[ { "id": 703062371, "name": "CVE-2023-44487", "full_name": "bcdannyboy\/CVE-2023-44487", "owner": { "login": "bcdannyboy", "id": 12553297, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4", "html_url": "https:\/\/github.com\/bcdannyboy" }, "html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487", "description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487", "fork": false, "created_at": "2023-10-10T14:20:42Z", "updated_at": "2023-10-26T12:26:39Z", "pushed_at": "2023-10-14T16:43:31Z", "stargazers_count": 177, "watchers_count": 177, "has_discussions": false, "forks_count": 38, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 38, "watchers": 177, "score": 0, "subscribers_count": 6 }, { "id": 703303512, "name": "CVE-2023-44487", "full_name": "imabee101\/CVE-2023-44487", "owner": { "login": "imabee101", "id": 29169122, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4", "html_url": "https:\/\/github.com\/imabee101" }, "html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487", "description": "Proof of concept for DoS exploit ", "fork": false, "created_at": "2023-10-11T01:59:47Z", "updated_at": "2023-10-26T11:33:34Z", "pushed_at": "2023-10-13T11:19:10Z", "stargazers_count": 34, "watchers_count": 34, "has_discussions": false, "forks_count": 10, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve", "cve-2023-44487", "ddos", "dos", "dos-attack", "poc", "proof-of-concept" ], "visibility": "public", "forks": 10, "watchers": 34, "score": 0, "subscribers_count": 2 }, { "id": 703845749, "name": "CVE-2023-44487", "full_name": "ByteHackr\/CVE-2023-44487", "owner": { "login": "ByteHackr", "id": 30409831, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4", "html_url": "https:\/\/github.com\/ByteHackr" }, "html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487", "description": "Test Script for CVE-2023-44487", "fork": false, "created_at": "2023-10-12T03:14:34Z", "updated_at": "2023-10-12T03:30:38Z", "pushed_at": "2023-10-12T03:30:35Z", "stargazers_count": 0, "watchers_count": 0, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 0, "score": 0, "subscribers_count": 1 }, { "id": 703914770, "name": "rapidreset", "full_name": "pabloec20\/rapidreset", "owner": { "login": "pabloec20", "id": 24191742, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4", "html_url": "https:\/\/github.com\/pabloec20" }, "html_url": "https:\/\/github.com\/pabloec20\/rapidreset", "description": "CVE-2023-44487", "fork": false, "created_at": "2023-10-12T07:06:42Z", "updated_at": "2023-10-19T14:05:17Z", "pushed_at": "2023-10-12T07:11:17Z", "stargazers_count": 2, "watchers_count": 2, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 2, "score": 0, "subscribers_count": 1 }, { "id": 704732969, "name": "rapidresetclient", "full_name": "secengjeff\/rapidresetclient", "owner": { "login": "secengjeff", "id": 146767590, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4", "html_url": "https:\/\/github.com\/secengjeff" }, "html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient", "description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)", "fork": false, "created_at": "2023-10-13T23:55:32Z", "updated_at": "2023-10-27T12:46:57Z", "pushed_at": "2023-10-16T23:36:45Z", "stargazers_count": 22, "watchers_count": 22, "has_discussions": false, "forks_count": 4, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 4, "watchers": 22, "score": 0, "subscribers_count": 2 }, { "id": 705614213, "name": "CVE-2023-44487", "full_name": "studiogangster\/CVE-2023-44487", "owner": { "login": "studiogangster", "id": 12793420, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4", "html_url": "https:\/\/github.com\/studiogangster" }, "html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487", "description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)", "fork": false, "created_at": "2023-10-16T11:07:50Z", "updated_at": "2023-10-27T15:01:43Z", "pushed_at": "2023-10-16T12:32:50Z", "stargazers_count": 7, "watchers_count": 7, "has_discussions": false, "forks_count": 2, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [ "cve-2023-44487", "cybersecurity", "exploit", "http2", "rapid", "rapid-reset", "reset", "security", "zero-day" ], "visibility": "public", "forks": 2, "watchers": 7, "score": 0, "subscribers_count": 1 }, { "id": 709722803, "name": "golang-CVE-2023-44487", "full_name": "ReToCode\/golang-CVE-2023-44487", "owner": { "login": "ReToCode", "id": 16611466, "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4", "html_url": "https:\/\/github.com\/ReToCode" }, "html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487", "description": null, "fork": false, "created_at": "2023-10-25T09:11:46Z", "updated_at": "2023-10-26T15:03:08Z", "pushed_at": "2023-10-26T15:01:38Z", "stargazers_count": 1, "watchers_count": 1, "has_discussions": false, "forks_count": 0, "allow_forking": true, "is_template": false, "web_commit_signoff_required": false, "topics": [], "visibility": "public", "forks": 0, "watchers": 1, "score": 0, "subscribers_count": 1 } ]