[
    {
        "id": 88117490,
        "name": "CVE-2017-0199",
        "full_name": "ryhanson\/CVE-2017-0199",
        "owner": {
            "login": "ryhanson",
            "id": 3486433,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3486433?v=4",
            "html_url": "https:\/\/github.com\/ryhanson"
        },
        "html_url": "https:\/\/github.com\/ryhanson\/CVE-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2017-04-13T02:41:36Z",
        "updated_at": "2017-04-13T02:41:36Z",
        "pushed_at": "2017-04-13T02:41:37Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 88185964,
        "name": "cve-2017-0199",
        "full_name": "SyFi\/cve-2017-0199",
        "owner": {
            "login": "SyFi",
            "id": 26314806,
            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/26314806?v=4",
            "html_url": "https:\/\/github.com\/SyFi"
        },
        "html_url": "https:\/\/github.com\/SyFi\/cve-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2017-04-13T16:40:27Z",
        "updated_at": "2019-12-06T00:55:16Z",
        "pushed_at": "2017-04-13T16:45:10Z",
        "stargazers_count": 12,
        "watchers_count": 12,
        "forks_count": 7,
        "forks": 7,
        "watchers": 12,
        "score": 0
    },
    {
        "id": 88486475,
        "name": "CVE-2017-0199",
        "full_name": "bhdresh\/CVE-2017-0199",
        "owner": {
            "login": "bhdresh",
            "id": 8931885,
            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/8931885?v=4",
            "html_url": "https:\/\/github.com\/bhdresh"
        },
        "html_url": "https:\/\/github.com\/bhdresh\/CVE-2017-0199",
        "description": "Exploit toolkit CVE-2017-0199 - v4.0 is a handy python script which provides pentesters and security researchers a quick and effective way to test Microsoft Office RCE. It could generate a malicious RTF\/PPSX file and deliver metasploit \/ meterpreter \/ other payload to victim without any complex configuration.",
        "fork": false,
        "created_at": "2017-04-17T08:10:07Z",
        "updated_at": "2020-01-06T01:05:28Z",
        "pushed_at": "2017-11-19T11:01:16Z",
        "stargazers_count": 604,
        "watchers_count": 604,
        "forks_count": 273,
        "forks": 273,
        "watchers": 604,
        "score": 0
    },
    {
        "id": 88590374,
        "name": "CVE-2017-0199-Fix",
        "full_name": "NotAwful\/CVE-2017-0199-Fix",
        "owner": {
            "login": "NotAwful",
            "id": 25178947,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25178947?v=4",
            "html_url": "https:\/\/github.com\/NotAwful"
        },
        "html_url": "https:\/\/github.com\/NotAwful\/CVE-2017-0199-Fix",
        "description": "Quick and dirty fix to OLE2 executing code via .hta",
        "fork": false,
        "created_at": "2017-04-18T06:33:45Z",
        "updated_at": "2018-03-18T10:23:47Z",
        "pushed_at": "2017-04-24T20:48:36Z",
        "stargazers_count": 14,
        "watchers_count": 14,
        "forks_count": 1,
        "forks": 1,
        "watchers": 14,
        "score": 0
    },
    {
        "id": 88700030,
        "name": "CVE-2017-0199-master",
        "full_name": "haibara3839\/CVE-2017-0199-master",
        "owner": {
            "login": "haibara3839",
            "id": 17246565,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/17246565?v=4",
            "html_url": "https:\/\/github.com\/haibara3839"
        },
        "html_url": "https:\/\/github.com\/haibara3839\/CVE-2017-0199-master",
        "description": "CVE-2017-0199",
        "fork": false,
        "created_at": "2017-04-19T04:15:54Z",
        "updated_at": "2018-11-12T16:42:51Z",
        "pushed_at": "2017-04-19T04:25:47Z",
        "stargazers_count": 15,
        "watchers_count": 15,
        "forks_count": 9,
        "forks": 9,
        "watchers": 15,
        "score": 0
    },
    {
        "id": 89043209,
        "name": "CVE-2017-0199",
        "full_name": "Exploit-install\/CVE-2017-0199",
        "owner": {
            "login": "Exploit-install",
            "id": 13824191,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/13824191?v=4",
            "html_url": "https:\/\/github.com\/Exploit-install"
        },
        "html_url": "https:\/\/github.com\/Exploit-install\/CVE-2017-0199",
        "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter \/ any other payload to victim without any complex configuration.",
        "fork": false,
        "created_at": "2017-04-22T04:01:38Z",
        "updated_at": "2018-12-04T20:02:10Z",
        "pushed_at": "2017-04-22T04:01:54Z",
        "stargazers_count": 6,
        "watchers_count": 6,
        "forks_count": 10,
        "forks": 10,
        "watchers": 6,
        "score": 0
    },
    {
        "id": 89065031,
        "name": "PoC-CVE-2017-0199",
        "full_name": "zakybstrd21215\/PoC-CVE-2017-0199",
        "owner": {
            "login": "zakybstrd21215",
            "id": 22362343,
            "avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/22362343?v=4",
            "html_url": "https:\/\/github.com\/zakybstrd21215"
        },
        "html_url": "https:\/\/github.com\/zakybstrd21215\/PoC-CVE-2017-0199",
        "description": "Exploit toolkit for vulnerability RCE Microsoft RTF",
        "fork": false,
        "created_at": "2017-04-22T11:32:39Z",
        "updated_at": "2019-02-02T15:31:28Z",
        "pushed_at": "2017-04-22T11:35:38Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 89145802,
        "name": "CVE-2017-0199",
        "full_name": "n1shant-sinha\/CVE-2017-0199",
        "owner": {
            "login": "n1shant-sinha",
            "id": 8848453,
            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8848453?v=4",
            "html_url": "https:\/\/github.com\/n1shant-sinha"
        },
        "html_url": "https:\/\/github.com\/n1shant-sinha\/CVE-2017-0199",
        "description": "Exploit toolkit CVE-2017-0199 - v2.0 is a handy python script which provides a quick and effective way to exploit Microsoft RTF RCE. It could generate a malicious RTF file and deliver metasploit \/ meterpreter payload to victim without any complex configuration.",
        "fork": false,
        "created_at": "2017-04-23T13:58:30Z",
        "updated_at": "2018-10-18T14:32:17Z",
        "pushed_at": "2017-04-23T14:05:24Z",
        "stargazers_count": 1,
        "watchers_count": 1,
        "forks_count": 0,
        "forks": 0,
        "watchers": 1,
        "score": 0
    },
    {
        "id": 89296859,
        "name": "htattack",
        "full_name": "kn0wm4d\/htattack",
        "owner": {
            "login": "kn0wm4d",
            "id": 15344287,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/15344287?v=4",
            "html_url": "https:\/\/github.com\/kn0wm4d"
        },
        "html_url": "https:\/\/github.com\/kn0wm4d\/htattack",
        "description": "An exploit implementation for RCE in RTF & DOCs (CVE-2017-0199)",
        "fork": false,
        "created_at": "2017-04-24T23:44:31Z",
        "updated_at": "2017-08-21T01:41:18Z",
        "pushed_at": "2017-04-24T23:45:18Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "forks_count": 2,
        "forks": 2,
        "watchers": 2,
        "score": 0
    },
    {
        "id": 89314149,
        "name": "Cve-2017-0199",
        "full_name": "joke998\/Cve-2017-0199",
        "owner": {
            "login": "joke998",
            "id": 25948923,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
            "html_url": "https:\/\/github.com\/joke998"
        },
        "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2017-04-25T03:38:15Z",
        "updated_at": "2017-04-25T03:38:15Z",
        "pushed_at": "2017-04-25T03:38:15Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 89314954,
        "name": "Cve-2017-0199-",
        "full_name": "joke998\/Cve-2017-0199-",
        "owner": {
            "login": "joke998",
            "id": 25948923,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/25948923?v=4",
            "html_url": "https:\/\/github.com\/joke998"
        },
        "html_url": "https:\/\/github.com\/joke998\/Cve-2017-0199-",
        "description": "Cve-2017-0199",
        "fork": false,
        "created_at": "2017-04-25T03:48:53Z",
        "updated_at": "2017-04-25T03:48:53Z",
        "pushed_at": "2017-04-25T03:48:53Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 95870771,
        "name": "Microsoft-Word-CVE-2017-0199-",
        "full_name": "r0otshell\/Microsoft-Word-CVE-2017-0199-",
        "owner": {
            "login": "r0otshell",
            "id": 24601456,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/24601456?v=4",
            "html_url": "https:\/\/github.com\/r0otshell"
        },
        "html_url": "https:\/\/github.com\/r0otshell\/Microsoft-Word-CVE-2017-0199-",
        "description": null,
        "fork": false,
        "created_at": "2017-06-30T09:08:40Z",
        "updated_at": "2017-06-30T09:11:28Z",
        "pushed_at": "2017-06-30T09:11:27Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 104072875,
        "name": "CVE-2017-0199",
        "full_name": "viethdgit\/CVE-2017-0199",
        "owner": {
            "login": "viethdgit",
            "id": 24888568,
            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/24888568?v=4",
            "html_url": "https:\/\/github.com\/viethdgit"
        },
        "html_url": "https:\/\/github.com\/viethdgit\/CVE-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2017-09-19T12:38:47Z",
        "updated_at": "2017-09-19T12:38:47Z",
        "pushed_at": "2017-09-19T12:47:49Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 109420190,
        "name": "RTF-Cleaner",
        "full_name": "nicpenning\/RTF-Cleaner",
        "owner": {
            "login": "nicpenning",
            "id": 5582679,
            "avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/5582679?v=4",
            "html_url": "https:\/\/github.com\/nicpenning"
        },
        "html_url": "https:\/\/github.com\/nicpenning\/RTF-Cleaner",
        "description": "RTF de-obfuscator for CVE-2017-0199 documents to find URLs statically.",
        "fork": false,
        "created_at": "2017-11-03T16:47:16Z",
        "updated_at": "2019-06-29T16:49:45Z",
        "pushed_at": "2017-11-03T20:55:20Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 2,
        "forks": 2,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 111145351,
        "name": "2017-11-17-Maldoc-Using-CVE-2017-0199",
        "full_name": "bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
        "owner": {
            "login": "bloomer1016",
            "id": 12056770,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/12056770?v=4",
            "html_url": "https:\/\/github.com\/bloomer1016"
        },
        "html_url": "https:\/\/github.com\/bloomer1016\/2017-11-17-Maldoc-Using-CVE-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2017-11-17T20:00:29Z",
        "updated_at": "2018-03-12T19:45:33Z",
        "pushed_at": "2017-11-17T20:00:42Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 1,
        "forks": 1,
        "watchers": 0,
        "score": 0
    },
    {
        "id": 113558617,
        "name": "RTF-Cleaner",
        "full_name": "jacobsoo\/RTF-Cleaner",
        "owner": {
            "login": "jacobsoo",
            "id": 3516693,
            "avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/3516693?v=4",
            "html_url": "https:\/\/github.com\/jacobsoo"
        },
        "html_url": "https:\/\/github.com\/jacobsoo\/RTF-Cleaner",
        "description": "RTF Cleaner, tries to extract URL from malicious RTF samples using CVE-2017-0199 & CVE-2017-8759",
        "fork": false,
        "created_at": "2017-12-08T09:45:25Z",
        "updated_at": "2018-02-21T04:37:47Z",
        "pushed_at": "2017-12-08T09:46:07Z",
        "stargazers_count": 3,
        "watchers_count": 3,
        "forks_count": 1,
        "forks": 1,
        "watchers": 3,
        "score": 0
    },
    {
        "id": 126305253,
        "name": "CVE-2017-0199",
        "full_name": "denmilu\/CVE-2017-0199",
        "owner": {
            "login": "denmilu",
            "id": 2469038,
            "avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2469038?v=4",
            "html_url": "https:\/\/github.com\/denmilu"
        },
        "html_url": "https:\/\/github.com\/denmilu\/CVE-2017-0199",
        "description": null,
        "fork": false,
        "created_at": "2018-03-22T08:40:55Z",
        "updated_at": "2018-03-22T08:41:14Z",
        "pushed_at": "2018-03-22T08:41:11Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "forks_count": 0,
        "forks": 0,
        "watchers": 0,
        "score": 0
    }
]