PoC-in-GitHub/2024/CVE-2024-6387.json
2025-01-15 21:32:30 +09:00

2950 lines
No EOL
103 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 822546559,
"name": "cve-2024-6387-poc",
"full_name": "zgzhang\/cve-2024-6387-poc",
"owner": {
"login": "zgzhang",
"id": 11416832,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11416832?v=4",
"html_url": "https:\/\/github.com\/zgzhang",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zgzhang\/cve-2024-6387-poc",
"description": "a signal handler race condition in OpenSSH's server (sshd)",
"fork": false,
"created_at": "2024-07-01T10:55:29Z",
"updated_at": "2025-01-07T04:25:05Z",
"pushed_at": "2024-07-01T10:54:02Z",
"stargazers_count": 473,
"watchers_count": 473,
"has_discussions": false,
"forks_count": 183,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 183,
"watchers": 473,
"score": 0,
"subscribers_count": 5
},
{
"id": 822579775,
"name": "cve-2024-6387-poc",
"full_name": "acrono\/cve-2024-6387-poc",
"owner": {
"login": "acrono",
"id": 51956758,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51956758?v=4",
"html_url": "https:\/\/github.com\/acrono",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/acrono\/cve-2024-6387-poc",
"description": "32-bit PoC for CVE-2024-6387 — mirror of the original 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:16:21Z",
"updated_at": "2025-01-09T19:13:36Z",
"pushed_at": "2024-07-01T12:25:01Z",
"stargazers_count": 378,
"watchers_count": 378,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 90,
"watchers": 378,
"score": 0,
"subscribers_count": 8
},
{
"id": 822584501,
"name": "cve-2024-6387-poc",
"full_name": "lflare\/cve-2024-6387-poc",
"owner": {
"login": "lflare",
"id": 22326991,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22326991?v=4",
"html_url": "https:\/\/github.com\/lflare",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lflare\/cve-2024-6387-poc",
"description": "MIRROR of the original 32-bit PoC for CVE-2024-6387 \"regreSSHion\" by 7etsuo\/cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T12:26:40Z",
"updated_at": "2025-01-02T12:21:22Z",
"pushed_at": "2024-07-25T04:23:11Z",
"stargazers_count": 111,
"watchers_count": 111,
"has_discussions": false,
"forks_count": 40,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387",
"openssh",
"poc",
"rce",
"regresshion",
"ssh"
],
"visibility": "public",
"forks": 40,
"watchers": 111,
"score": 0,
"subscribers_count": 4
},
{
"id": 822593995,
"name": "cve-2024-6387-poc",
"full_name": "shyrwall\/cve-2024-6387-poc",
"owner": {
"login": "shyrwall",
"id": 1523968,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1523968?v=4",
"html_url": "https:\/\/github.com\/shyrwall",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shyrwall\/cve-2024-6387-poc",
"description": null,
"fork": false,
"created_at": "2024-07-01T12:48:36Z",
"updated_at": "2024-07-01T12:50:32Z",
"pushed_at": "2024-07-01T12:50:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 822595195,
"name": "CVE-2024-6387-PoC",
"full_name": "getdrive\/CVE-2024-6387-PoC",
"owner": {
"login": "getdrive",
"id": 20697688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/20697688?v=4",
"html_url": "https:\/\/github.com\/getdrive",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/getdrive\/CVE-2024-6387-PoC",
"description": "PoC RCE in OpenSSH",
"fork": false,
"created_at": "2024-07-01T12:51:18Z",
"updated_at": "2024-12-08T12:41:06Z",
"pushed_at": "2024-07-01T13:34:47Z",
"stargazers_count": 22,
"watchers_count": 22,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 22,
"score": 0,
"subscribers_count": 1
},
{
"id": 822620870,
"name": "CVE-2024-6387-POC",
"full_name": "FerasAlrimali\/CVE-2024-6387-POC",
"owner": {
"login": "FerasAlrimali",
"id": 51955818,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51955818?v=4",
"html_url": "https:\/\/github.com\/FerasAlrimali",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/FerasAlrimali\/CVE-2024-6387-POC",
"description": "SSHd cve-2024-6387-poc",
"fork": false,
"created_at": "2024-07-01T13:38:47Z",
"updated_at": "2024-07-01T13:42:18Z",
"pushed_at": "2024-07-01T13:42:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 822634085,
"name": "cve-2024-6387-poc",
"full_name": "passwa11\/cve-2024-6387-poc",
"owner": {
"login": "passwa11",
"id": 112363374,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112363374?v=4",
"html_url": "https:\/\/github.com\/passwa11",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/passwa11\/cve-2024-6387-poc",
"description": null,
"fork": false,
"created_at": "2024-07-01T14:08:23Z",
"updated_at": "2024-07-27T19:01:18Z",
"pushed_at": "2024-07-01T14:10:08Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 822746375,
"name": "CVE-2024-6387",
"full_name": "jack0we\/CVE-2024-6387",
"owner": {
"login": "jack0we",
"id": 150005594,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150005594?v=4",
"html_url": "https:\/\/github.com\/jack0we",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jack0we\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-01T18:28:25Z",
"updated_at": "2024-07-01T18:32:44Z",
"pushed_at": "2024-07-01T18:32:41Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 822788426,
"name": "CVE-2024-6387_Check",
"full_name": "xaitax\/CVE-2024-6387_Check",
"owner": {
"login": "xaitax",
"id": 5014849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/5014849?v=4",
"html_url": "https:\/\/github.com\/xaitax",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xaitax\/CVE-2024-6387_Check",
"description": "CVE-2024-6387_Check is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-01T20:33:20Z",
"updated_at": "2025-01-13T14:14:28Z",
"pushed_at": "2024-09-24T19:18:56Z",
"stargazers_count": 464,
"watchers_count": 464,
"has_discussions": false,
"forks_count": 90,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387",
"exploit",
"pentesting",
"python3",
"redteam"
],
"visibility": "public",
"forks": 90,
"watchers": 464,
"score": 0,
"subscribers_count": 7
},
{
"id": 822792125,
"name": "CVE-2024-6387",
"full_name": "bigb0x\/CVE-2024-6387",
"owner": {
"login": "bigb0x",
"id": 13532434,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13532434?v=4",
"html_url": "https:\/\/github.com\/bigb0x",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/bigb0x\/CVE-2024-6387",
"description": "Bulk Scanning Tool for OpenSSH CVE-2024-6387, CVE-2006-5051 , CVE-2008-4109 and others.",
"fork": false,
"created_at": "2024-07-01T20:45:53Z",
"updated_at": "2025-01-03T10:25:53Z",
"pushed_at": "2024-07-06T10:47:30Z",
"stargazers_count": 27,
"watchers_count": 27,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"openssh",
"security-audit",
"security-tools",
"ssh",
"ssh-server"
],
"visibility": "public",
"forks": 6,
"watchers": 27,
"score": 0,
"subscribers_count": 1
},
{
"id": 822824673,
"name": "regresshion-check",
"full_name": "wiggels\/regresshion-check",
"owner": {
"login": "wiggels",
"id": 16748278,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16748278?v=4",
"html_url": "https:\/\/github.com\/wiggels",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/wiggels\/regresshion-check",
"description": "CLI Tool to Check SSH Servers for Vulnerability to CVE-2024-6387",
"fork": false,
"created_at": "2024-07-01T22:53:32Z",
"updated_at": "2024-08-01T17:34:14Z",
"pushed_at": "2024-07-16T20:25:52Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 822856797,
"name": "CVE-2024-6387",
"full_name": "3yujw7njai\/CVE-2024-6387",
"owner": {
"login": "3yujw7njai",
"id": 7390055,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7390055?v=4",
"html_url": "https:\/\/github.com\/3yujw7njai",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/3yujw7njai\/CVE-2024-6387",
"description": "SSH RCE PoC CVE-2024-6387",
"fork": false,
"created_at": "2024-07-02T01:08:05Z",
"updated_at": "2024-12-08T12:40:56Z",
"pushed_at": "2024-07-02T01:13:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"has_discussions": false,
"forks_count": 10,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 10,
"watchers": 4,
"score": 0,
"subscribers_count": 2
},
{
"id": 822860717,
"name": "OpenSSH-Vulnerability-test",
"full_name": "betancour\/OpenSSH-Vulnerability-test",
"owner": {
"login": "betancour",
"id": 283403,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/283403?v=4",
"html_url": "https:\/\/github.com\/betancour",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/betancour\/OpenSSH-Vulnerability-test",
"description": "OpenSSH CVE-2024-6387 Vulnerability Checker",
"fork": false,
"created_at": "2024-07-02T01:24:04Z",
"updated_at": "2024-12-24T09:30:51Z",
"pushed_at": "2024-07-02T01:31:11Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 822879505,
"name": "CVE-2024-6387fixshell",
"full_name": "muyuanlove\/CVE-2024-6387fixshell",
"owner": {
"login": "muyuanlove",
"id": 41590587,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/41590587?v=4",
"html_url": "https:\/\/github.com\/muyuanlove",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/muyuanlove\/CVE-2024-6387fixshell",
"description": null,
"fork": false,
"created_at": "2024-07-02T02:35:24Z",
"updated_at": "2024-07-02T06:18:19Z",
"pushed_at": "2024-07-02T02:39:40Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 822883843,
"name": "CVE-2024-6387",
"full_name": "TAM-K592\/CVE-2024-6387",
"owner": {
"login": "TAM-K592",
"id": 8276702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8276702?v=4",
"html_url": "https:\/\/github.com\/TAM-K592",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/TAM-K592\/CVE-2024-6387",
"description": "Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote code execution (RCE) with root privileges. This vulnerability, identified as CVE-2024-6387, resides in the OpenSSH server component (sshd), which is designed to listen for connections from client applications.",
"fork": false,
"created_at": "2024-07-02T02:51:37Z",
"updated_at": "2024-12-28T05:47:38Z",
"pushed_at": "2024-07-02T03:23:00Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 10,
"score": 0,
"subscribers_count": 1
},
{
"id": 822884531,
"name": "regreSSHion",
"full_name": "teamos-hub\/regreSSHion",
"owner": {
"login": "teamos-hub",
"id": 172880130,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/172880130?v=4",
"html_url": "https:\/\/github.com\/teamos-hub",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/teamos-hub\/regreSSHion",
"description": "This is a POC I wrote for CVE-2024-6387",
"fork": false,
"created_at": "2024-07-02T02:54:05Z",
"updated_at": "2024-07-02T13:12:58Z",
"pushed_at": "2024-07-02T02:48:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 822897220,
"name": "CVE-2024-6387",
"full_name": "ahlfors\/CVE-2024-6387",
"owner": {
"login": "ahlfors",
"id": 1074291,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/1074291?v=4",
"html_url": "https:\/\/github.com\/ahlfors",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ahlfors\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-02T03:42:35Z",
"updated_at": "2024-07-10T08:04:08Z",
"pushed_at": "2024-07-02T09:57:35Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 822898666,
"name": "CVE-2024-6387-checkher",
"full_name": "Mufti22\/CVE-2024-6387-checkher",
"owner": {
"login": "Mufti22",
"id": 75854478,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/75854478?v=4",
"html_url": "https:\/\/github.com\/Mufti22",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Mufti22\/CVE-2024-6387-checkher",
"description": null,
"fork": false,
"created_at": "2024-07-02T03:48:37Z",
"updated_at": "2024-07-02T03:49:10Z",
"pushed_at": "2024-07-02T03:49:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 822903933,
"name": "CVE-2024-6387-exploit",
"full_name": "thegenetic\/CVE-2024-6387-exploit",
"owner": {
"login": "thegenetic",
"id": 57350740,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57350740?v=4",
"html_url": "https:\/\/github.com\/thegenetic",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/thegenetic\/CVE-2024-6387-exploit",
"description": "CVE-2024-6387 exploit",
"fork": false,
"created_at": "2024-07-02T04:09:44Z",
"updated_at": "2024-09-24T00:12:11Z",
"pushed_at": "2024-07-02T04:45:15Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 822953002,
"name": "CVE-2024-6387",
"full_name": "R4Tw1z\/CVE-2024-6387",
"owner": {
"login": "R4Tw1z",
"id": 150011273,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/150011273?v=4",
"html_url": "https:\/\/github.com\/R4Tw1z",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/R4Tw1z\/CVE-2024-6387",
"description": "This script, created by R4Tw1z, is designed to scan IP addresses to check if they are running a potentially vulnerable version of OpenSSH. The tool leverages multi-threading to optimize scanning performance and handle multiple IP addresses concurrently.",
"fork": false,
"created_at": "2024-07-02T06:40:09Z",
"updated_at": "2024-07-05T10:15:26Z",
"pushed_at": "2024-07-02T09:01:55Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 822958334,
"name": "CVE-2024-6387",
"full_name": "d0rb\/CVE-2024-6387",
"owner": {
"login": "d0rb",
"id": 10403781,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/10403781?v=4",
"html_url": "https:\/\/github.com\/d0rb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/d0rb\/CVE-2024-6387",
"description": "This Python script exploits a remote code execution vulnerability (CVE-2024-6387) in OpenSSH.",
"fork": false,
"created_at": "2024-07-02T06:53:35Z",
"updated_at": "2025-01-05T15:46:06Z",
"pushed_at": "2024-07-04T20:04:30Z",
"stargazers_count": 35,
"watchers_count": 35,
"has_discussions": false,
"forks_count": 11,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 11,
"watchers": 35,
"score": 0,
"subscribers_count": 1
},
{
"id": 822978721,
"name": "regression-scanner",
"full_name": "CiderAndWhisky\/regression-scanner",
"owner": {
"login": "CiderAndWhisky",
"id": 30117084,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30117084?v=4",
"html_url": "https:\/\/github.com\/CiderAndWhisky",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CiderAndWhisky\/regression-scanner",
"description": "Used to detect ssh servers vulnerable to CVE-2024-6387. Shameless robbery from https:\/\/github.com\/bigb0x\/CVE-2024-6387 using ChatGPT to translate the code to PHP.",
"fork": false,
"created_at": "2024-07-02T07:42:46Z",
"updated_at": "2024-07-02T09:06:07Z",
"pushed_at": "2024-07-02T09:06:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 822991113,
"name": "CVE-2024-6387_PoC",
"full_name": "shamo0\/CVE-2024-6387_PoC",
"owner": {
"login": "shamo0",
"id": 48299520,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48299520?v=4",
"html_url": "https:\/\/github.com\/shamo0",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shamo0\/CVE-2024-6387_PoC",
"description": "Script for checking CVE-2024-6387 (regreSSHion)",
"fork": false,
"created_at": "2024-07-02T08:13:23Z",
"updated_at": "2024-07-02T10:00:56Z",
"pushed_at": "2024-07-02T08:40:31Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"checker",
"cve-2024-6387",
"exploit",
"openssh",
"poc",
"rce",
"regresshion",
"ssh",
"vulnerability"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 822993766,
"name": "CVE-2024-6387-nmap",
"full_name": "paradessia\/CVE-2024-6387-nmap",
"owner": {
"login": "paradessia",
"id": 38862216,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38862216?v=4",
"html_url": "https:\/\/github.com\/paradessia",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/paradessia\/CVE-2024-6387-nmap",
"description": "CVE-2024-6387-nmap",
"fork": false,
"created_at": "2024-07-02T08:19:55Z",
"updated_at": "2024-07-31T06:59:27Z",
"pushed_at": "2024-07-02T08:26:46Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 823030467,
"name": "CVE-2024-6387",
"full_name": "SecWithMoh\/CVE-2024-6387",
"owner": {
"login": "SecWithMoh",
"id": 92855054,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/92855054?v=4",
"html_url": "https:\/\/github.com\/SecWithMoh",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SecWithMoh\/CVE-2024-6387",
"description": "This Go program scans targets for CVE-2024-6387 in OpenSSH, categorizing servers by vulnerability status and port availability.",
"fork": false,
"created_at": "2024-07-02T09:41:40Z",
"updated_at": "2024-07-16T07:51:21Z",
"pushed_at": "2024-07-02T10:05:02Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 823031972,
"name": "CVE-2024-6387-Updated-x64bit",
"full_name": "PrincipalAnthony\/CVE-2024-6387-Updated-x64bit",
"owner": {
"login": "PrincipalAnthony",
"id": 174432334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/174432334?v=4",
"html_url": "https:\/\/github.com\/PrincipalAnthony",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/PrincipalAnthony\/CVE-2024-6387-Updated-x64bit",
"description": "Private x64 RCE exploit for CVE-2024-6387 [02.07.2024] from exploit.in",
"fork": false,
"created_at": "2024-07-02T09:45:04Z",
"updated_at": "2024-07-02T15:52:27Z",
"pushed_at": "2024-07-02T09:46:08Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 823040737,
"name": "CVE-2024-6387-POC",
"full_name": "skyalliance\/CVE-2024-6387-POC",
"owner": {
"login": "skyalliance",
"id": 127739423,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/127739423?v=4",
"html_url": "https:\/\/github.com\/skyalliance",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/skyalliance\/CVE-2024-6387-POC",
"description": null,
"fork": false,
"created_at": "2024-07-02T10:05:43Z",
"updated_at": "2024-07-02T13:24:40Z",
"pushed_at": "2024-07-02T13:24:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823053102,
"name": "CVE-2024-6387-Mitigation-Ansible-Playbook",
"full_name": "daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook",
"owner": {
"login": "daniel-odrinski",
"id": 22768251,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22768251?v=4",
"html_url": "https:\/\/github.com\/daniel-odrinski",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/daniel-odrinski\/CVE-2024-6387-Mitigation-Ansible-Playbook",
"description": "An Ansible Playbook to mitigate the risk of RCE (CVE-2024-6387) until platforms update OpenSSH to a non-vulnerable version.",
"fork": false,
"created_at": "2024-07-02T10:34:17Z",
"updated_at": "2024-07-02T11:05:58Z",
"pushed_at": "2024-07-02T11:05:55Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823065840,
"name": "openssh-cve-2024-6387.sh",
"full_name": "rumochnaya\/openssh-cve-2024-6387.sh",
"owner": {
"login": "rumochnaya",
"id": 8115717,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/8115717?v=4",
"html_url": "https:\/\/github.com\/rumochnaya",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/rumochnaya\/openssh-cve-2024-6387.sh",
"description": "openssh-cve-2024-6387.sh",
"fork": false,
"created_at": "2024-07-02T11:05:07Z",
"updated_at": "2024-07-04T11:27:01Z",
"pushed_at": "2024-07-02T11:23:35Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 823067387,
"name": "CVE-2024-6387-Mitigation",
"full_name": "zenzue\/CVE-2024-6387-Mitigation",
"owner": {
"login": "zenzue",
"id": 19271340,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19271340?v=4",
"html_url": "https:\/\/github.com\/zenzue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zenzue\/CVE-2024-6387-Mitigation",
"description": "Mitigation Guide for CVE-2024-6387 in OpenSSH",
"fork": false,
"created_at": "2024-07-02T11:08:40Z",
"updated_at": "2024-07-02T11:17:15Z",
"pushed_at": "2024-07-02T11:17:12Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823086763,
"name": "CVE-2024-6387-Check",
"full_name": "devarshishimpi\/CVE-2024-6387-Check",
"owner": {
"login": "devarshishimpi",
"id": 43378923,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43378923?v=4",
"html_url": "https:\/\/github.com\/devarshishimpi",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/devarshishimpi\/CVE-2024-6387-Check",
"description": "CVE-2024-6387 Checker is a fast, efficient tool for detecting OpenSSH servers vulnerable to the regreSSHion exploit. It quickly scans multiple IPs, domain names, and CIDR ranges to identify risks and help secure your infrastructure.",
"fork": false,
"created_at": "2024-07-02T11:55:39Z",
"updated_at": "2025-01-05T23:59:18Z",
"pushed_at": "2024-07-08T20:39:03Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"bash",
"cve-2024-6387",
"cve-2024-6387-checker",
"devarshishimpi",
"openssh",
"openssh-client",
"openssh-server",
"openssh-sftp-server",
"regresshion",
"ssh",
"vulnerability-detection",
"vulnerability-scanners"
],
"visibility": "public",
"forks": 3,
"watchers": 13,
"score": 0,
"subscribers_count": 2
},
{
"id": 823099379,
"name": "cve-2024-6387_AImade",
"full_name": "hssmo\/cve-2024-6387_AImade",
"owner": {
"login": "hssmo",
"id": 99412060,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99412060?v=4",
"html_url": "https:\/\/github.com\/hssmo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hssmo\/cve-2024-6387_AImade",
"description": "cve-2024-6387_AImade",
"fork": false,
"created_at": "2024-07-02T12:24:25Z",
"updated_at": "2024-07-02T12:34:36Z",
"pushed_at": "2024-07-02T12:34:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823109994,
"name": "checker-CVE-2024-6387",
"full_name": "ACHUX21\/checker-CVE-2024-6387",
"owner": {
"login": "ACHUX21",
"id": 130113878,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/130113878?v=4",
"html_url": "https:\/\/github.com\/ACHUX21",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ACHUX21\/checker-CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-02T12:48:27Z",
"updated_at": "2024-07-19T10:54:54Z",
"pushed_at": "2024-07-02T13:18:38Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 823118069,
"name": "ssh_exploiter_CVE-2024-6387",
"full_name": "AiGptCode\/ssh_exploiter_CVE-2024-6387",
"owner": {
"login": "AiGptCode",
"id": 146197697,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146197697?v=4",
"html_url": "https:\/\/github.com\/AiGptCode",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AiGptCode\/ssh_exploiter_CVE-2024-6387",
"description": "CVE-2024-6387 with auto ip scanner and auto expliot ",
"fork": false,
"created_at": "2024-07-02T12:57:35Z",
"updated_at": "2025-01-09T16:45:26Z",
"pushed_at": "2024-07-04T01:55:26Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"android",
"cve",
"cve-2024-6387",
"exploit",
"ftp",
"hack",
"hacktoberfest",
"kali",
"kali-linux",
"linux",
"openssh",
"python",
"python3",
"root",
"shell",
"ssh",
"windows"
],
"visibility": "public",
"forks": 3,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 823151186,
"name": "regreSSHion-nmap-scanner",
"full_name": "xristos8574\/regreSSHion-nmap-scanner",
"owner": {
"login": "xristos8574",
"id": 48923762,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/48923762?v=4",
"html_url": "https:\/\/github.com\/xristos8574",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xristos8574\/regreSSHion-nmap-scanner",
"description": "A bash script for nmap to scan for vulnerable machines in regards to the latest CVE-2024-6387",
"fork": false,
"created_at": "2024-07-02T13:50:47Z",
"updated_at": "2024-07-02T13:52:27Z",
"pushed_at": "2024-07-02T13:52:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823184811,
"name": "regreSSHion",
"full_name": "xonoxitron\/regreSSHion",
"owner": {
"login": "xonoxitron",
"id": 7057784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4",
"html_url": "https:\/\/github.com\/xonoxitron",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion",
"description": "CVE-2024-6387 (regreSSHion) Exploit (PoC), a vulnerability in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-02T14:41:43Z",
"updated_at": "2025-01-13T03:23:03Z",
"pushed_at": "2024-07-02T15:16:04Z",
"stargazers_count": 33,
"watchers_count": 33,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"c",
"cve-2024-6387",
"exploit",
"glibc",
"linux",
"openssh",
"poc",
"regresshion",
"sshd"
],
"visibility": "public",
"forks": 8,
"watchers": 33,
"score": 0,
"subscribers_count": 2
},
{
"id": 823199757,
"name": "CVE-2024-6387",
"full_name": "no-one-sec\/CVE-2024-6387",
"owner": {
"login": "no-one-sec",
"id": 118190089,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118190089?v=4",
"html_url": "https:\/\/github.com\/no-one-sec",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/no-one-sec\/CVE-2024-6387",
"description": "开箱即用的AK47",
"fork": false,
"created_at": "2024-07-02T15:13:09Z",
"updated_at": "2024-07-02T15:14:52Z",
"pushed_at": "2024-07-02T15:13:09Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823199952,
"name": "CVE-2024-6387",
"full_name": "dawnl3ss\/CVE-2024-6387",
"owner": {
"login": "dawnl3ss",
"id": 52249849,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52249849?v=4",
"html_url": "https:\/\/github.com\/dawnl3ss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dawnl3ss\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-02T15:13:33Z",
"updated_at": "2024-07-02T15:14:40Z",
"pushed_at": "2024-07-02T15:14:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823236084,
"name": "CVE-2024-6387-Exploit-POC",
"full_name": "MrR0b0t19\/CVE-2024-6387-Exploit-POC",
"owner": {
"login": "MrR0b0t19",
"id": 63489501,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/63489501?v=4",
"html_url": "https:\/\/github.com\/MrR0b0t19",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/MrR0b0t19\/CVE-2024-6387-Exploit-POC",
"description": null,
"fork": false,
"created_at": "2024-07-02T16:34:12Z",
"updated_at": "2024-07-14T06:25:24Z",
"pushed_at": "2024-07-02T16:38:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 823250035,
"name": "CVE-2024-6387",
"full_name": "th3gokul\/CVE-2024-6387",
"owner": {
"login": "th3gokul",
"id": 89386101,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89386101?v=4",
"html_url": "https:\/\/github.com\/th3gokul",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/th3gokul\/CVE-2024-6387",
"description": "CVE-2024-6387 : Vulnerability Detection tool for regreSSHion Remote Unauthenticated Code Execution in OpenSSH Server",
"fork": false,
"created_at": "2024-07-02T17:04:52Z",
"updated_at": "2024-10-20T09:56:28Z",
"pushed_at": "2024-07-02T17:47:29Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 823284825,
"name": "Test_CVE-2024-6387",
"full_name": "n1cks0n\/Test_CVE-2024-6387",
"owner": {
"login": "n1cks0n",
"id": 100887222,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/100887222?v=4",
"html_url": "https:\/\/github.com\/n1cks0n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/n1cks0n\/Test_CVE-2024-6387",
"description": "Test_CVE-2024-6387 is a lightweight, efficient tool designed to identify servers running vulnerable versions of OpenSSH",
"fork": false,
"created_at": "2024-07-02T18:30:28Z",
"updated_at": "2024-07-02T18:31:58Z",
"pushed_at": "2024-07-02T18:31:41Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 823285710,
"name": "CVE-2024-6387",
"full_name": "l0n3m4n\/CVE-2024-6387",
"owner": {
"login": "l0n3m4n",
"id": 143868630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/143868630?v=4",
"html_url": "https:\/\/github.com\/l0n3m4n",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/l0n3m4n\/CVE-2024-6387",
"description": "PoC - Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (Scanner and Exploit) ",
"fork": false,
"created_at": "2024-07-02T18:32:46Z",
"updated_at": "2025-01-15T11:09:53Z",
"pushed_at": "2024-07-05T15:19:28Z",
"stargazers_count": 76,
"watchers_count": 76,
"has_discussions": false,
"forks_count": 30,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-6387",
"exploit",
"openssh-server",
"payload",
"poc",
"python3",
"rce"
],
"visibility": "public",
"forks": 30,
"watchers": 76,
"score": 0,
"subscribers_count": 3
},
{
"id": 823291064,
"name": "CVE-2024-6387-Checker",
"full_name": "RickGeex\/CVE-2024-6387-Checker",
"owner": {
"login": "RickGeex",
"id": 7975904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7975904?v=4",
"html_url": "https:\/\/github.com\/RickGeex",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/RickGeex\/CVE-2024-6387-Checker",
"description": "CVE-2024-6387-Check is a streamlined and efficient tool created to detect servers operating on vulnerable versions of OpenSSH.",
"fork": false,
"created_at": "2024-07-02T18:46:24Z",
"updated_at": "2024-07-02T20:32:50Z",
"pushed_at": "2024-07-02T20:32:48Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823296113,
"name": "regreSSHion-checker",
"full_name": "xonoxitron\/regreSSHion-checker",
"owner": {
"login": "xonoxitron",
"id": 7057784,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7057784?v=4",
"html_url": "https:\/\/github.com\/xonoxitron",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/xonoxitron\/regreSSHion-checker",
"description": "Quickly identifies servers vulnerable to OpenSSH 'regreSSHion' (CVE-2024-6387).",
"fork": false,
"created_at": "2024-07-02T18:59:54Z",
"updated_at": "2024-11-20T01:42:09Z",
"pushed_at": "2024-07-02T19:06:01Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387",
"glibc",
"golang",
"linux",
"openssh",
"regresshion",
"sshd"
],
"visibility": "public",
"forks": 3,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 823323116,
"name": "cve-2024-6387-nuclei-template",
"full_name": "BrandonLynch2402\/cve-2024-6387-nuclei-template",
"owner": {
"login": "BrandonLynch2402",
"id": 19439875,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19439875?v=4",
"html_url": "https:\/\/github.com\/BrandonLynch2402",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/BrandonLynch2402\/cve-2024-6387-nuclei-template",
"description": null,
"fork": false,
"created_at": "2024-07-02T20:19:12Z",
"updated_at": "2024-07-31T06:59:36Z",
"pushed_at": "2024-07-02T20:28:35Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 823328220,
"name": "CVE-2024-6387_Check",
"full_name": "edsonjt81\/CVE-2024-6387_Check",
"owner": {
"login": "edsonjt81",
"id": 27496739,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27496739?v=4",
"html_url": "https:\/\/github.com\/edsonjt81",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/edsonjt81\/CVE-2024-6387_Check",
"description": null,
"fork": false,
"created_at": "2024-07-02T20:35:53Z",
"updated_at": "2024-07-02T20:38:08Z",
"pushed_at": "2024-07-02T20:38:06Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823340268,
"name": "CVE-2024-6387",
"full_name": "grupooruss\/CVE-2024-6387",
"owner": {
"login": "grupooruss",
"id": 43943489,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/43943489?v=4",
"html_url": "https:\/\/github.com\/grupooruss",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/grupooruss\/CVE-2024-6387",
"description": "regreSSHion vulnerability in OpenSSH CVE-2024-6387 Testing Script",
"fork": false,
"created_at": "2024-07-02T21:16:45Z",
"updated_at": "2024-07-08T23:58:50Z",
"pushed_at": "2024-07-02T21:30:12Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 823349523,
"name": "CVE-2024-6387-Checker",
"full_name": "CognisysGroup\/CVE-2024-6387-Checker",
"owner": {
"login": "CognisysGroup",
"id": 101755095,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101755095?v=4",
"html_url": "https:\/\/github.com\/CognisysGroup",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/CognisysGroup\/CVE-2024-6387-Checker",
"description": null,
"fork": false,
"created_at": "2024-07-02T21:47:02Z",
"updated_at": "2024-07-03T12:15:46Z",
"pushed_at": "2024-07-03T12:13:37Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823487291,
"name": "CVE-2024-6387",
"full_name": "sxlmnwb\/CVE-2024-6387",
"owner": {
"login": "sxlmnwb",
"id": 65052912,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65052912?v=4",
"html_url": "https:\/\/github.com\/sxlmnwb",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sxlmnwb\/CVE-2024-6387",
"description": "Targeting a signal handler race condition in OpenSSH's server (sshd) on glibc-based Linux systems.",
"fork": false,
"created_at": "2024-07-03T06:08:32Z",
"updated_at": "2024-12-05T20:11:29Z",
"pushed_at": "2024-07-03T06:47:46Z",
"stargazers_count": 11,
"watchers_count": 11,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387"
],
"visibility": "public",
"forks": 6,
"watchers": 11,
"score": 0,
"subscribers_count": 1
},
{
"id": 823542110,
"name": "CVE-2024-6387",
"full_name": "Symbolexe\/CVE-2024-6387",
"owner": {
"login": "Symbolexe",
"id": 140549630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/140549630?v=4",
"html_url": "https:\/\/github.com\/Symbolexe",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Symbolexe\/CVE-2024-6387",
"description": "SSH Exploit for CVE-2024-6387 : RCE in OpenSSH's server, on glibc-based Linux systems",
"fork": false,
"created_at": "2024-07-03T08:22:57Z",
"updated_at": "2024-08-20T21:05:45Z",
"pushed_at": "2024-07-04T15:07:21Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-6387",
"exploit",
"pentesting",
"python3",
"redteam"
],
"visibility": "public",
"forks": 5,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 823593765,
"name": "sentinelssh",
"full_name": "harshinsecurity\/sentinelssh",
"owner": {
"login": "harshinsecurity",
"id": 51978908,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/51978908?v=4",
"html_url": "https:\/\/github.com\/harshinsecurity",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/harshinsecurity\/sentinelssh",
"description": "SentinelSSH is an advanced, high-performance SSH vulnerability scanner written in Go. It's specifically designed to detect the CVE-2024-6387 vulnerability in OpenSSH servers across various network environments.",
"fork": false,
"created_at": "2024-07-03T10:26:23Z",
"updated_at": "2024-09-07T05:01:32Z",
"pushed_at": "2024-07-08T07:32:32Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2024-6387",
"exploit",
"openssh",
"ssh"
],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 823665546,
"name": "cve-2024-6387-poc",
"full_name": "t3rry327\/cve-2024-6387-poc",
"owner": {
"login": "t3rry327",
"id": 65151897,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/65151897?v=4",
"html_url": "https:\/\/github.com\/t3rry327",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/t3rry327\/cve-2024-6387-poc",
"description": null,
"fork": false,
"created_at": "2024-07-03T13:21:10Z",
"updated_at": "2024-07-03T13:25:02Z",
"pushed_at": "2024-07-03T13:24:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823735743,
"name": "CVE-2024-6387_poc",
"full_name": "jocker2410\/CVE-2024-6387_poc",
"owner": {
"login": "jocker2410",
"id": 22291909,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22291909?v=4",
"html_url": "https:\/\/github.com\/jocker2410",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/jocker2410\/CVE-2024-6387_poc",
"description": null,
"fork": false,
"created_at": "2024-07-03T15:51:16Z",
"updated_at": "2024-08-04T10:50:56Z",
"pushed_at": "2024-08-04T10:50:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823899223,
"name": "sshd-logingracetime0",
"full_name": "liqhtnd\/sshd-logingracetime0",
"owner": {
"login": "liqhtnd",
"id": 88907425,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/88907425?v=4",
"html_url": "https:\/\/github.com\/liqhtnd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/liqhtnd\/sshd-logingracetime0",
"description": "Script to address CVE-2024-6387 by changing the LoginGraceTime in sshd.",
"fork": false,
"created_at": "2024-07-04T01:02:34Z",
"updated_at": "2024-07-13T18:45:36Z",
"pushed_at": "2024-07-13T18:43:04Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823939765,
"name": "ssh-CVE-2024-6387-poc",
"full_name": "JackSparrowhk\/ssh-CVE-2024-6387-poc",
"owner": {
"login": "JackSparrowhk",
"id": 108756180,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/108756180?v=4",
"html_url": "https:\/\/github.com\/JackSparrowhk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/JackSparrowhk\/ssh-CVE-2024-6387-poc",
"description": "CVE-2024-6387_Check 是一款轻量级、高效的工具,旨在识别运行易受攻击的 OpenSSH 版本的服务器专门针对最近发现的regreSSHion漏洞 (CVE-2024-6387)。此脚本有助于快速扫描多个 IP 地址、域名和 CIDR 网络范围,以检测潜在漏洞并确保您的基础设施安全。",
"fork": false,
"created_at": "2024-07-04T03:51:16Z",
"updated_at": "2024-07-04T03:51:16Z",
"pushed_at": "2024-07-04T03:51:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 823940931,
"name": "CVE-2024-6387-OpenSSH-Vulnerability-Checker",
"full_name": "turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker",
"owner": {
"login": "turbobit",
"id": 11604783,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11604783?v=4",
"html_url": "https:\/\/github.com\/turbobit",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/turbobit\/CVE-2024-6387-OpenSSH-Vulnerability-Checker",
"description": "Welcome to the CVE-2024-6387 OpenSSH Vulnerability Checker repository! This project offers multiple scripts to check the installed version of OpenSSH on your system and determine if it is vulnerable to CVE-2024-6387. It supports various environments, including Ubuntu, Mac, and Windows.",
"fork": false,
"created_at": "2024-07-04T03:56:08Z",
"updated_at": "2024-07-07T21:11:55Z",
"pushed_at": "2024-07-04T05:13:49Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387-checker"
],
"visibility": "public",
"forks": 1,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 823979710,
"name": "CVE-2024-6387",
"full_name": "sms2056\/CVE-2024-6387",
"owner": {
"login": "sms2056",
"id": 15358350,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15358350?v=4",
"html_url": "https:\/\/github.com\/sms2056",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sms2056\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-04T06:10:56Z",
"updated_at": "2024-07-04T06:16:22Z",
"pushed_at": "2024-07-04T06:16:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824151224,
"name": "regreSSHion-CVE-2024-6387-",
"full_name": "invaderslabs\/regreSSHion-CVE-2024-6387-",
"owner": {
"login": "invaderslabs",
"id": 149894888,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/149894888?v=4",
"html_url": "https:\/\/github.com\/invaderslabs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/invaderslabs\/regreSSHion-CVE-2024-6387-",
"description": "Provides instructions for using the script to check if your OpenSSH installation is vulnerable to CVE-2024-6387",
"fork": false,
"created_at": "2024-07-04T13:15:54Z",
"updated_at": "2024-07-04T22:22:18Z",
"pushed_at": "2024-07-04T22:22:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824156825,
"name": "CVE-2024-6387",
"full_name": "lala-amber\/CVE-2024-6387",
"owner": {
"login": "lala-amber",
"id": 72958716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72958716?v=4",
"html_url": "https:\/\/github.com\/lala-amber",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/lala-amber\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-04T13:28:53Z",
"updated_at": "2024-10-07T12:21:51Z",
"pushed_at": "2024-07-04T13:35:57Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 824185491,
"name": "regreSSHive",
"full_name": "4lxprime\/regreSSHive",
"owner": {
"login": "4lxprime",
"id": 58915711,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/58915711?v=4",
"html_url": "https:\/\/github.com\/4lxprime",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/4lxprime\/regreSSHive",
"description": "rewrited SSH Exploit for CVE-2024-6387 (regreSSHion)",
"fork": false,
"created_at": "2024-07-04T14:34:21Z",
"updated_at": "2024-07-04T15:27:03Z",
"pushed_at": "2024-07-04T14:34:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 3,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"6387",
"c",
"cve",
"cve-2024-6387",
"exploit",
"poc",
"regresshion",
"ssh",
"sshd"
],
"visibility": "public",
"forks": 3,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824318880,
"name": "CVE-2024-6387_Check",
"full_name": "sardine-web\/CVE-2024-6387_Check",
"owner": {
"login": "sardine-web",
"id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387_Check",
"description": "A security regression (CVE-2006-5051) was discovered in OpenSSH's server (sshd). There is a race condition which can lead to sshd to handle some signals in an unsafe manner. An unauthenticated, remote attacker may be able to trigger it by failing to authenticate within a set time period.",
"fork": false,
"created_at": "2024-07-04T21:20:26Z",
"updated_at": "2024-07-05T10:10:03Z",
"pushed_at": "2024-07-04T21:31:17Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824382817,
"name": "cve-2024-6387_hassh",
"full_name": "0x4D31\/cve-2024-6387_hassh",
"owner": {
"login": "0x4D31",
"id": 11577776,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/11577776?v=4",
"html_url": "https:\/\/github.com\/0x4D31",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/0x4D31\/cve-2024-6387_hassh",
"description": "HASSH fingerprints for identifying OpenSSH servers potentially vulnerable to CVE-2024-6387 (regreSSHion).",
"fork": false,
"created_at": "2024-07-05T02:46:57Z",
"updated_at": "2024-09-27T09:29:35Z",
"pushed_at": "2024-07-05T03:40:53Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387",
"fingerprint",
"hassh",
"regresshion",
"ssh"
],
"visibility": "public",
"forks": 1,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 824544385,
"name": "CVE-2024-6387-template",
"full_name": "sardine-web\/CVE-2024-6387-template",
"owner": {
"login": "sardine-web",
"id": 80635620,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/80635620?v=4",
"html_url": "https:\/\/github.com\/sardine-web",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sardine-web\/CVE-2024-6387-template",
"description": "Quick regreSSHion checker (based on software version) for nuclei CVE-2024-6387",
"fork": false,
"created_at": "2024-07-05T11:05:26Z",
"updated_at": "2024-07-06T17:26:24Z",
"pushed_at": "2024-07-06T17:26:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824549009,
"name": "CVE-2024-6387",
"full_name": "imv7\/CVE-2024-6387",
"owner": {
"login": "imv7",
"id": 13357603,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/13357603?v=4",
"html_url": "https:\/\/github.com\/imv7",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/imv7\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-05T11:18:38Z",
"updated_at": "2024-07-05T11:19:24Z",
"pushed_at": "2024-07-05T11:19:21Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824639761,
"name": "CVE-2024-6387-Finder",
"full_name": "SiberianHacker\/CVE-2024-6387-Finder",
"owner": {
"login": "SiberianHacker",
"id": 115571334,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/115571334?v=4",
"html_url": "https:\/\/github.com\/SiberianHacker",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/SiberianHacker\/CVE-2024-6387-Finder",
"description": "CVE-2024-6387 SSH finder",
"fork": false,
"created_at": "2024-07-05T15:15:41Z",
"updated_at": "2024-07-05T15:22:29Z",
"pushed_at": "2024-07-05T15:22:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 824752906,
"name": "CVE-2024-6387-how-to-fix",
"full_name": "azurejoga\/CVE-2024-6387-how-to-fix",
"owner": {
"login": "azurejoga",
"id": 91762249,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91762249?v=4",
"html_url": "https:\/\/github.com\/azurejoga",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/azurejoga\/CVE-2024-6387-how-to-fix",
"description": "Vulnerability remediation and mitigationCVE-2024-6387",
"fork": false,
"created_at": "2024-07-05T21:29:11Z",
"updated_at": "2024-08-12T14:40:39Z",
"pushed_at": "2024-07-05T21:47:44Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 825724862,
"name": "CVE-2024-6387",
"full_name": "asterictnl-lvdw\/CVE-2024-6387",
"owner": {
"login": "asterictnl-lvdw",
"id": 99249102,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/99249102?v=4",
"html_url": "https:\/\/github.com\/asterictnl-lvdw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/asterictnl-lvdw\/CVE-2024-6387",
"description": "Remote Unauthenticated Code Execution Vulnerability in OpenSSH server (CVE-2024-6387)",
"fork": false,
"created_at": "2024-07-08T11:27:49Z",
"updated_at": "2025-01-13T14:30:19Z",
"pushed_at": "2024-08-22T08:50:25Z",
"stargazers_count": 74,
"watchers_count": 74,
"has_discussions": false,
"forks_count": 31,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 31,
"watchers": 74,
"score": 0,
"subscribers_count": 3
},
{
"id": 825734560,
"name": "regreSSHion",
"full_name": "vkaushik-chef\/regreSSHion",
"owner": {
"login": "vkaushik-chef",
"id": 91254377,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91254377?v=4",
"html_url": "https:\/\/github.com\/vkaushik-chef",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/vkaushik-chef\/regreSSHion",
"description": "Chef Inspec profile for checking regreSSHion vulnerability CVE-2024-6387",
"fork": false,
"created_at": "2024-07-08T11:48:15Z",
"updated_at": "2024-07-08T12:04:36Z",
"pushed_at": "2024-07-08T12:04:33Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 826287983,
"name": "mitigate-CVE-2024-6387",
"full_name": "dgourillon\/mitigate-CVE-2024-6387",
"owner": {
"login": "dgourillon",
"id": 50948886,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50948886?v=4",
"html_url": "https:\/\/github.com\/dgourillon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dgourillon\/mitigate-CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-09T12:16:44Z",
"updated_at": "2024-07-09T16:03:07Z",
"pushed_at": "2024-07-09T16:03:03Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 826336009,
"name": "CVE-2024-6387",
"full_name": "mrmtwoj\/CVE-2024-6387",
"owner": {
"login": "mrmtwoj",
"id": 22832463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/22832463?v=4",
"html_url": "https:\/\/github.com\/mrmtwoj",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/mrmtwoj\/CVE-2024-6387",
"description": "regreSSHion is a security tool designed to test for vulnerabilities related to CVE-2024-6387, specifically focusing on SSH and remote access exploitation. ",
"fork": false,
"created_at": "2024-07-09T14:06:02Z",
"updated_at": "2024-10-07T04:02:49Z",
"pushed_at": "2024-07-09T14:29:30Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2024-6387",
"cve-2024-6387-checker",
"openssh",
"openssh-key",
"poc",
"regresshion-cve-2024-6387-ssh-security"
],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 826432240,
"name": "CVE-2024-6387-Vulnerability-Checker",
"full_name": "filipi86\/CVE-2024-6387-Vulnerability-Checker",
"owner": {
"login": "filipi86",
"id": 31785433,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/31785433?v=4",
"html_url": "https:\/\/github.com\/filipi86",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/filipi86\/CVE-2024-6387-Vulnerability-Checker",
"description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.",
"fork": false,
"created_at": "2024-07-09T17:40:19Z",
"updated_at": "2024-10-23T02:21:38Z",
"pushed_at": "2024-07-10T15:24:08Z",
"stargazers_count": 92,
"watchers_count": 92,
"has_discussions": false,
"forks_count": 17,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 17,
"watchers": 92,
"score": 0,
"subscribers_count": 2
},
{
"id": 826508816,
"name": "CVE-2024-6387-Vulnerability-Checker",
"full_name": "kubota\/CVE-2024-6387-Vulnerability-Checker",
"owner": {
"login": "kubota",
"id": 119277,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/119277?v=4",
"html_url": "https:\/\/github.com\/kubota",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/kubota\/CVE-2024-6387-Vulnerability-Checker",
"description": "This Rust Code is designed to check SSH servers for the CVE-2024-6387 vulnerability",
"fork": false,
"created_at": "2024-07-09T21:01:15Z",
"updated_at": "2024-07-11T05:46:45Z",
"pushed_at": "2024-07-09T21:08:19Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 826836993,
"name": "cve-2024-6387-poc",
"full_name": "DimaMend\/cve-2024-6387-poc",
"owner": {
"login": "DimaMend",
"id": 145161091,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145161091?v=4",
"html_url": "https:\/\/github.com\/DimaMend",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DimaMend\/cve-2024-6387-poc",
"description": null,
"fork": false,
"created_at": "2024-07-10T13:27:23Z",
"updated_at": "2024-07-10T13:33:54Z",
"pushed_at": "2024-07-10T13:33:50Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 2
},
{
"id": 827444140,
"name": "mitigate_ssh",
"full_name": "Sibijo\/mitigate_ssh",
"owner": {
"login": "Sibijo",
"id": 148327357,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/148327357?v=4",
"html_url": "https:\/\/github.com\/Sibijo",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Sibijo\/mitigate_ssh",
"description": " OpenSSH vulnerability CVE-2024-6387",
"fork": false,
"created_at": "2024-07-11T16:54:41Z",
"updated_at": "2024-07-29T17:48:05Z",
"pushed_at": "2024-07-11T16:55:52Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 827570389,
"name": "regreSSHion-Fix",
"full_name": "Passyed\/regreSSHion-Fix",
"owner": {
"login": "Passyed",
"id": 102136066,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102136066?v=4",
"html_url": "https:\/\/github.com\/Passyed",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Passyed\/regreSSHion-Fix",
"description": "Fix for regreSSHion CVE-2024-6387 for Ubuntu and Debian",
"fork": false,
"created_at": "2024-07-11T23:22:14Z",
"updated_at": "2024-07-12T00:07:02Z",
"pushed_at": "2024-07-12T00:06:59Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 828627988,
"name": "CVE-2024-6387",
"full_name": "dream434\/CVE-2024-6387",
"owner": {
"login": "dream434",
"id": 114837630,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/114837630?v=4",
"html_url": "https:\/\/github.com\/dream434",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/dream434\/CVE-2024-6387",
"description": " OpenSSH a publié un avis de sécurité concernant la vulnérabilité critique CVE-2024-6387. Cette vulnérabilité permet à un attaquant non authentifié d'exécuter du code arbitraire",
"fork": false,
"created_at": "2024-07-14T18:00:49Z",
"updated_at": "2024-07-14T18:05:22Z",
"pushed_at": "2024-07-14T18:02:26Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 829031934,
"name": "CVE-2024-6387",
"full_name": "ThatNotEasy\/CVE-2024-6387",
"owner": {
"login": "ThatNotEasy",
"id": 25004320,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/25004320?v=4",
"html_url": "https:\/\/github.com\/ThatNotEasy",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ThatNotEasy\/CVE-2024-6387",
"description": "OpenSSH RCE Massive Vulnerable Scanner",
"fork": false,
"created_at": "2024-07-15T16:04:57Z",
"updated_at": "2024-10-30T04:42:06Z",
"pushed_at": "2024-07-15T16:06:41Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 833415966,
"name": "CVE-2024-6387",
"full_name": "prelearn-code\/CVE-2024-6387",
"owner": {
"login": "prelearn-code",
"id": 175189722,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/175189722?v=4",
"html_url": "https:\/\/github.com\/prelearn-code",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/prelearn-code\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-07-25T02:32:19Z",
"updated_at": "2024-08-06T14:08:36Z",
"pushed_at": "2024-07-25T02:37:55Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 835582804,
"name": "CVE-2024-6387",
"full_name": "l-urk\/CVE-2024-6387",
"owner": {
"login": "l-urk",
"id": 112792604,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/112792604?v=4",
"html_url": "https:\/\/github.com\/l-urk",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/l-urk\/CVE-2024-6387",
"description": "Proof of concept python script for regreSSHion exploit. ",
"fork": false,
"created_at": "2024-07-30T06:13:11Z",
"updated_at": "2024-11-20T12:28:26Z",
"pushed_at": "2024-10-19T04:58:22Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": true,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 836283983,
"name": "ssh_poc2024",
"full_name": "alex14324\/ssh_poc2024",
"owner": {
"login": "alex14324",
"id": 36421715,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/36421715?v=4",
"html_url": "https:\/\/github.com\/alex14324",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/alex14324\/ssh_poc2024",
"description": "An exploit for CVE-2024-6387, targeting a signal handler race condition in OpenSSH's server ",
"fork": false,
"created_at": "2024-07-31T14:19:19Z",
"updated_at": "2024-07-31T14:20:46Z",
"pushed_at": "2024-07-31T14:19:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 838725789,
"name": "CVE-2023-4596-OpenSSH-Multi-Checker",
"full_name": "X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker",
"owner": {
"login": "X-Projetion",
"id": 161194427,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/161194427?v=4",
"html_url": "https:\/\/github.com\/X-Projetion",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/X-Projetion\/CVE-2023-4596-OpenSSH-Multi-Checker",
"description": "CVE-2024-6387-checker is a tool or script designed to detect the security vulnerability known as CVE-2024-6387 OpenSSH. CVE-2024-6387 OpenSSH is an entry in the Common Vulnerabilities and Exposures (CVE) that documents security weaknesses discovered in certain software or systems.",
"fork": false,
"created_at": "2024-08-06T08:12:48Z",
"updated_at": "2024-08-10T11:17:27Z",
"pushed_at": "2024-08-06T08:27:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 844630300,
"name": "CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH",
"full_name": "s1d6point7bugcrowd\/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH",
"owner": {
"login": "s1d6point7bugcrowd",
"id": 163605035,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/163605035?v=4",
"html_url": "https:\/\/github.com\/s1d6point7bugcrowd",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/s1d6point7bugcrowd\/CVE-2024-6387-Race-Condition-in-Signal-Handling-for-OpenSSH",
"description": null,
"fork": false,
"created_at": "2024-08-19T16:45:53Z",
"updated_at": "2024-08-19T16:47:17Z",
"pushed_at": "2024-08-19T16:47:14Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 844959580,
"name": "OpenSSH-CVE-2024-6387-Fix",
"full_name": "almogopp\/OpenSSH-CVE-2024-6387-Fix",
"owner": {
"login": "almogopp",
"id": 37026702,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37026702?v=4",
"html_url": "https:\/\/github.com\/almogopp",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/almogopp\/OpenSSH-CVE-2024-6387-Fix",
"description": "A Bash script to mitigate the CVE-2024-6387 vulnerability in OpenSSH by providing an option to upgrade to a secure version or apply a temporary workaround. This repository helps secure systems against potential remote code execution risks associated with affected OpenSSH versions.",
"fork": false,
"created_at": "2024-08-20T09:57:24Z",
"updated_at": "2024-08-20T09:58:35Z",
"pushed_at": "2024-08-20T09:58:32Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 847548583,
"name": "CVE-2024-6387_Check",
"full_name": "HadesNull123\/CVE-2024-6387_Check",
"owner": {
"login": "HadesNull123",
"id": 56301165,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56301165?v=4",
"html_url": "https:\/\/github.com\/HadesNull123",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/HadesNull123\/CVE-2024-6387_Check",
"description": "RCE OpenSSH CVE-2024-6387 Check and Exploit",
"fork": false,
"created_at": "2024-08-26T04:40:27Z",
"updated_at": "2024-08-26T04:41:05Z",
"pushed_at": "2024-08-26T04:41:02Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 848825194,
"name": "CVE-2024-6387-Vulnerability-Checker",
"full_name": "identity-threat-labs\/CVE-2024-6387-Vulnerability-Checker",
"owner": {
"login": "identity-threat-labs",
"id": 179711116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179711116?v=4",
"html_url": "https:\/\/github.com\/identity-threat-labs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/identity-threat-labs\/CVE-2024-6387-Vulnerability-Checker",
"description": "This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, and ports. The script can also read addresses from a file.",
"fork": false,
"created_at": "2024-08-28T13:28:08Z",
"updated_at": "2024-10-31T05:34:32Z",
"pushed_at": "2024-08-29T14:52:33Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 0
},
{
"id": 849418620,
"name": "Article-RegreSSHion-CVE-2024-6387",
"full_name": "identity-threat-labs\/Article-RegreSSHion-CVE-2024-6387",
"owner": {
"login": "identity-threat-labs",
"id": 179711116,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/179711116?v=4",
"html_url": "https:\/\/github.com\/identity-threat-labs",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/identity-threat-labs\/Article-RegreSSHion-CVE-2024-6387",
"description": "In an era where digital security is crucial, a new vulnerability in OpenSSH, identified as CVE-2024-6387, has drawn the attention of system administrators and security professionals worldwide. Named \"regreSSHion,\" this severe security flaw allows remote code execution (RCE) and could significant threat to the integrity of vulnerable systems.",
"fork": false,
"created_at": "2024-08-29T15:00:56Z",
"updated_at": "2024-09-04T16:27:20Z",
"pushed_at": "2024-08-29T15:06:16Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 0
},
{
"id": 876504709,
"name": "CVE-2024-6387-poc-1",
"full_name": "anhvutuan\/CVE-2024-6387-poc-1",
"owner": {
"login": "anhvutuan",
"id": 74167929,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74167929?v=4",
"html_url": "https:\/\/github.com\/anhvutuan",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/anhvutuan\/CVE-2024-6387-poc-1",
"description": "CVE-2024-6387, also known as RegreSSHion, is a high-severity vulnerability found in OpenSSH servers (sshd) running on glibc-based Linux systems. It is a regression of a previously fixed vulnerability (CVE-2006-5051), which means the issue was reintroduced in newer versions of OpenSSH.",
"fork": false,
"created_at": "2024-10-22T04:50:10Z",
"updated_at": "2024-10-22T04:50:10Z",
"pushed_at": "2024-07-11T14:59:20Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 893527608,
"name": "CVE-2024-6387",
"full_name": "YassDEV221608\/CVE-2024-6387",
"owner": {
"login": "YassDEV221608",
"id": 145906163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4",
"html_url": "https:\/\/github.com\/YassDEV221608",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-11-24T17:12:26Z",
"updated_at": "2024-11-24T17:14:33Z",
"pushed_at": "2024-11-24T17:14:29Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 905536150,
"name": "CVE-2024-6387",
"full_name": "zql-gif\/CVE-2024-6387",
"owner": {
"login": "zql-gif",
"id": 84617316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/84617316?v=4",
"html_url": "https:\/\/github.com\/zql-gif",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/zql-gif\/CVE-2024-6387",
"description": null,
"fork": false,
"created_at": "2024-12-19T03:08:19Z",
"updated_at": "2024-12-19T06:49:55Z",
"pushed_at": "2024-12-19T06:49:52Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 905684125,
"name": "test_for6387",
"full_name": "awusan125\/test_for6387",
"owner": {
"login": "awusan125",
"id": 74240688,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74240688?v=4",
"html_url": "https:\/\/github.com\/awusan125",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/awusan125\/test_for6387",
"description": "test code for cve-2024-6387",
"fork": false,
"created_at": "2024-12-19T10:16:45Z",
"updated_at": "2024-12-22T08:24:49Z",
"pushed_at": "2024-12-22T08:24:46Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 911826074,
"name": "CVE-2024-6387_PoC",
"full_name": "YassDEV221608\/CVE-2024-6387_PoC",
"owner": {
"login": "YassDEV221608",
"id": 145906163,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/145906163?v=4",
"html_url": "https:\/\/github.com\/YassDEV221608",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/YassDEV221608\/CVE-2024-6387_PoC",
"description": null,
"fork": false,
"created_at": "2025-01-04T00:25:33Z",
"updated_at": "2025-01-12T03:13:35Z",
"pushed_at": "2025-01-04T00:37:14Z",
"stargazers_count": 10,
"watchers_count": 10,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 8,
"watchers": 10,
"score": 0,
"subscribers_count": 1
}
]