[ { "id": 259298559, "name": "CVE-2017-7921-EXP", "full_name": "JrDw0\/CVE-2017-7921-EXP", "owner": { "login": "JrDw0", "id": 37445725, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37445725?v=4", "html_url": "https:\/\/github.com\/JrDw0" }, "html_url": "https:\/\/github.com\/JrDw0\/CVE-2017-7921-EXP", "description": "Hikvision camera CVE-2017-7921-EXP", "fork": false, "created_at": "2020-04-27T11:49:40Z", "updated_at": "2022-06-12T10:00:38Z", "pushed_at": "2020-08-09T15:35:16Z", "stargazers_count": 53, "watchers_count": 53, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 53, "score": 0 }, { "id": 312221274, "name": "CVE-2017-7921", "full_name": "BurnyMcDull\/CVE-2017-7921", "owner": { "login": "BurnyMcDull", "id": 20639723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20639723?v=4", "html_url": "https:\/\/github.com\/BurnyMcDull" }, "html_url": "https:\/\/github.com\/BurnyMcDull\/CVE-2017-7921", "description": "海康威视未授权访问检测poc及口令爆破", "fork": false, "created_at": "2020-11-12T09:02:10Z", "updated_at": "2022-06-11T17:44:11Z", "pushed_at": "2020-11-19T08:58:04Z", "stargazers_count": 32, "watchers_count": 32, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 32, "score": 0 }, { "id": 312471106, "name": "cve-2017-7921-golang", "full_name": "MisakaMikato\/cve-2017-7921-golang", "owner": { "login": "MisakaMikato", "id": 31957147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4", "html_url": "https:\/\/github.com\/MisakaMikato" }, "html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang", "description": "Hikvision IP camera access bypass exploit, developed by golang. ", "fork": false, "created_at": "2020-11-13T04:15:31Z", "updated_at": "2022-05-26T16:48:40Z", "pushed_at": "2021-01-11T05:52:22Z", "stargazers_count": 7, "watchers_count": 7, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 7, "score": 0 }, { "id": 334195499, "name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "full_name": "chrisjd20\/hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "owner": { "login": "chrisjd20", "id": 11812223, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11812223?v=4", "html_url": "https:\/\/github.com\/chrisjd20" }, "html_url": "https:\/\/github.com\/chrisjd20\/hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.", "fork": false, "created_at": "2021-01-29T16:08:35Z", "updated_at": "2022-06-07T01:27:07Z", "pushed_at": "2021-01-29T16:22:39Z", "stargazers_count": 30, "watchers_count": 30, "forks_count": 11, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 30, "score": 0 } ]