[ { "id": 822546559, "name": "cve-2024-6387-poc", "full_name": "zgzhang\/cve-2024-6387-poc", "owner": { "login": "zgzhang", "id": 11416832, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416832?v=4", "html_url": "https:\/\/github.com\/zgzhang", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zgzhang\/cve-2024-6387-poc", "description": "a signal handler race condition in OpenSSH's server (sshd)", "fork": false, "created_at": "2024-07-01T10:55:29Z", "updated_at": "2025-01-07T04:25:05Z", "pushed_at": "2024-07-01T10:54:02Z", "stargazers_count": 473, "watchers_count": 473, "has_discussions": false, "forks_count": 183, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 183, "watchers": 473, "score": 0, "subscribers_count": 5 }, { "id": 822579775, "name": "cve-2024-6387-poc", "full_name": "acrono\/cve-2024-6387-poc", "owner": { "login": "acrono", "id": 51956758, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51956758?v=4", "html_url": "https:\/\/github.com\/acrono", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/acrono\/cve-2024-6387-poc", "description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:16:21Z", "updated_at": "2025-01-09T19:13:36Z", "pushed_at": "2024-07-01T12:25:01Z", "stargazers_count": 378, "watchers_count": 378, "has_discussions": false, "forks_count": 90, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 90, "watchers": 378, "score": 0, "subscribers_count": 8 }, { "id": 822584501, "name": "cve-2024-6387-poc", "full_name": "lflare\/cve-2024-6387-poc", "owner": { "login": "lflare", "id": 22326991, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22326991?v=4", "html_url": "https:\/\/github.com\/lflare", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lflare\/cve-2024-6387-poc", "description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T12:26:40Z", "updated_at": "2025-01-02T12:21:22Z", "pushed_at": "2024-07-25T04:23:11Z", "stargazers_count": 111, "watchers_count": 111, "has_discussions": false, "forks_count": 40, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387", "openssh", "poc", "rce", "regresshion", "ssh" ], "visibility": "public", "forks": 40, "watchers": 111, "score": 0, "subscribers_count": 4 }, { "id": 822593995, "name": "cve-2024-6387-poc", "full_name": "shyrwall\/cve-2024-6387-poc", "owner": { "login": "shyrwall", "id": 1523968, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1523968?v=4", "html_url": "https:\/\/github.com\/shyrwall", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shyrwall\/cve-2024-6387-poc", "description": null, "fork": false, "created_at": "2024-07-01T12:48:36Z", "updated_at": "2024-07-01T12:50:32Z", "pushed_at": "2024-07-01T12:50:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822595195, "name": "CVE-2024-6387-PoC", "full_name": "getdrive\/CVE-2024-6387-PoC", "owner": { "login": "getdrive", "id": 20697688, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4", "html_url": "https:\/\/github.com\/getdrive", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/getdrive\/CVE-2024-6387-PoC", "description": "PoC RCE in OpenSSH", "fork": false, "created_at": "2024-07-01T12:51:18Z", "updated_at": "2024-12-08T12:41:06Z", "pushed_at": "2024-07-01T13:34:47Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 22, "score": 0, "subscribers_count": 1 }, { "id": 822620870, "name": "CVE-2024-6387-POC", "full_name": "FerasAlrimali\/CVE-2024-6387-POC", "owner": { "login": "FerasAlrimali", "id": 51955818, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51955818?v=4", "html_url": "https:\/\/github.com\/FerasAlrimali", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/FerasAlrimali\/CVE-2024-6387-POC", "description": "SSHd cve-2024-6387-poc", "fork": false, "created_at": "2024-07-01T13:38:47Z", "updated_at": "2024-07-01T13:42:18Z", "pushed_at": "2024-07-01T13:42:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822634085, "name": "cve-2024-6387-poc", "full_name": "passwa11\/cve-2024-6387-poc", "owner": { "login": "passwa11", "id": 112363374, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4", "html_url": "https:\/\/github.com\/passwa11", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/passwa11\/cve-2024-6387-poc", "description": null, "fork": false, "created_at": "2024-07-01T14:08:23Z", "updated_at": "2024-07-27T19:01:18Z", "pushed_at": "2024-07-01T14:10:08Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 822746375, "name": "CVE-2024-6387", "full_name": "jack0we\/CVE-2024-6387", "owner": { "login": "jack0we", "id": 150005594, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150005594?v=4", "html_url": "https:\/\/github.com\/jack0we", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jack0we\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-01T18:28:25Z", "updated_at": "2024-07-01T18:32:44Z", "pushed_at": "2024-07-01T18:32:41Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822788426, "name": "CVE-2024-6387_Check", "full_name": "xaitax\/CVE-2024-6387_Check", "owner": { "login": "xaitax", "id": 5014849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4", "html_url": "https:\/\/github.com\/xaitax", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xaitax\/CVE-2024-6387_Check", "description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-01T20:33:20Z", "updated_at": "2025-01-13T14:14:28Z", "pushed_at": "2024-09-24T19:18:56Z", "stargazers_count": 464, "watchers_count": 464, "has_discussions": false, "forks_count": 91, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387", "exploit", "pentesting", "python3", "redteam" ], "visibility": "public", "forks": 91, "watchers": 464, "score": 0, "subscribers_count": 7 }, { "id": 822792125, "name": "CVE-2024-6387", "full_name": "bigb0x\/CVE-2024-6387", "owner": { "login": "bigb0x", "id": 13532434, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4", "html_url": "https:\/\/github.com\/bigb0x", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387", "description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.", "fork": false, "created_at": "2024-07-01T20:45:53Z", "updated_at": "2025-01-03T10:25:53Z", "pushed_at": "2024-07-06T10:47:30Z", "stargazers_count": 27, "watchers_count": 27, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "openssh", "security-audit", "security-tools", "ssh", "ssh-server" ], "visibility": "public", "forks": 6, "watchers": 27, "score": 0, "subscribers_count": 1 }, { "id": 822824673, "name": "regresshion-check", "full_name": "wiggels\/regresshion-check", "owner": { "login": "wiggels", "id": 16748278, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16748278?v=4", "html_url": "https:\/\/github.com\/wiggels", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/wiggels\/regresshion-check", "description": "CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387", "fork": false, "created_at": "2024-07-01T22:53:32Z", "updated_at": "2024-08-01T17:34:14Z", "pushed_at": "2024-07-16T20:25:52Z", "stargazers_count": 6, "watchers_count": 6, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 6, "score": 0, "subscribers_count": 1 }, { "id": 822856797, "name": "CVE-2024-6387", "full_name": "3yujw7njai\/CVE-2024-6387", "owner": { "login": "3yujw7njai", "id": 7390055, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4", "html_url": "https:\/\/github.com\/3yujw7njai", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-6387", "description": "SSH RCE PoC CVE-2024-6387", "fork": false, "created_at": "2024-07-02T01:08:05Z", "updated_at": "2024-12-08T12:40:56Z", "pushed_at": "2024-07-02T01:13:22Z", "stargazers_count": 4, "watchers_count": 4, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 4, "score": 0, "subscribers_count": 2 }, { "id": 822860717, "name": "OpenSSH-Vulnerability-test", "full_name": "betancour\/OpenSSH-Vulnerability-test", "owner": { "login": "betancour", "id": 283403, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/283403?v=4", "html_url": "https:\/\/github.com\/betancour", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/betancour\/OpenSSH-Vulnerability-test", "description": "OpenSSH CVE-2024-6387 Vulnerability Checker", "fork": false, "created_at": "2024-07-02T01:24:04Z", "updated_at": "2024-12-24T09:30:51Z", "pushed_at": "2024-07-02T01:31:11Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 822879505, "name": "CVE-2024-6387fixshell", "full_name": "muyuanlove\/CVE-2024-6387fixshell", "owner": { "login": "muyuanlove", "id": 41590587, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41590587?v=4", "html_url": "https:\/\/github.com\/muyuanlove", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/muyuanlove\/CVE-2024-6387fixshell", "description": null, "fork": false, "created_at": "2024-07-02T02:35:24Z", "updated_at": "2024-07-02T06:18:19Z", "pushed_at": "2024-07-02T02:39:40Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 822883843, "name": "CVE-2024-6387", "full_name": "TAM-K592\/CVE-2024-6387", "owner": { "login": "TAM-K592", "id": 8276702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4", "html_url": "https:\/\/github.com\/TAM-K592", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-6387", "description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.", "fork": false, "created_at": "2024-07-02T02:51:37Z", "updated_at": "2024-12-28T05:47:38Z", "pushed_at": "2024-07-02T03:23:00Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 10, "score": 0, "subscribers_count": 1 }, { "id": 822884531, "name": "regreSSHion", "full_name": "teamos-hub\/regreSSHion", "owner": { "login": "teamos-hub", "id": 172880130, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172880130?v=4", "html_url": "https:\/\/github.com\/teamos-hub", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/teamos-hub\/regreSSHion", "description": "This is a POC I wrote for CVE-2024-6387", "fork": false, "created_at": "2024-07-02T02:54:05Z", "updated_at": "2024-07-02T13:12:58Z", "pushed_at": "2024-07-02T02:48:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 822897220, "name": "CVE-2024-6387", "full_name": "ahlfors\/CVE-2024-6387", "owner": { "login": "ahlfors", "id": 1074291, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1074291?v=4", "html_url": "https:\/\/github.com\/ahlfors", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ahlfors\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-02T03:42:35Z", "updated_at": "2024-07-10T08:04:08Z", "pushed_at": "2024-07-02T09:57:35Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 822898666, "name": "CVE-2024-6387-checkher", "full_name": "Mufti22\/CVE-2024-6387-checkher", "owner": { "login": "Mufti22", "id": 75854478, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4", "html_url": "https:\/\/github.com\/Mufti22", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-6387-checkher", "description": null, "fork": false, "created_at": "2024-07-02T03:48:37Z", "updated_at": "2024-07-02T03:49:10Z", "pushed_at": "2024-07-02T03:49:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822903933, "name": "CVE-2024-6387-exploit", "full_name": "thegenetic\/CVE-2024-6387-exploit", "owner": { "login": "thegenetic", "id": 57350740, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57350740?v=4", "html_url": "https:\/\/github.com\/thegenetic", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/thegenetic\/CVE-2024-6387-exploit", "description": "CVE-2024-6387 exploit", "fork": false, "created_at": "2024-07-02T04:09:44Z", "updated_at": "2024-09-24T00:12:11Z", "pushed_at": "2024-07-02T04:45:15Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 5, "watchers": 13, "score": 0, "subscribers_count": 1 }, { "id": 822953002, "name": "CVE-2024-6387", "full_name": "R4Tw1z\/CVE-2024-6387", "owner": { "login": "R4Tw1z", "id": 150011273, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011273?v=4", "html_url": "https:\/\/github.com\/R4Tw1z", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/R4Tw1z\/CVE-2024-6387", "description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.", "fork": false, "created_at": "2024-07-02T06:40:09Z", "updated_at": "2024-07-05T10:15:26Z", "pushed_at": "2024-07-02T09:01:55Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 822958334, "name": "CVE-2024-6387", "full_name": "d0rb\/CVE-2024-6387", "owner": { "login": "d0rb", "id": 10403781, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4", "html_url": "https:\/\/github.com\/d0rb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/d0rb\/CVE-2024-6387", "description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.", "fork": false, "created_at": "2024-07-02T06:53:35Z", "updated_at": "2025-01-05T15:46:06Z", "pushed_at": "2024-07-04T20:04:30Z", "stargazers_count": 35, "watchers_count": 35, "has_discussions": false, "forks_count": 11, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 11, "watchers": 35, "score": 0, "subscribers_count": 1 }, { "id": 822978721, "name": "regression-scanner", "full_name": "CiderAndWhisky\/regression-scanner", "owner": { "login": "CiderAndWhisky", "id": 30117084, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30117084?v=4", "html_url": "https:\/\/github.com\/CiderAndWhisky", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CiderAndWhisky\/regression-scanner", "description": "Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https:\/\/github.com\/bigb0x\/CVE-2024-6387 using ChatGPT to translate the code to PHP.", "fork": false, "created_at": "2024-07-02T07:42:46Z", "updated_at": "2024-07-02T09:06:07Z", "pushed_at": "2024-07-02T09:06:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 822991113, "name": "CVE-2024-6387_PoC", "full_name": "shamo0\/CVE-2024-6387_PoC", "owner": { "login": "shamo0", "id": 48299520, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4", "html_url": "https:\/\/github.com\/shamo0", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/shamo0\/CVE-2024-6387_PoC", "description": "Script for checking CVE-2024-6387 (regreSSHion)", "fork": false, "created_at": "2024-07-02T08:13:23Z", "updated_at": "2024-07-02T10:00:56Z", "pushed_at": "2024-07-02T08:40:31Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "checker", "cve-2024-6387", "exploit", "openssh", "poc", "rce", "regresshion", "ssh", "vulnerability" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 822993766, "name": "CVE-2024-6387-nmap", "full_name": "paradessia\/CVE-2024-6387-nmap", "owner": { "login": "paradessia", "id": 38862216, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38862216?v=4", "html_url": "https:\/\/github.com\/paradessia", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/paradessia\/CVE-2024-6387-nmap", "description": "CVE-2024-6387-nmap", "fork": false, "created_at": "2024-07-02T08:19:55Z", "updated_at": "2024-07-31T06:59:27Z", "pushed_at": "2024-07-02T08:26:46Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 823030467, "name": "CVE-2024-6387", "full_name": "SecWithMoh\/CVE-2024-6387", "owner": { "login": "SecWithMoh", "id": 92855054, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92855054?v=4", "html_url": "https:\/\/github.com\/SecWithMoh", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SecWithMoh\/CVE-2024-6387", "description": "This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability.", "fork": false, "created_at": "2024-07-02T09:41:40Z", "updated_at": "2024-07-16T07:51:21Z", "pushed_at": "2024-07-02T10:05:02Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 823031972, "name": "CVE-2024-6387-Updated-x64bit", "full_name": "PrincipalAnthony\/CVE-2024-6387-Updated-x64bit", "owner": { "login": "PrincipalAnthony", "id": 174432334, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174432334?v=4", "html_url": "https:\/\/github.com\/PrincipalAnthony", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/PrincipalAnthony\/CVE-2024-6387-Updated-x64bit", "description": "Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in", "fork": false, "created_at": "2024-07-02T09:45:04Z", "updated_at": "2024-07-02T15:52:27Z", "pushed_at": "2024-07-02T09:46:08Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 823040737, "name": "CVE-2024-6387-POC", "full_name": "skyalliance\/CVE-2024-6387-POC", "owner": { "login": "skyalliance", "id": 127739423, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4", "html_url": "https:\/\/github.com\/skyalliance", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/skyalliance\/CVE-2024-6387-POC", "description": null, "fork": false, "created_at": "2024-07-02T10:05:43Z", "updated_at": "2024-07-02T13:24:40Z", "pushed_at": "2024-07-02T13:24:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823053102, "name": "CVE-2024-6387-Mitigation-Ansible-Playbook", "full_name": "daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook", "owner": { "login": "daniel-odrinski", "id": 22768251, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22768251?v=4", "html_url": "https:\/\/github.com\/daniel-odrinski", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook", "description": "An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version.", "fork": false, "created_at": "2024-07-02T10:34:17Z", "updated_at": "2024-07-02T11:05:58Z", "pushed_at": "2024-07-02T11:05:55Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823065840, "name": "openssh-cve-2024-6387.sh", "full_name": "rumochnaya\/openssh-cve-2024-6387.sh", "owner": { "login": "rumochnaya", "id": 8115717, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8115717?v=4", "html_url": "https:\/\/github.com\/rumochnaya", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/rumochnaya\/openssh-cve-2024-6387.sh", "description": "openssh-cve-2024-6387.sh", "fork": false, "created_at": "2024-07-02T11:05:07Z", "updated_at": "2024-07-04T11:27:01Z", "pushed_at": "2024-07-02T11:23:35Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 823067387, "name": "CVE-2024-6387-Mitigation", "full_name": "zenzue\/CVE-2024-6387-Mitigation", "owner": { "login": "zenzue", "id": 19271340, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4", "html_url": "https:\/\/github.com\/zenzue", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zenzue\/CVE-2024-6387-Mitigation", "description": "Mitigation Guide for CVE-2024-6387 in OpenSSH", "fork": false, "created_at": "2024-07-02T11:08:40Z", "updated_at": "2024-07-02T11:17:15Z", "pushed_at": "2024-07-02T11:17:12Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823086763, "name": "CVE-2024-6387-Check", "full_name": "devarshishimpi\/CVE-2024-6387-Check", "owner": { "login": "devarshishimpi", "id": 43378923, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43378923?v=4", "html_url": "https:\/\/github.com\/devarshishimpi", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/devarshishimpi\/CVE-2024-6387-Check", "description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.", "fork": false, "created_at": "2024-07-02T11:55:39Z", "updated_at": "2025-01-05T23:59:18Z", "pushed_at": "2024-07-08T20:39:03Z", "stargazers_count": 13, "watchers_count": 13, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "bash", "cve-2024-6387", "cve-2024-6387-checker", "devarshishimpi", "openssh", "openssh-client", "openssh-server", "openssh-sftp-server", "regresshion", "ssh", "vulnerability-detection", "vulnerability-scanners" ], "visibility": "public", "forks": 3, "watchers": 13, "score": 0, "subscribers_count": 2 }, { "id": 823099379, "name": "cve-2024-6387_AImade", "full_name": "hssmo\/cve-2024-6387_AImade", "owner": { "login": "hssmo", "id": 99412060, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99412060?v=4", "html_url": "https:\/\/github.com\/hssmo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/hssmo\/cve-2024-6387_AImade", "description": "cve-2024-6387_AImade", "fork": false, "created_at": "2024-07-02T12:24:25Z", "updated_at": "2024-07-02T12:34:36Z", "pushed_at": "2024-07-02T12:34:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823109994, "name": "checker-CVE-2024-6387", "full_name": "ACHUX21\/checker-CVE-2024-6387", "owner": { "login": "ACHUX21", "id": 130113878, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130113878?v=4", "html_url": "https:\/\/github.com\/ACHUX21", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ACHUX21\/checker-CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-02T12:48:27Z", "updated_at": "2024-07-19T10:54:54Z", "pushed_at": "2024-07-02T13:18:38Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 823118069, "name": "ssh_exploiter_CVE-2024-6387", "full_name": "AiGptCode\/ssh_exploiter_CVE-2024-6387", "owner": { "login": "AiGptCode", "id": 146197697, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4", "html_url": "https:\/\/github.com\/AiGptCode", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/AiGptCode\/ssh_exploiter_CVE-2024-6387", "description": "CVE-2024-6387 with auto ip scanner and auto expliot ", "fork": false, "created_at": "2024-07-02T12:57:35Z", "updated_at": "2025-01-09T16:45:26Z", "pushed_at": "2024-07-04T01:55:26Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "android", "cve", "cve-2024-6387", "exploit", "ftp", "hack", "hacktoberfest", "kali", "kali-linux", "linux", "openssh", "python", "python3", "root", "shell", "ssh", "windows" ], "visibility": "public", "forks": 3, "watchers": 11, "score": 0, "subscribers_count": 1 }, { "id": 823151186, "name": "regreSSHion-nmap-scanner", "full_name": "xristos8574\/regreSSHion-nmap-scanner", "owner": { "login": "xristos8574", "id": 48923762, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48923762?v=4", "html_url": "https:\/\/github.com\/xristos8574", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xristos8574\/regreSSHion-nmap-scanner", "description": "A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387", "fork": false, "created_at": "2024-07-02T13:50:47Z", "updated_at": "2024-07-02T13:52:27Z", "pushed_at": "2024-07-02T13:52:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823184811, "name": "regreSSHion", "full_name": "xonoxitron\/regreSSHion", "owner": { "login": "xonoxitron", "id": 7057784, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4", "html_url": "https:\/\/github.com\/xonoxitron", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion", "description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-02T14:41:43Z", "updated_at": "2025-01-13T03:23:03Z", "pushed_at": "2024-07-02T15:16:04Z", "stargazers_count": 33, "watchers_count": 33, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "c", "cve-2024-6387", "exploit", "glibc", "linux", "openssh", "poc", "regresshion", "sshd" ], "visibility": "public", "forks": 8, "watchers": 33, "score": 0, "subscribers_count": 2 }, { "id": 823199757, "name": "CVE-2024-6387", "full_name": "no-one-sec\/CVE-2024-6387", "owner": { "login": "no-one-sec", "id": 118190089, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118190089?v=4", "html_url": "https:\/\/github.com\/no-one-sec", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/no-one-sec\/CVE-2024-6387", "description": "开箱即用的AK47", "fork": false, "created_at": "2024-07-02T15:13:09Z", "updated_at": "2024-07-02T15:14:52Z", "pushed_at": "2024-07-02T15:13:09Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823199952, "name": "CVE-2024-6387", "full_name": "dawnl3ss\/CVE-2024-6387", "owner": { "login": "dawnl3ss", "id": 52249849, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4", "html_url": "https:\/\/github.com\/dawnl3ss", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-02T15:13:33Z", "updated_at": "2024-07-02T15:14:40Z", "pushed_at": "2024-07-02T15:14:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823236084, "name": "CVE-2024-6387-Exploit-POC", "full_name": "MrR0b0t19\/CVE-2024-6387-Exploit-POC", "owner": { "login": "MrR0b0t19", "id": 63489501, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4", "html_url": "https:\/\/github.com\/MrR0b0t19", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2024-6387-Exploit-POC", "description": null, "fork": false, "created_at": "2024-07-02T16:34:12Z", "updated_at": "2024-07-14T06:25:24Z", "pushed_at": "2024-07-02T16:38:33Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 823250035, "name": "CVE-2024-6387", "full_name": "th3gokul\/CVE-2024-6387", "owner": { "login": "th3gokul", "id": 89386101, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4", "html_url": "https:\/\/github.com\/th3gokul", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-6387", "description": "CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server", "fork": false, "created_at": "2024-07-02T17:04:52Z", "updated_at": "2024-10-20T09:56:28Z", "pushed_at": "2024-07-02T17:47:29Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 823284825, "name": "Test_CVE-2024-6387", "full_name": "n1cks0n\/Test_CVE-2024-6387", "owner": { "login": "n1cks0n", "id": 100887222, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100887222?v=4", "html_url": "https:\/\/github.com\/n1cks0n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/n1cks0n\/Test_CVE-2024-6387", "description": "Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH", "fork": false, "created_at": "2024-07-02T18:30:28Z", "updated_at": "2024-07-02T18:31:58Z", "pushed_at": "2024-07-02T18:31:41Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 823285710, "name": "CVE-2024-6387", "full_name": "l0n3m4n\/CVE-2024-6387", "owner": { "login": "l0n3m4n", "id": 143868630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4", "html_url": "https:\/\/github.com\/l0n3m4n", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-6387", "description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ", "fork": false, "created_at": "2024-07-02T18:32:46Z", "updated_at": "2025-01-08T11:36:17Z", "pushed_at": "2024-07-05T15:19:28Z", "stargazers_count": 75, "watchers_count": 75, "has_discussions": false, "forks_count": 30, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-6387", "exploit", "openssh-server", "payload", "poc", "python3", "rce" ], "visibility": "public", "forks": 30, "watchers": 75, "score": 0, "subscribers_count": 3 }, { "id": 823291064, "name": "CVE-2024-6387-Checker", "full_name": "RickGeex\/CVE-2024-6387-Checker", "owner": { "login": "RickGeex", "id": 7975904, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7975904?v=4", "html_url": "https:\/\/github.com\/RickGeex", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/RickGeex\/CVE-2024-6387-Checker", "description": "CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.", "fork": false, "created_at": "2024-07-02T18:46:24Z", "updated_at": "2024-07-02T20:32:50Z", "pushed_at": "2024-07-02T20:32:48Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823296113, "name": "regreSSHion-checker", "full_name": "xonoxitron\/regreSSHion-checker", "owner": { "login": "xonoxitron", "id": 7057784, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4", "html_url": "https:\/\/github.com\/xonoxitron", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion-checker", "description": "Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387).", "fork": false, "created_at": "2024-07-02T18:59:54Z", "updated_at": "2024-11-20T01:42:09Z", "pushed_at": "2024-07-02T19:06:01Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387", "glibc", "golang", "linux", "openssh", "regresshion", "sshd" ], "visibility": "public", "forks": 3, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 823323116, "name": "cve-2024-6387-nuclei-template", "full_name": "BrandonLynch2402\/cve-2024-6387-nuclei-template", "owner": { "login": "BrandonLynch2402", "id": 19439875, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19439875?v=4", "html_url": "https:\/\/github.com\/BrandonLynch2402", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/BrandonLynch2402\/cve-2024-6387-nuclei-template", "description": null, "fork": false, "created_at": "2024-07-02T20:19:12Z", "updated_at": "2024-07-31T06:59:36Z", "pushed_at": "2024-07-02T20:28:35Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 823328220, "name": "CVE-2024-6387_Check", "full_name": "edsonjt81\/CVE-2024-6387_Check", "owner": { "login": "edsonjt81", "id": 27496739, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4", "html_url": "https:\/\/github.com\/edsonjt81", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/edsonjt81\/CVE-2024-6387_Check", "description": null, "fork": false, "created_at": "2024-07-02T20:35:53Z", "updated_at": "2024-07-02T20:38:08Z", "pushed_at": "2024-07-02T20:38:06Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823340268, "name": "CVE-2024-6387", "full_name": "grupooruss\/CVE-2024-6387", "owner": { "login": "grupooruss", "id": 43943489, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4", "html_url": "https:\/\/github.com\/grupooruss", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387", "description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script", "fork": false, "created_at": "2024-07-02T21:16:45Z", "updated_at": "2024-07-08T23:58:50Z", "pushed_at": "2024-07-02T21:30:12Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 823349523, "name": "CVE-2024-6387-Checker", "full_name": "CognisysGroup\/CVE-2024-6387-Checker", "owner": { "login": "CognisysGroup", "id": 101755095, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101755095?v=4", "html_url": "https:\/\/github.com\/CognisysGroup", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/CognisysGroup\/CVE-2024-6387-Checker", "description": null, "fork": false, "created_at": "2024-07-02T21:47:02Z", "updated_at": "2024-07-03T12:15:46Z", "pushed_at": "2024-07-03T12:13:37Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823487291, "name": "CVE-2024-6387", "full_name": "sxlmnwb\/CVE-2024-6387", "owner": { "login": "sxlmnwb", "id": 65052912, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65052912?v=4", "html_url": "https:\/\/github.com\/sxlmnwb", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sxlmnwb\/CVE-2024-6387", "description": "Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.", "fork": false, "created_at": "2024-07-03T06:08:32Z", "updated_at": "2024-12-05T20:11:29Z", "pushed_at": "2024-07-03T06:47:46Z", "stargazers_count": 11, "watchers_count": 11, "has_discussions": false, "forks_count": 6, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387" ], "visibility": "public", "forks": 6, "watchers": 11, "score": 0, "subscribers_count": 1 }, { "id": 823542110, "name": "CVE-2024-6387", "full_name": "Symbolexe\/CVE-2024-6387", "owner": { "login": "Symbolexe", "id": 140549630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140549630?v=4", "html_url": "https:\/\/github.com\/Symbolexe", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Symbolexe\/CVE-2024-6387", "description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems", "fork": false, "created_at": "2024-07-03T08:22:57Z", "updated_at": "2024-08-20T21:05:45Z", "pushed_at": "2024-07-04T15:07:21Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 5, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-6387", "exploit", "pentesting", "python3", "redteam" ], "visibility": "public", "forks": 5, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 823593765, "name": "sentinelssh", "full_name": "harshinsecurity\/sentinelssh", "owner": { "login": "harshinsecurity", "id": 51978908, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51978908?v=4", "html_url": "https:\/\/github.com\/harshinsecurity", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/harshinsecurity\/sentinelssh", "description": "SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.", "fork": false, "created_at": "2024-07-03T10:26:23Z", "updated_at": "2024-09-07T05:01:32Z", "pushed_at": "2024-07-08T07:32:32Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2024-6387", "exploit", "openssh", "ssh" ], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 823665546, "name": "cve-2024-6387-poc", "full_name": "t3rry327\/cve-2024-6387-poc", "owner": { "login": "t3rry327", "id": 65151897, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65151897?v=4", "html_url": "https:\/\/github.com\/t3rry327", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/t3rry327\/cve-2024-6387-poc", "description": null, "fork": false, "created_at": "2024-07-03T13:21:10Z", "updated_at": "2024-07-03T13:25:02Z", "pushed_at": "2024-07-03T13:24:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823735743, "name": "CVE-2024-6387_poc", "full_name": "jocker2410\/CVE-2024-6387_poc", "owner": { "login": "jocker2410", "id": 22291909, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22291909?v=4", "html_url": "https:\/\/github.com\/jocker2410", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/jocker2410\/CVE-2024-6387_poc", "description": null, "fork": false, "created_at": "2024-07-03T15:51:16Z", "updated_at": "2024-08-04T10:50:56Z", "pushed_at": "2024-08-04T10:50:53Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823899223, "name": "sshd-logingracetime0", "full_name": "liqhtnd\/sshd-logingracetime0", "owner": { "login": "liqhtnd", "id": 88907425, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88907425?v=4", "html_url": "https:\/\/github.com\/liqhtnd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime0", "description": "Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.", "fork": false, "created_at": "2024-07-04T01:02:34Z", "updated_at": "2024-07-13T18:45:36Z", "pushed_at": "2024-07-13T18:43:04Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823939765, "name": "ssh-CVE-2024-6387-poc", "full_name": "JackSparrowhk\/ssh-CVE-2024-6387-poc", "owner": { "login": "JackSparrowhk", "id": 108756180, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108756180?v=4", "html_url": "https:\/\/github.com\/JackSparrowhk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/JackSparrowhk\/ssh-CVE-2024-6387-poc", "description": "CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器,专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。", "fork": false, "created_at": "2024-07-04T03:51:16Z", "updated_at": "2024-07-04T03:51:16Z", "pushed_at": "2024-07-04T03:51:16Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 823940931, "name": "CVE-2024-6387-OpenSSH-Vulnerability-Checker", "full_name": "turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker", "owner": { "login": "turbobit", "id": 11604783, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11604783?v=4", "html_url": "https:\/\/github.com\/turbobit", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker", "description": "Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.", "fork": false, "created_at": "2024-07-04T03:56:08Z", "updated_at": "2024-07-07T21:11:55Z", "pushed_at": "2024-07-04T05:13:49Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387-checker" ], "visibility": "public", "forks": 1, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 823979710, "name": "CVE-2024-6387", "full_name": "sms2056\/CVE-2024-6387", "owner": { "login": "sms2056", "id": 15358350, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15358350?v=4", "html_url": "https:\/\/github.com\/sms2056", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sms2056\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-04T06:10:56Z", "updated_at": "2024-07-04T06:16:22Z", "pushed_at": "2024-07-04T06:16:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824151224, "name": "regreSSHion-CVE-2024-6387-", "full_name": "invaderslabs\/regreSSHion-CVE-2024-6387-", "owner": { "login": "invaderslabs", "id": 149894888, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149894888?v=4", "html_url": "https:\/\/github.com\/invaderslabs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/invaderslabs\/regreSSHion-CVE-2024-6387-", "description": "Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387", "fork": false, "created_at": "2024-07-04T13:15:54Z", "updated_at": "2024-07-04T22:22:18Z", "pushed_at": "2024-07-04T22:22:15Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824156825, "name": "CVE-2024-6387", "full_name": "lala-amber\/CVE-2024-6387", "owner": { "login": "lala-amber", "id": 72958716, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72958716?v=4", "html_url": "https:\/\/github.com\/lala-amber", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/lala-amber\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-04T13:28:53Z", "updated_at": "2024-10-07T12:21:51Z", "pushed_at": "2024-07-04T13:35:57Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 824185491, "name": "regreSSHive", "full_name": "4lxprime\/regreSSHive", "owner": { "login": "4lxprime", "id": 58915711, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58915711?v=4", "html_url": "https:\/\/github.com\/4lxprime", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/4lxprime\/regreSSHive", "description": "rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)", "fork": false, "created_at": "2024-07-04T14:34:21Z", "updated_at": "2024-07-04T15:27:03Z", "pushed_at": "2024-07-04T14:34:23Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 3, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "6387", "c", "cve", "cve-2024-6387", "exploit", "poc", "regresshion", "ssh", "sshd" ], "visibility": "public", "forks": 3, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824318880, "name": "CVE-2024-6387_Check", "full_name": "sardine-web\/CVE-2024-6387_Check", "owner": { "login": "sardine-web", "id": 80635620, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", "html_url": "https:\/\/github.com\/sardine-web", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check", "description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.", "fork": false, "created_at": "2024-07-04T21:20:26Z", "updated_at": "2024-07-05T10:10:03Z", "pushed_at": "2024-07-04T21:31:17Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824382817, "name": "cve-2024-6387_hassh", "full_name": "0x4D31\/cve-2024-6387_hassh", "owner": { "login": "0x4D31", "id": 11577776, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11577776?v=4", "html_url": "https:\/\/github.com\/0x4D31", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/0x4D31\/cve-2024-6387_hassh", "description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).", "fork": false, "created_at": "2024-07-05T02:46:57Z", "updated_at": "2024-09-27T09:29:35Z", "pushed_at": "2024-07-05T03:40:53Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387", "fingerprint", "hassh", "regresshion", "ssh" ], "visibility": "public", "forks": 1, "watchers": 8, "score": 0, "subscribers_count": 1 }, { "id": 824544385, "name": "CVE-2024-6387-template", "full_name": "sardine-web\/CVE-2024-6387-template", "owner": { "login": "sardine-web", "id": 80635620, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4", "html_url": "https:\/\/github.com\/sardine-web", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387-template", "description": "Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387", "fork": false, "created_at": "2024-07-05T11:05:26Z", "updated_at": "2024-07-06T17:26:24Z", "pushed_at": "2024-07-06T17:26:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824549009, "name": "CVE-2024-6387", "full_name": "imv7\/CVE-2024-6387", "owner": { "login": "imv7", "id": 13357603, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13357603?v=4", "html_url": "https:\/\/github.com\/imv7", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/imv7\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-05T11:18:38Z", "updated_at": "2024-07-05T11:19:24Z", "pushed_at": "2024-07-05T11:19:21Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824639761, "name": "CVE-2024-6387-Finder", "full_name": "SiberianHacker\/CVE-2024-6387-Finder", "owner": { "login": "SiberianHacker", "id": 115571334, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115571334?v=4", "html_url": "https:\/\/github.com\/SiberianHacker", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/SiberianHacker\/CVE-2024-6387-Finder", "description": "CVE-2024-6387 SSH finder", "fork": false, "created_at": "2024-07-05T15:15:41Z", "updated_at": "2024-07-05T15:22:29Z", "pushed_at": "2024-07-05T15:22:25Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 824752906, "name": "CVE-2024-6387-how-to-fix", "full_name": "azurejoga\/CVE-2024-6387-how-to-fix", "owner": { "login": "azurejoga", "id": 91762249, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91762249?v=4", "html_url": "https:\/\/github.com\/azurejoga", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/azurejoga\/CVE-2024-6387-how-to-fix", "description": "Vulnerability remediation and mitigationCVE-2024-6387", "fork": false, "created_at": "2024-07-05T21:29:11Z", "updated_at": "2024-08-12T14:40:39Z", "pushed_at": "2024-07-05T21:47:44Z", "stargazers_count": 5, "watchers_count": 5, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 5, "score": 0, "subscribers_count": 1 }, { "id": 825724862, "name": "CVE-2024-6387", "full_name": "asterictnl-lvdw\/CVE-2024-6387", "owner": { "login": "asterictnl-lvdw", "id": 99249102, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99249102?v=4", "html_url": "https:\/\/github.com\/asterictnl-lvdw", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/asterictnl-lvdw\/CVE-2024-6387", "description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)", "fork": false, "created_at": "2024-07-08T11:27:49Z", "updated_at": "2025-01-13T14:30:19Z", "pushed_at": "2024-08-22T08:50:25Z", "stargazers_count": 74, "watchers_count": 74, "has_discussions": false, "forks_count": 31, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 31, "watchers": 74, "score": 0, "subscribers_count": 3 }, { "id": 825734560, "name": "regreSSHion", "full_name": "vkaushik-chef\/regreSSHion", "owner": { "login": "vkaushik-chef", "id": 91254377, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91254377?v=4", "html_url": "https:\/\/github.com\/vkaushik-chef", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/vkaushik-chef\/regreSSHion", "description": "Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387", "fork": false, "created_at": "2024-07-08T11:48:15Z", "updated_at": "2024-07-08T12:04:36Z", "pushed_at": "2024-07-08T12:04:33Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 826287983, "name": "mitigate-CVE-2024-6387", "full_name": "dgourillon\/mitigate-CVE-2024-6387", "owner": { "login": "dgourillon", "id": 50948886, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50948886?v=4", "html_url": "https:\/\/github.com\/dgourillon", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dgourillon\/mitigate-CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-09T12:16:44Z", "updated_at": "2024-07-09T16:03:07Z", "pushed_at": "2024-07-09T16:03:03Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 826336009, "name": "CVE-2024-6387", "full_name": "mrmtwoj\/CVE-2024-6387", "owner": { "login": "mrmtwoj", "id": 22832463, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4", "html_url": "https:\/\/github.com\/mrmtwoj", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-6387", "description": "regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitation. ", "fork": false, "created_at": "2024-07-09T14:06:02Z", "updated_at": "2024-10-07T04:02:49Z", "pushed_at": "2024-07-09T14:29:30Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2024-6387", "cve-2024-6387-checker", "openssh", "openssh-key", "poc", "regresshion-cve-2024-6387-ssh-security" ], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 826432240, "name": "CVE-2024-6387-Vulnerability-Checker", "full_name": "filipi86\/CVE-2024-6387-Vulnerability-Checker", "owner": { "login": "filipi86", "id": 31785433, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31785433?v=4", "html_url": "https:\/\/github.com\/filipi86", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/filipi86\/CVE-2024-6387-Vulnerability-Checker", "description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.", "fork": false, "created_at": "2024-07-09T17:40:19Z", "updated_at": "2024-10-23T02:21:38Z", "pushed_at": "2024-07-10T15:24:08Z", "stargazers_count": 92, "watchers_count": 92, "has_discussions": false, "forks_count": 17, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 17, "watchers": 92, "score": 0, "subscribers_count": 2 }, { "id": 826508816, "name": "CVE-2024-6387-Vulnerability-Checker", "full_name": "kubota\/CVE-2024-6387-Vulnerability-Checker", "owner": { "login": "kubota", "id": 119277, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4", "html_url": "https:\/\/github.com\/kubota", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/kubota\/CVE-2024-6387-Vulnerability-Checker", "description": "This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability", "fork": false, "created_at": "2024-07-09T21:01:15Z", "updated_at": "2024-07-11T05:46:45Z", "pushed_at": "2024-07-09T21:08:19Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 826836993, "name": "cve-2024-6387-poc", "full_name": "DimaMend\/cve-2024-6387-poc", "owner": { "login": "DimaMend", "id": 145161091, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145161091?v=4", "html_url": "https:\/\/github.com\/DimaMend", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/DimaMend\/cve-2024-6387-poc", "description": null, "fork": false, "created_at": "2024-07-10T13:27:23Z", "updated_at": "2024-07-10T13:33:54Z", "pushed_at": "2024-07-10T13:33:50Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 2 }, { "id": 827444140, "name": "mitigate_ssh", "full_name": "Sibijo\/mitigate_ssh", "owner": { "login": "Sibijo", "id": 148327357, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148327357?v=4", "html_url": "https:\/\/github.com\/Sibijo", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Sibijo\/mitigate_ssh", "description": " OpenSSH vulnerability CVE-2024-6387", "fork": false, "created_at": "2024-07-11T16:54:41Z", "updated_at": "2024-07-29T17:48:05Z", "pushed_at": "2024-07-11T16:55:52Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 827570389, "name": "regreSSHion-Fix", "full_name": "Passyed\/regreSSHion-Fix", "owner": { "login": "Passyed", "id": 102136066, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136066?v=4", "html_url": "https:\/\/github.com\/Passyed", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/Passyed\/regreSSHion-Fix", "description": "Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian", "fork": false, "created_at": "2024-07-11T23:22:14Z", "updated_at": "2024-07-12T00:07:02Z", "pushed_at": "2024-07-12T00:06:59Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 828627988, "name": "CVE-2024-6387", "full_name": "dream434\/CVE-2024-6387", "owner": { "login": "dream434", "id": 114837630, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4", "html_url": "https:\/\/github.com\/dream434", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/dream434\/CVE-2024-6387", "description": " OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire", "fork": false, "created_at": "2024-07-14T18:00:49Z", "updated_at": "2024-07-14T18:05:22Z", "pushed_at": "2024-07-14T18:02:26Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 829031934, "name": "CVE-2024-6387", "full_name": "ThatNotEasy\/CVE-2024-6387", "owner": { "login": "ThatNotEasy", "id": 25004320, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4", "html_url": "https:\/\/github.com\/ThatNotEasy", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-6387", "description": "OpenSSH RCE Massive Vulnerable Scanner", "fork": false, "created_at": "2024-07-15T16:04:57Z", "updated_at": "2024-10-30T04:42:06Z", "pushed_at": "2024-07-15T16:06:41Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 833415966, "name": "CVE-2024-6387", "full_name": "prelearn-code\/CVE-2024-6387", "owner": { "login": "prelearn-code", "id": 175189722, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175189722?v=4", "html_url": "https:\/\/github.com\/prelearn-code", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/prelearn-code\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-07-25T02:32:19Z", "updated_at": "2024-08-06T14:08:36Z", "pushed_at": "2024-07-25T02:37:55Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 835582804, "name": "CVE-2024-6387", "full_name": "l-urk\/CVE-2024-6387", "owner": { "login": "l-urk", "id": 112792604, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112792604?v=4", "html_url": "https:\/\/github.com\/l-urk", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/l-urk\/CVE-2024-6387", "description": "Proof of concept python script for regreSSHion exploit. ", "fork": false, "created_at": "2024-07-30T06:13:11Z", "updated_at": "2024-11-20T12:28:26Z", "pushed_at": "2024-10-19T04:58:22Z", "stargazers_count": 8, "watchers_count": 8, "has_discussions": true, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 2, "watchers": 8, "score": 0, "subscribers_count": 2 }, { "id": 836283983, "name": "ssh_poc2024", "full_name": "alex14324\/ssh_poc2024", "owner": { "login": "alex14324", "id": 36421715, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36421715?v=4", "html_url": "https:\/\/github.com\/alex14324", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/alex14324\/ssh_poc2024", "description": "An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server ", "fork": false, "created_at": "2024-07-31T14:19:19Z", "updated_at": "2024-07-31T14:20:46Z", "pushed_at": "2024-07-31T14:19:44Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 838725789, "name": "CVE-2023-4596-OpenSSH-Multi-Checker", "full_name": "X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker", "owner": { "login": "X-Projetion", "id": 161194427, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4", "html_url": "https:\/\/github.com\/X-Projetion", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker", "description": "CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems.", "fork": false, "created_at": "2024-08-06T08:12:48Z", "updated_at": "2024-08-10T11:17:27Z", "pushed_at": "2024-08-06T08:27:32Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 }, { "id": 844630300, "name": "CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH", "full_name": "s1d6point7bugcrowd\/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH", "owner": { "login": "s1d6point7bugcrowd", "id": 163605035, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163605035?v=4", "html_url": "https:\/\/github.com\/s1d6point7bugcrowd", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/s1d6point7bugcrowd\/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH", "description": null, "fork": false, "created_at": "2024-08-19T16:45:53Z", "updated_at": "2024-08-19T16:47:17Z", "pushed_at": "2024-08-19T16:47:14Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 844959580, "name": "OpenSSH-CVE-2024-6387-Fix", "full_name": "almogopp\/OpenSSH-CVE-2024-6387-Fix", "owner": { "login": "almogopp", "id": 37026702, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37026702?v=4", "html_url": "https:\/\/github.com\/almogopp", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/almogopp\/OpenSSH-CVE-2024-6387-Fix", "description": "A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems against potential remote code execution risks associated with affected OpenSSH versions.", "fork": false, "created_at": "2024-08-20T09:57:24Z", "updated_at": "2024-08-20T09:58:35Z", "pushed_at": "2024-08-20T09:58:32Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 847548583, "name": "CVE-2024-6387_Check", "full_name": "HadesNull123\/CVE-2024-6387_Check", "owner": { "login": "HadesNull123", "id": 56301165, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56301165?v=4", "html_url": "https:\/\/github.com\/HadesNull123", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/HadesNull123\/CVE-2024-6387_Check", "description": "RCE OpenSSH CVE-2024-6387 Check and Exploit", "fork": false, "created_at": "2024-08-26T04:40:27Z", "updated_at": "2024-08-26T04:41:05Z", "pushed_at": "2024-08-26T04:41:02Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 1, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 848825194, "name": "CVE-2024-6387-Vulnerability-Checker", "full_name": "identity-threat-labs\/CVE-2024-6387-Vulnerability-Checker", "owner": { "login": "identity-threat-labs", "id": 179711116, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179711116?v=4", "html_url": "https:\/\/github.com\/identity-threat-labs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/identity-threat-labs\/CVE-2024-6387-Vulnerability-Checker", "description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.", "fork": false, "created_at": "2024-08-28T13:28:08Z", "updated_at": "2024-10-31T05:34:32Z", "pushed_at": "2024-08-29T14:52:33Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 0 }, { "id": 849418620, "name": "Article-RegreSSHion-CVE-2024-6387", "full_name": "identity-threat-labs\/Article-RegreSSHion-CVE-2024-6387", "owner": { "login": "identity-threat-labs", "id": 179711116, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179711116?v=4", "html_url": "https:\/\/github.com\/identity-threat-labs", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/identity-threat-labs\/Article-RegreSSHion-CVE-2024-6387", "description": "In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named \"regreSSHion,\" this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems.", "fork": false, "created_at": "2024-08-29T15:00:56Z", "updated_at": "2024-09-04T16:27:20Z", "pushed_at": "2024-08-29T15:06:16Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 0 }, { "id": 876504709, "name": "CVE-2024-6387-poc-1", "full_name": "anhvutuan\/CVE-2024-6387-poc-1", "owner": { "login": "anhvutuan", "id": 74167929, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74167929?v=4", "html_url": "https:\/\/github.com\/anhvutuan", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/anhvutuan\/CVE-2024-6387-poc-1", "description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.", "fork": false, "created_at": "2024-10-22T04:50:10Z", "updated_at": "2024-10-22T04:50:10Z", "pushed_at": "2024-07-11T14:59:20Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 0 }, { "id": 893527608, "name": "CVE-2024-6387", "full_name": "YassDEV221608\/CVE-2024-6387", "owner": { "login": "YassDEV221608", "id": 145906163, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4", "html_url": "https:\/\/github.com\/YassDEV221608", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-11-24T17:12:26Z", "updated_at": "2024-11-24T17:14:33Z", "pushed_at": "2024-11-24T17:14:29Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 905536150, "name": "CVE-2024-6387", "full_name": "zql-gif\/CVE-2024-6387", "owner": { "login": "zql-gif", "id": 84617316, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84617316?v=4", "html_url": "https:\/\/github.com\/zql-gif", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/zql-gif\/CVE-2024-6387", "description": null, "fork": false, "created_at": "2024-12-19T03:08:19Z", "updated_at": "2024-12-19T06:49:55Z", "pushed_at": "2024-12-19T06:49:52Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 905684125, "name": "test_for6387", "full_name": "awusan125\/test_for6387", "owner": { "login": "awusan125", "id": 74240688, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74240688?v=4", "html_url": "https:\/\/github.com\/awusan125", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/awusan125\/test_for6387", "description": "test code for cve-2024-6387", "fork": false, "created_at": "2024-12-19T10:16:45Z", "updated_at": "2024-12-22T08:24:49Z", "pushed_at": "2024-12-22T08:24:46Z", "stargazers_count": 3, "watchers_count": 3, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 3, "score": 0, "subscribers_count": 1 }, { "id": 911826074, "name": "CVE-2024-6387_PoC", "full_name": "YassDEV221608\/CVE-2024-6387_PoC", "owner": { "login": "YassDEV221608", "id": 145906163, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4", "html_url": "https:\/\/github.com\/YassDEV221608", "user_view_type": "public" }, "html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387_PoC", "description": null, "fork": false, "created_at": "2025-01-04T00:25:33Z", "updated_at": "2025-01-12T03:13:35Z", "pushed_at": "2025-01-04T00:37:14Z", "stargazers_count": 10, "watchers_count": 10, "has_discussions": false, "forks_count": 8, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 8, "watchers": 10, "score": 0, "subscribers_count": 1 } ]