[ { "id": 259298559, "name": "CVE-2017-7921-EXP", "full_name": "JrDw0\/CVE-2017-7921-EXP", "owner": { "login": "JrDw0", "id": 37445725, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37445725?v=4", "html_url": "https:\/\/github.com\/JrDw0" }, "html_url": "https:\/\/github.com\/JrDw0\/CVE-2017-7921-EXP", "description": "Hikvision camera CVE-2017-7921-EXP", "fork": false, "created_at": "2020-04-27T11:49:40Z", "updated_at": "2022-04-13T17:46:43Z", "pushed_at": "2020-08-09T15:35:16Z", "stargazers_count": 52, "watchers_count": 52, "forks_count": 9, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 9, "watchers": 52, "score": 0 }, { "id": 312221274, "name": "CVE-2017-7921", "full_name": "BurnyMcDull\/CVE-2017-7921", "owner": { "login": "BurnyMcDull", "id": 20639723, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20639723?v=4", "html_url": "https:\/\/github.com\/BurnyMcDull" }, "html_url": "https:\/\/github.com\/BurnyMcDull\/CVE-2017-7921", "description": "海康威视未授权访问检测poc及口令爆破", "fork": false, "created_at": "2020-11-12T09:02:10Z", "updated_at": "2022-04-30T08:00:37Z", "pushed_at": "2020-11-19T08:58:04Z", "stargazers_count": 27, "watchers_count": 27, "forks_count": 4, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 27, "score": 0 }, { "id": 312471106, "name": "cve-2017-7921-golang", "full_name": "MisakaMikato\/cve-2017-7921-golang", "owner": { "login": "MisakaMikato", "id": 31957147, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31957147?v=4", "html_url": "https:\/\/github.com\/MisakaMikato" }, "html_url": "https:\/\/github.com\/MisakaMikato\/cve-2017-7921-golang", "description": "Hikvision IP camera access bypass exploit, developed by golang. ", "fork": false, "created_at": "2020-11-13T04:15:31Z", "updated_at": "2022-04-08T05:11:15Z", "pushed_at": "2021-01-11T05:52:22Z", "stargazers_count": 6, "watchers_count": 6, "forks_count": 1, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 1, "watchers": 6, "score": 0 }, { "id": 334195499, "name": "hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "full_name": "chrisjd20\/hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "owner": { "login": "chrisjd20", "id": 11812223, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11812223?v=4", "html_url": "https:\/\/github.com\/chrisjd20" }, "html_url": "https:\/\/github.com\/chrisjd20\/hikvision_CVE-2017-7921_auth_bypass_config_decryptor", "description": "This python file will decrypt the configurationFile used by hikvision cameras vulnerable to CVE-2017-7921.", "fork": false, "created_at": "2021-01-29T16:08:35Z", "updated_at": "2022-04-29T20:59:38Z", "pushed_at": "2021-01-29T16:22:39Z", "stargazers_count": 29, "watchers_count": 29, "forks_count": 10, "allow_forking": true, "is_template": false, "topics": [], "visibility": "public", "forks": 10, "watchers": 29, "score": 0 } ]