PoC-in-GitHub/2022/CVE-2022-0847.json
2022-03-09 15:14:55 +09:00

706 lines
No EOL
24 KiB
JSON
Raw Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 467129462,
"name": "CVE-2022-0847",
"full_name": "Udyz\/CVE-2022-0847",
"owner": {
"login": "Udyz",
"id": 39673284,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/39673284?v=4",
"html_url": "https:\/\/github.com\/Udyz"
},
"html_url": "https:\/\/github.com\/Udyz\/CVE-2022-0847",
"description": "This is the story of CVE-2022-0847, a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes.",
"fork": false,
"created_at": "2022-03-07T14:31:38Z",
"updated_at": "2022-03-08T13:22:07Z",
"pushed_at": "2022-03-07T14:31:39Z",
"stargazers_count": 3,
"watchers_count": 3,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 3,
"score": 0
},
{
"id": 467159035,
"name": "CVE-2022-0847",
"full_name": "bbaranoff\/CVE-2022-0847",
"owner": {
"login": "bbaranoff",
"id": 37385191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37385191?v=4",
"html_url": "https:\/\/github.com\/bbaranoff"
},
"html_url": "https:\/\/github.com\/bbaranoff\/CVE-2022-0847",
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-07T15:50:18Z",
"updated_at": "2022-03-09T05:59:57Z",
"pushed_at": "2022-03-07T15:52:23Z",
"stargazers_count": 40,
"watchers_count": 40,
"forks_count": 20,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 20,
"watchers": 40,
"score": 0
},
{
"id": 467200755,
"name": "CVE-2022-0847",
"full_name": "xndpxs\/CVE-2022-0847",
"owner": {
"login": "xndpxs",
"id": 62086766,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62086766?v=4",
"html_url": "https:\/\/github.com\/xndpxs"
},
"html_url": "https:\/\/github.com\/xndpxs\/CVE-2022-0847",
"description": "Vulnerability in the Linux kernel since 5.8",
"fork": false,
"created_at": "2022-03-07T17:51:02Z",
"updated_at": "2022-03-09T00:50:58Z",
"pushed_at": "2022-03-07T17:59:12Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 4,
"score": 0
},
{
"id": 467215742,
"name": "CVE-2022-0847",
"full_name": "imfiver\/CVE-2022-0847",
"owner": {
"login": "imfiver",
"id": 21257485,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/21257485?v=4",
"html_url": "https:\/\/github.com\/imfiver"
},
"html_url": "https:\/\/github.com\/imfiver\/CVE-2022-0847",
"description": "CVE-2022-0847-DirtyPipe-Exploit CVE-2022-0847 是存在于 Linux内核 5.8 及之后版本中的本地提权漏洞。攻击者通过利用此漏洞,可覆盖重写任意可读文件中的数据,从而可将普通权限的用户提升到特权 root。 CVE-2022-0847 的漏洞原理类似于 CVE-2016-5195 脏牛漏洞Dirty Cow但它更容易被利用。漏洞作者将此漏洞命名为“Dirty Pipe”",
"fork": false,
"created_at": "2022-03-07T18:36:50Z",
"updated_at": "2022-03-09T06:14:32Z",
"pushed_at": "2022-03-09T05:27:59Z",
"stargazers_count": 75,
"watchers_count": 75,
"forks_count": 24,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 24,
"watchers": 75,
"score": 0
},
{
"id": 467221382,
"name": "CVE-2022-0847-DirtyPipe-Exploit",
"full_name": "Arinerron\/CVE-2022-0847-DirtyPipe-Exploit",
"owner": {
"login": "Arinerron",
"id": 3926753,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3926753?v=4",
"html_url": "https:\/\/github.com\/Arinerron"
},
"html_url": "https:\/\/github.com\/Arinerron\/CVE-2022-0847-DirtyPipe-Exploit",
"description": "A root exploit for CVE-2022-0847 (Dirty Pipe)",
"fork": false,
"created_at": "2022-03-07T18:55:20Z",
"updated_at": "2022-03-09T06:13:01Z",
"pushed_at": "2022-03-08T06:20:05Z",
"stargazers_count": 431,
"watchers_count": 431,
"forks_count": 99,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 99,
"watchers": 431,
"score": 0
},
{
"id": 467240173,
"name": "CVE-2022-0847",
"full_name": "2xYuan\/CVE-2022-0847",
"owner": {
"login": "2xYuan",
"id": 101141051,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101141051?v=4",
"html_url": "https:\/\/github.com\/2xYuan"
},
"html_url": "https:\/\/github.com\/2xYuan\/CVE-2022-0847",
"description": "66666",
"fork": false,
"created_at": "2022-03-07T19:56:37Z",
"updated_at": "2022-03-07T19:58:56Z",
"pushed_at": "2022-03-07T19:56:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467257098,
"name": "Dirty-Pipe",
"full_name": "carlosevieira\/Dirty-Pipe",
"owner": {
"login": "carlosevieira",
"id": 24918013,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24918013?v=4",
"html_url": "https:\/\/github.com\/carlosevieira"
},
"html_url": "https:\/\/github.com\/carlosevieira\/Dirty-Pipe",
"description": "CVE-2022-0847 exploit one liner",
"fork": false,
"created_at": "2022-03-07T20:57:34Z",
"updated_at": "2022-03-08T21:06:02Z",
"pushed_at": "2022-03-07T21:01:15Z",
"stargazers_count": 5,
"watchers_count": 5,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0
},
{
"id": 467317090,
"name": "CVE-2022-0847",
"full_name": "lucksec\/CVE-2022-0847",
"owner": {
"login": "lucksec",
"id": 59011386,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59011386?v=4",
"html_url": "https:\/\/github.com\/lucksec"
},
"html_url": "https:\/\/github.com\/lucksec\/CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2022-03-08T01:17:09Z",
"updated_at": "2022-03-08T01:18:02Z",
"pushed_at": "2022-03-08T01:50:39Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 467355450,
"name": "cve-2022-0847dirtypipe-exploit",
"full_name": "rahul1406\/cve-2022-0847dirtypipe-exploit",
"owner": {
"login": "rahul1406",
"id": 47823841,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/47823841?v=4",
"html_url": "https:\/\/github.com\/rahul1406"
},
"html_url": "https:\/\/github.com\/rahul1406\/cve-2022-0847dirtypipe-exploit",
"description": null,
"fork": false,
"created_at": "2022-03-08T03:56:03Z",
"updated_at": "2022-03-09T01:22:58Z",
"pushed_at": "2022-03-08T09:31:57Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0
},
{
"id": 467367761,
"name": "CVE-2022-0847",
"full_name": "si1ent-le\/CVE-2022-0847",
"owner": {
"login": "si1ent-le",
"id": 56815669,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56815669?v=4",
"html_url": "https:\/\/github.com\/si1ent-le"
},
"html_url": "https:\/\/github.com\/si1ent-le\/CVE-2022-0847",
"description": "CVE-2022-0487",
"fork": false,
"created_at": "2022-03-08T04:51:02Z",
"updated_at": "2022-03-08T05:15:14Z",
"pushed_at": "2022-03-08T05:18:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0
},
{
"id": 467439184,
"name": "CVE-2022-0847",
"full_name": "antx-code\/CVE-2022-0847",
"owner": {
"login": "antx-code",
"id": 7877940,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/7877940?v=4",
"html_url": "https:\/\/github.com\/antx-code"
},
"html_url": "https:\/\/github.com\/antx-code\/CVE-2022-0847",
"description": "Linux Kernel Local Privilege Escalation Vulnerability CVE-2022-0847.",
"fork": false,
"created_at": "2022-03-08T09:10:51Z",
"updated_at": "2022-03-09T06:05:02Z",
"pushed_at": "2022-03-08T09:14:25Z",
"stargazers_count": 6,
"watchers_count": 6,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 6,
"score": 0
},
{
"id": 467468720,
"name": "CVE-2022-0847-dirty-pipe-exploit",
"full_name": "cspshivam\/CVE-2022-0847-dirty-pipe-exploit",
"owner": {
"login": "cspshivam",
"id": 59191514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/59191514?v=4",
"html_url": "https:\/\/github.com\/cspshivam"
},
"html_url": "https:\/\/github.com\/cspshivam\/CVE-2022-0847-dirty-pipe-exploit",
"description": "An exploit for CVE-2022-0847 dirty-pipe vulnerability",
"fork": false,
"created_at": "2022-03-08T10:40:07Z",
"updated_at": "2022-03-08T10:42:34Z",
"pushed_at": "2022-03-08T11:15:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467490371,
"name": "dirtypipez-exploit",
"full_name": "febinrev\/dirtypipez-exploit",
"owner": {
"login": "febinrev",
"id": 52229330,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52229330?v=4",
"html_url": "https:\/\/github.com\/febinrev"
},
"html_url": "https:\/\/github.com\/febinrev\/dirtypipez-exploit",
"description": "CVE-2022-0847 DirtyPipe Exploit.",
"fork": false,
"created_at": "2022-03-08T11:49:40Z",
"updated_at": "2022-03-09T05:27:28Z",
"pushed_at": "2022-03-08T11:52:22Z",
"stargazers_count": 4,
"watchers_count": 4,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 4,
"score": 0
},
{
"id": 467507788,
"name": "CVE_2022_0847",
"full_name": "ahrixia\/CVE_2022_0847",
"owner": {
"login": "ahrixia",
"id": 35935843,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/35935843?v=4",
"html_url": "https:\/\/github.com\/ahrixia"
},
"html_url": "https:\/\/github.com\/ahrixia\/CVE_2022_0847",
"description": "CVE-2022-0847: Linux Kernel Privilege Escalation Vulnerability",
"fork": false,
"created_at": "2022-03-08T12:43:43Z",
"updated_at": "2022-03-08T12:50:25Z",
"pushed_at": "2022-03-08T13:15:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467530713,
"name": "CVE-2022-0847",
"full_name": "knqyf263\/CVE-2022-0847",
"owner": {
"login": "knqyf263",
"id": 2253692,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/2253692?v=4",
"html_url": "https:\/\/github.com\/knqyf263"
},
"html_url": "https:\/\/github.com\/knqyf263\/CVE-2022-0847",
"description": "The Dirty Pipe Vulnerability",
"fork": false,
"created_at": "2022-03-08T13:48:55Z",
"updated_at": "2022-03-09T05:24:47Z",
"pushed_at": "2022-03-08T13:54:08Z",
"stargazers_count": 10,
"watchers_count": 10,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 10,
"score": 0
},
{
"id": 467552702,
"name": "CVE-2022-0847",
"full_name": "puckiestyle\/CVE-2022-0847",
"owner": {
"login": "puckiestyle",
"id": 57447087,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/57447087?v=4",
"html_url": "https:\/\/github.com\/puckiestyle"
},
"html_url": "https:\/\/github.com\/puckiestyle\/CVE-2022-0847",
"description": null,
"fork": false,
"created_at": "2022-03-08T14:46:21Z",
"updated_at": "2022-03-08T15:35:41Z",
"pushed_at": "2022-03-08T15:35:56Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467569839,
"name": "dirty-pipe",
"full_name": "0xIronGoat\/dirty-pipe",
"owner": {
"login": "0xIronGoat",
"id": 14928858,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/14928858?v=4",
"html_url": "https:\/\/github.com\/0xIronGoat"
},
"html_url": "https:\/\/github.com\/0xIronGoat\/dirty-pipe",
"description": "Implementation of Max Kellermann's exploit for CVE-2022-0847",
"fork": false,
"created_at": "2022-03-08T15:30:45Z",
"updated_at": "2022-03-08T20:52:10Z",
"pushed_at": "2022-03-08T15:47:53Z",
"stargazers_count": 2,
"watchers_count": 2,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0
},
{
"id": 467570864,
"name": "CVE-2022-0847-DirtyPipe-Exploit",
"full_name": "ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit",
"owner": {
"login": "ITMarcin2211",
"id": 60057530,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/60057530?v=4",
"html_url": "https:\/\/github.com\/ITMarcin2211"
},
"html_url": "https:\/\/github.com\/ITMarcin2211\/CVE-2022-0847-DirtyPipe-Exploit",
"description": null,
"fork": false,
"created_at": "2022-03-08T15:33:39Z",
"updated_at": "2022-03-08T15:34:46Z",
"pushed_at": "2022-03-08T15:36:53Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0
},
{
"id": 467602577,
"name": "CVE-2022-0847-Docker",
"full_name": "mrchucu1\/CVE-2022-0847-Docker",
"owner": {
"login": "mrchucu1",
"id": 12802120,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12802120?v=4",
"html_url": "https:\/\/github.com\/mrchucu1"
},
"html_url": "https:\/\/github.com\/mrchucu1\/CVE-2022-0847-Docker",
"description": "Docker exploit",
"fork": false,
"created_at": "2022-03-08T17:02:40Z",
"updated_at": "2022-03-08T17:05:05Z",
"pushed_at": "2022-03-08T17:05:01Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467606236,
"name": "CVE-2022-0847-dirty-pipe-checker",
"full_name": "basharkey\/CVE-2022-0847-dirty-pipe-checker",
"owner": {
"login": "basharkey",
"id": 15859442,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/15859442?v=4",
"html_url": "https:\/\/github.com\/basharkey"
},
"html_url": "https:\/\/github.com\/basharkey\/CVE-2022-0847-dirty-pipe-checker",
"description": "Bash script to check for CVE-2022-0847 \"Dirty Pipe\"",
"fork": false,
"created_at": "2022-03-08T17:13:24Z",
"updated_at": "2022-03-08T17:14:12Z",
"pushed_at": "2022-03-08T19:53:16Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467662886,
"name": "CVE-2022-0847",
"full_name": "4luc4rdr5290\/CVE-2022-0847",
"owner": {
"login": "4luc4rdr5290",
"id": 19316088,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/19316088?v=4",
"html_url": "https:\/\/github.com\/4luc4rdr5290"
},
"html_url": "https:\/\/github.com\/4luc4rdr5290\/CVE-2022-0847",
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-08T20:18:28Z",
"updated_at": "2022-03-08T20:33:46Z",
"pushed_at": "2022-03-08T20:41:15Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467741460,
"name": "CVE-2022-0847_DirtyPipeExploit",
"full_name": "dadhee\/CVE-2022-0847_DirtyPipeExploit",
"owner": {
"login": "dadhee",
"id": 37909237,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/37909237?v=4",
"html_url": "https:\/\/github.com\/dadhee"
},
"html_url": "https:\/\/github.com\/dadhee\/CVE-2022-0847_DirtyPipeExploit",
"description": "A “Dirty Pipe” vulnerability with CVE-2022-0847 and a CVSS score of 7.8 has been identified, affecting Linux Kernel 5.8 and higher. The vulnerability allows attackers to overwrite data in read-only files. Threat actors can exploit this vulnerability to privilege themselves with code injection.",
"fork": false,
"created_at": "2022-03-09T01:55:04Z",
"updated_at": "2022-03-09T02:01:30Z",
"pushed_at": "2022-03-09T02:01:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467753868,
"name": "CVE-2022-0847-DirtyPipe",
"full_name": "Greetdawn\/CVE-2022-0847-DirtyPipe",
"owner": {
"login": "Greetdawn",
"id": 28551913,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28551913?v=4",
"html_url": "https:\/\/github.com\/Greetdawn"
},
"html_url": "https:\/\/github.com\/Greetdawn\/CVE-2022-0847-DirtyPipe",
"description": null,
"fork": false,
"created_at": "2022-03-09T02:47:06Z",
"updated_at": "2022-03-09T02:52:32Z",
"pushed_at": "2022-03-09T02:54:31Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467753881,
"name": "CVE-2022-0847",
"full_name": "Al1ex\/CVE-2022-0847",
"owner": {
"login": "Al1ex",
"id": 38161463,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/38161463?v=4",
"html_url": "https:\/\/github.com\/Al1ex"
},
"html_url": "https:\/\/github.com\/Al1ex\/CVE-2022-0847",
"description": "CVE-2022-0847",
"fork": false,
"created_at": "2022-03-09T02:47:08Z",
"updated_at": "2022-03-09T04:03:00Z",
"pushed_at": "2022-03-09T02:47:32Z",
"stargazers_count": 1,
"watchers_count": 1,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"topics": [
"cve-2022-0847"
],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0
},
{
"id": 467779512,
"name": "Dirtypipe-exploit",
"full_name": "MRNIKO1\/Dirtypipe-exploit",
"owner": {
"login": "MRNIKO1",
"id": 72093135,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/72093135?v=4",
"html_url": "https:\/\/github.com\/MRNIKO1"
},
"html_url": "https:\/\/github.com\/MRNIKO1\/Dirtypipe-exploit",
"description": "Dirty Pipe (CVE-2022-0847) PoC that hijacks a SUID binary to spawn. a root shell. (and attempts to restore the damaged binary as well)",
"fork": false,
"created_at": "2022-03-09T04:42:59Z",
"updated_at": "2022-03-09T04:42:59Z",
"pushed_at": "2022-03-09T04:43:00Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
},
{
"id": 467788339,
"name": "CVE-2022-0847-DirtyPipe-Exploit",
"full_name": "Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit",
"owner": {
"login": "Mustafa1986",
"id": 27927358,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/27927358?v=4",
"html_url": "https:\/\/github.com\/Mustafa1986"
},
"html_url": "https:\/\/github.com\/Mustafa1986\/CVE-2022-0847-DirtyPipe-Exploit",
"description": null,
"fork": false,
"created_at": "2022-03-09T05:22:20Z",
"updated_at": "2022-03-09T05:34:00Z",
"pushed_at": "2022-03-09T06:16:23Z",
"stargazers_count": 0,
"watchers_count": 0,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0
}
]