mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-30 19:31:39 +01:00
81 lines
No EOL
2.9 KiB
JSON
81 lines
No EOL
2.9 KiB
JSON
[
|
|
{
|
|
"id": 401652275,
|
|
"name": "dheater",
|
|
"full_name": "Balasys\/dheater",
|
|
"owner": {
|
|
"login": "Balasys",
|
|
"id": 15004892,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15004892?v=4",
|
|
"html_url": "https:\/\/github.com\/Balasys"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Balasys\/dheater",
|
|
"description": "D(HE)ater is a proof of concept implementation of the D(HE)at attack (CVE-2002-20001) through which denial-of-service can be performed by enforcing the Diffie-Hellman key exchange.",
|
|
"fork": false,
|
|
"created_at": "2021-08-31T09:51:12Z",
|
|
"updated_at": "2022-12-15T21:51:49Z",
|
|
"pushed_at": "2022-10-28T13:26:02Z",
|
|
"stargazers_count": 138,
|
|
"watchers_count": 138,
|
|
"has_discussions": false,
|
|
"forks_count": 11,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"attack",
|
|
"ddos",
|
|
"ddos-attack",
|
|
"ddos-attack-tool",
|
|
"ddos-tool",
|
|
"denial-of-service",
|
|
"dhe",
|
|
"diffie-hellman-algorithm",
|
|
"diffie-hellman-groups",
|
|
"diffie-hellman-key",
|
|
"exploit",
|
|
"overloading",
|
|
"poc",
|
|
"security",
|
|
"security-tools",
|
|
"ssh",
|
|
"ssl",
|
|
"tls",
|
|
"tls13",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 11,
|
|
"watchers": 138,
|
|
"score": 0
|
|
},
|
|
{
|
|
"id": 582969598,
|
|
"name": "CVE-2002-20001",
|
|
"full_name": "Live-Hack-CVE\/CVE-2002-20001",
|
|
"owner": {
|
|
"login": "Live-Hack-CVE",
|
|
"id": 121191732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/121191732?v=4",
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE"
|
|
},
|
|
"html_url": "https:\/\/github.com\/Live-Hack-CVE\/CVE-2002-20001",
|
|
"description": "The Diffie-Hellman Key Agreement Protocol allows remote attackers (from the client side) to send arbitrary numbers that are actually not public keys, and trigger expensive server-side DHE modular-exponentiation calculations, aka a D(HE)ater attack. The client needs very little CPU resources and network bandwidth. The a CVE project by @Sn0wAlice",
|
|
"fork": false,
|
|
"created_at": "2022-12-28T11:32:18Z",
|
|
"updated_at": "2022-12-28T11:32:18Z",
|
|
"pushed_at": "2022-12-28T11:32:20Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0
|
|
}
|
|
] |