[
    {
        "id": 138456315,
        "name": "WinboxPoC",
        "full_name": "BasuCert\/WinboxPoC",
        "owner": {
            "login": "BasuCert",
            "id": 29852431,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29852431?v=4",
            "html_url": "https:\/\/github.com\/BasuCert"
        },
        "html_url": "https:\/\/github.com\/BasuCert\/WinboxPoC",
        "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847)",
        "fork": false,
        "created_at": "2018-06-24T05:34:05Z",
        "updated_at": "2021-09-21T21:27:45Z",
        "pushed_at": "2020-10-16T12:09:45Z",
        "stargazers_count": 443,
        "watchers_count": 443,
        "forks_count": 426,
        "allow_forking": true,
        "forks": 426,
        "watchers": 443,
        "score": 0
    },
    {
        "id": 148370201,
        "name": "WinboxExploit",
        "full_name": "msterusky\/WinboxExploit",
        "owner": {
            "login": "msterusky",
            "id": 29436829,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29436829?v=4",
            "html_url": "https:\/\/github.com\/msterusky"
        },
        "html_url": "https:\/\/github.com\/msterusky\/WinboxExploit",
        "description": "C# implementation of BasuCert\/WinboxPoC [Winbox Critical Vulnerability (CVE-2018-14847)]",
        "fork": false,
        "created_at": "2018-09-11T19:36:49Z",
        "updated_at": "2021-03-13T16:56:42Z",
        "pushed_at": "2018-09-11T20:12:25Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "forks_count": 3,
        "allow_forking": true,
        "forks": 3,
        "watchers": 5,
        "score": 0
    },
    {
        "id": 152906288,
        "name": "MikroRoot",
        "full_name": "syrex1013\/MikroRoot",
        "owner": {
            "login": "syrex1013",
            "id": 31669127,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31669127?v=4",
            "html_url": "https:\/\/github.com\/syrex1013"
        },
        "html_url": "https:\/\/github.com\/syrex1013\/MikroRoot",
        "description": "Automated version of CVE-2018-14847 (MikroTik Exploit)",
        "fork": false,
        "created_at": "2018-10-13T19:17:42Z",
        "updated_at": "2020-11-02T06:16:27Z",
        "pushed_at": "2018-10-14T08:39:24Z",
        "stargazers_count": 13,
        "watchers_count": 13,
        "forks_count": 2,
        "allow_forking": true,
        "forks": 2,
        "watchers": 13,
        "score": 0
    },
    {
        "id": 161894724,
        "name": "CVE-2018-14847",
        "full_name": "jas502n\/CVE-2018-14847",
        "owner": {
            "login": "jas502n",
            "id": 16593068,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16593068?v=4",
            "html_url": "https:\/\/github.com\/jas502n"
        },
        "html_url": "https:\/\/github.com\/jas502n\/CVE-2018-14847",
        "description": "MikroTik RouterOS Winbox未经身份验证的任意文件读\/写漏洞",
        "fork": false,
        "created_at": "2018-12-15T10:38:26Z",
        "updated_at": "2021-05-21T16:37:17Z",
        "pushed_at": "2018-12-16T04:15:01Z",
        "stargazers_count": 18,
        "watchers_count": 18,
        "forks_count": 8,
        "allow_forking": true,
        "forks": 8,
        "watchers": 18,
        "score": 0
    },
    {
        "id": 178807607,
        "name": "winboxPOC",
        "full_name": "th3f3n1x87\/winboxPOC",
        "owner": {
            "login": "th3f3n1x87",
            "id": 15888700,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15888700?v=4",
            "html_url": "https:\/\/github.com\/th3f3n1x87"
        },
        "html_url": "https:\/\/github.com\/th3f3n1x87\/winboxPOC",
        "description": "Proof of Concept of Winbox Critical Vulnerability (CVE-2018-14847) ",
        "fork": false,
        "created_at": "2019-04-01T07:20:23Z",
        "updated_at": "2020-03-24T14:07:22Z",
        "pushed_at": "2019-02-18T09:51:10Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "allow_forking": true,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 188679903,
        "name": "mikrotik-beast",
        "full_name": "mahmoodsabir\/mikrotik-beast",
        "owner": {
            "login": "mahmoodsabir",
            "id": 47719250,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47719250?v=4",
            "html_url": "https:\/\/github.com\/mahmoodsabir"
        },
        "html_url": "https:\/\/github.com\/mahmoodsabir\/mikrotik-beast",
        "description": "  Mass MikroTik WinBox Exploitation tool, CVE-2018-14847                                                  ",
        "fork": false,
        "created_at": "2019-05-26T12:26:55Z",
        "updated_at": "2020-08-26T17:33:20Z",
        "pushed_at": "2019-05-26T13:06:01Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "forks_count": 1,
        "allow_forking": true,
        "forks": 1,
        "watchers": 2,
        "score": 0
    },
    {
        "id": 211658714,
        "name": "Python-MikrotikLoginExploit",
        "full_name": "sinichi449\/Python-MikrotikLoginExploit",
        "owner": {
            "login": "sinichi449",
            "id": 44680392,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44680392?v=4",
            "html_url": "https:\/\/github.com\/sinichi449"
        },
        "html_url": "https:\/\/github.com\/sinichi449\/Python-MikrotikLoginExploit",
        "description": "PoC of CVE-2018-14847 Mikrotik Vulnerability using simple script",
        "fork": false,
        "created_at": "2019-09-29T12:21:16Z",
        "updated_at": "2021-09-23T22:29:56Z",
        "pushed_at": "2019-09-30T04:10:23Z",
        "stargazers_count": 11,
        "watchers_count": 11,
        "forks_count": 1,
        "allow_forking": true,
        "forks": 1,
        "watchers": 11,
        "score": 0
    },
    {
        "id": 259795725,
        "name": "CVE-2018-14847",
        "full_name": "yukar1z0e\/CVE-2018-14847",
        "owner": {
            "login": "yukar1z0e",
            "id": 44317939,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44317939?v=4",
            "html_url": "https:\/\/github.com\/yukar1z0e"
        },
        "html_url": "https:\/\/github.com\/yukar1z0e\/CVE-2018-14847",
        "description": null,
        "fork": false,
        "created_at": "2020-04-29T01:40:33Z",
        "updated_at": "2020-05-18T07:48:01Z",
        "pushed_at": "2020-05-18T07:47:58Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 2,
        "allow_forking": true,
        "forks": 2,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 360240266,
        "name": "Mikrotik-router-hack",
        "full_name": "hacker30468\/Mikrotik-router-hack",
        "owner": {
            "login": "hacker30468",
            "id": 82890072,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82890072?v=4",
            "html_url": "https:\/\/github.com\/hacker30468"
        },
        "html_url": "https:\/\/github.com\/hacker30468\/Mikrotik-router-hack",
        "description": "This is a proof of concept of the critical WinBox vulnerability (CVE-2018-14847) which allows for arbitrary file read of plain text passwords.  The vulnerability has long since been fixed, so this project has ended and will not be supported or updated anymore. You can fork it and update it yourself instead.",
        "fork": false,
        "created_at": "2021-04-21T16:42:31Z",
        "updated_at": "2021-04-21T16:46:39Z",
        "pushed_at": "2021-04-21T16:46:37Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "allow_forking": true,
        "forks": 0,
        "watchers": 0,
        "score": 0
    }
]