[
    {
        "id": 497194997,
        "name": "OffensivePascal-CVE-2010-2075",
        "full_name": "MFernstrom\/OffensivePascal-CVE-2010-2075",
        "owner": {
            "login": "MFernstrom",
            "id": 9220603,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/9220603?v=4",
            "html_url": "https:\/\/github.com\/MFernstrom",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/MFernstrom\/OffensivePascal-CVE-2010-2075",
        "description": "FreePascal implementation of the UnrealIRCD CVE-2010-2075",
        "fork": false,
        "created_at": "2022-05-28T02:47:22Z",
        "updated_at": "2024-09-06T01:25:16Z",
        "pushed_at": "2022-05-29T18:04:45Z",
        "stargazers_count": 2,
        "watchers_count": 2,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 2,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 632273864,
        "name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "full_name": "chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "owner": {
            "login": "chancej715",
            "id": 57548476,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57548476?v=4",
            "html_url": "https:\/\/github.com\/chancej715",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/chancej715\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "description": "UnrealIRCd 3.2.8.1 backdoor command execution exploit in Python 3 (CVE-2010-2075).",
        "fork": false,
        "created_at": "2023-04-25T04:30:36Z",
        "updated_at": "2023-04-25T21:10:56Z",
        "pushed_at": "2023-04-25T21:11:35Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 647970703,
        "name": "CVE-2010-2075-UnrealIRCd-3.2.8.1",
        "full_name": "FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
        "owner": {
            "login": "FredBrave",
            "id": 114189847,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114189847?v=4",
            "html_url": "https:\/\/github.com\/FredBrave",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/FredBrave\/CVE-2010-2075-UnrealIRCd-3.2.8.1",
        "description": "Exploit for CVE:2010-2075. This exploit allows remote command execution in UnrealIRCd 3.2.8.1.",
        "fork": false,
        "created_at": "2023-05-31T23:35:17Z",
        "updated_at": "2023-05-31T23:40:58Z",
        "pushed_at": "2023-05-31T23:44:37Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 1,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 1,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 788614854,
        "name": "UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "full_name": "JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "owner": {
            "login": "JoseLRC97",
            "id": 56311988,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56311988?v=4",
            "html_url": "https:\/\/github.com\/JoseLRC97",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/JoseLRC97\/UnrealIRCd-3.2.8.1-Backdoor-Command-Execution",
        "description": "Script that exploits the vulnerability that allows establishing a backdoor in the UnrealIRCd service with CVE-2010-2075",
        "fork": false,
        "created_at": "2024-04-18T18:55:27Z",
        "updated_at": "2024-04-18T18:58:51Z",
        "pushed_at": "2024-04-18T18:59:13Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    },
    {
        "id": 939076767,
        "name": "PenTest-Lab",
        "full_name": "abhinavcybersec\/PenTest-Lab",
        "owner": {
            "login": "abhinavcybersec",
            "id": 168777920,
            "avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168777920?v=4",
            "html_url": "https:\/\/github.com\/abhinavcybersec",
            "user_view_type": "public"
        },
        "html_url": "https:\/\/github.com\/abhinavcybersec\/PenTest-Lab",
        "description": "I recently set up a small Penetration Testing Lab to get some hands-on experience with vulnerability scanning and exploitation. Using Nessus and Kali Linux, I was able to dive into Metasploitable 2, a deliberately vulnerable system, and identify a pretty serious flaw (CVE-2010-2075).",
        "fork": false,
        "created_at": "2025-02-26T00:31:00Z",
        "updated_at": "2025-02-27T23:18:38Z",
        "pushed_at": "2025-02-27T23:09:16Z",
        "stargazers_count": 0,
        "watchers_count": 0,
        "has_discussions": false,
        "forks_count": 0,
        "allow_forking": true,
        "is_template": false,
        "web_commit_signoff_required": false,
        "topics": [],
        "visibility": "public",
        "forks": 0,
        "watchers": 0,
        "score": 0,
        "subscribers_count": 1
    }
]