[ { "id": 45006502, "name": "rtf_exploit_extractor", "full_name": "Cyberclues\/rtf_exploit_extractor", "owner": { "login": "Cyberclues", "id": 10933249, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10933249?v=4", "html_url": "https:\/\/github.com\/Cyberclues" }, "html_url": "https:\/\/github.com\/Cyberclues\/rtf_exploit_extractor", "description": "Script to extract malicious payload and decoy document from CVE-2015-1641 exploit documents", "fork": false, "created_at": "2015-10-27T00:23:36Z", "updated_at": "2022-01-15T18:46:11Z", "pushed_at": "2017-01-10T02:25:55Z", "stargazers_count": 23, "watchers_count": 23, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 23, "score": 0 } ]