            "cve-2021-31166",
            "denial-of-service",
            "dos",
            "exploit",
            "iis",
            "metasploit",
            "microsoft",
            "nmap",
            "payload",
            "powershell",
            "python3",
            "ruby",
            "vulnerability",
            "webserver"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0
    }
]