[
    {
        "id": 237289178,
        "name": "cve-2020-7247-exploit",
        "full_name": "FiroSolutions\/cve-2020-7247-exploit",
        "owner": {
            "login": "FiroSolutions",
            "id": 43434507,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43434507?v=4",
            "html_url": "https:\/\/github.com\/FiroSolutions"
        },
        "html_url": "https:\/\/github.com\/FiroSolutions\/cve-2020-7247-exploit",
        "description": "Python exploit of cve-2020-7247",
        "fork": false,
        "created_at": "2020-01-30T19:29:27Z",
        "updated_at": "2023-09-28T11:10:43Z",
        "pushed_at": "2020-02-19T10:55:15Z",
        "stargazers_count": 26,
        "watchers_count": 26,
        "has_discussions": false,
        "forks_count": 16,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 16,
        "watchers": 26,
        "score": 0,
        "subscribers_count": 3
    },
    {
        "id": 241011451,
        "name": "cve-2020-7247",
        "full_name": "superzerosec\/cve-2020-7247",
        "owner": {
            "login": "superzerosec",
            "id": 57648217,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57648217?v=4",
            "html_url": "https:\/\/github.com\/superzerosec"
        },
        "html_url": "https:\/\/github.com\/superzerosec\/cve-2020-7247",
        "description": "OpenSMTPD version 6.6.2 remote code execution exploit",
        "fork": false,
        "created_at": "2020-02-17T03:28:09Z",
        "updated_at": "2023-09-28T13:23:19Z",
        "pushed_at": "2022-01-15T19:37:31Z",
        "stargazers_count": 5,
        "watchers_count": 5,
        "has_discussions": false,
        "forks_count": 7,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 7,
        "watchers": 5,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 241337606,
        "name": "CVE-2020-7247",
        "full_name": "r0lh\/CVE-2020-7247",
        "owner": {
            "login": "r0lh",
            "id": 51697374,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51697374?v=4",
            "html_url": "https:\/\/github.com\/r0lh"
        },
        "html_url": "https:\/\/github.com\/r0lh\/CVE-2020-7247",
        "description": "Proof Of Concept Exploit for CVE-2020-7247 (Remote Execution on OpenSMTPD < 6.6.2",
        "fork": false,
        "created_at": "2020-02-18T10:52:38Z",
        "updated_at": "2023-09-28T11:11:28Z",
        "pushed_at": "2020-02-18T11:08:38Z",
        "stargazers_count": 4,
        "watchers_count": 4,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 4,
        "score": 0,
        "subscribers_count": 2
    },
    {
        "id": 338516393,
        "name": "CVE-2020-7247-exploit",
        "full_name": "QTranspose\/CVE-2020-7247-exploit",
        "owner": {
            "login": "QTranspose",
            "id": 54239699,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/54239699?v=4",
            "html_url": "https:\/\/github.com\/QTranspose"
        },
        "html_url": "https:\/\/github.com\/QTranspose\/CVE-2020-7247-exploit",
        "description": "OpenSMTPD 6.4.0 - 6.6.1 Remote Code Execution PoC exploit",
        "fork": false,
        "created_at": "2021-02-13T06:57:47Z",
        "updated_at": "2023-02-08T11:50:15Z",
        "pushed_at": "2021-02-17T09:23:57Z",
        "stargazers_count": 10,
        "watchers_count": 10,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 10,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 373152472,
        "name": "CVE-2020-7247",
        "full_name": "bytescrappers\/CVE-2020-7247",
        "owner": {
            "login": "bytescrappers",
            "id": 85182327,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/85182327?v=4",
            "html_url": "https:\/\/github.com\/bytescrappers"
        },
        "html_url": "https:\/\/github.com\/bytescrappers\/CVE-2020-7247",
        "description": "This vulnerability exists in OpenBSD’s mail server OpenSMTPD’s “smtp_mailaddr()” function, and affects OpenBSD version 6.6. This allows an attacker to execute arbitrary shell commands like “sleep 66” as root user",
        "fork": false,
        "created_at": "2021-06-02T12:02:33Z",
        "updated_at": "2021-06-02T12:02:34Z",
        "pushed_at": "2021-02-01T13:20:06Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 2,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 2,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 0
    },
    {
        "id": 378352740,
        "name": "CVE-2020-7247",
        "full_name": "f4T1H21\/CVE-2020-7247",
        "owner": {
            "login": "f4T1H21",
            "id": 83399767,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/83399767?v=4",
            "html_url": "https:\/\/github.com\/f4T1H21"
        },
        "html_url": "https:\/\/github.com\/f4T1H21\/CVE-2020-7247",
        "description": "PoC exploit for CVE-2020-7247 OpenSMTPD 6.4.0 < 6.6.1 Remote Code Execution",
        "fork": false,
        "created_at": "2021-06-19T07:34:42Z",
        "updated_at": "2021-07-10T11:26:09Z",
        "pushed_at": "2021-07-10T11:26:06Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [
            "cve",
            "cve-2020-7247",
            "exploit",
            "poc"
        ],
        "visibility": "public",
        "forks": 0,
        "watchers": 1,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 432255271,
        "name": "CVE-2020-7247-POC",
        "full_name": "SimonSchoeni\/CVE-2020-7247-POC",
        "owner": {
            "login": "SimonSchoeni",
            "id": 62761108,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62761108?v=4",
            "html_url": "https:\/\/github.com\/SimonSchoeni"
        },
        "html_url": "https:\/\/github.com\/SimonSchoeni\/CVE-2020-7247-POC",
        "description": "Proof of concept for CVE-2020-7247 for educational purposes.",
        "fork": false,
        "created_at": "2021-11-26T17:28:56Z",
        "updated_at": "2023-08-17T02:58:27Z",
        "pushed_at": "2022-01-20T18:36:05Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 456468236,
        "name": "shai_hulud",
        "full_name": "presentdaypresenttime\/shai_hulud",
        "owner": {
            "login": "presentdaypresenttime",
            "id": 92856309,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92856309?v=4",
            "html_url": "https:\/\/github.com\/presentdaypresenttime"
        },
        "html_url": "https:\/\/github.com\/presentdaypresenttime\/shai_hulud",
        "description": "Worm written in python, abuses CVE-2020-7247",
        "fork": false,
        "created_at": "2022-02-07T10:59:36Z",
        "updated_at": "2023-08-25T03:12:05Z",
        "pushed_at": "2022-05-17T20:03:56Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    }
]