PoC-in-GitHub/2023/CVE-2023-44487.json
2023-10-19 15:42:21 +09:00

200 lines
No EOL
6.5 KiB
JSON

[
{
"id": 703062371,
"name": "CVE-2023-44487",
"full_name": "bcdannyboy\/CVE-2023-44487",
"owner": {
"login": "bcdannyboy",
"id": 12553297,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
"html_url": "https:\/\/github.com\/bcdannyboy"
},
"html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487",
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
"fork": false,
"created_at": "2023-10-10T14:20:42Z",
"updated_at": "2023-10-19T02:49:56Z",
"pushed_at": "2023-10-14T16:43:31Z",
"stargazers_count": 155,
"watchers_count": 155,
"has_discussions": false,
"forks_count": 35,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 35,
"watchers": 155,
"score": 0,
"subscribers_count": 5
},
{
"id": 703303512,
"name": "CVE-2023-44487",
"full_name": "imabee101\/CVE-2023-44487",
"owner": {
"login": "imabee101",
"id": 29169122,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4",
"html_url": "https:\/\/github.com\/imabee101"
},
"html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487",
"description": "Proof of concept for DoS exploit ",
"fork": false,
"created_at": "2023-10-11T01:59:47Z",
"updated_at": "2023-10-17T09:29:12Z",
"pushed_at": "2023-10-13T11:19:10Z",
"stargazers_count": 29,
"watchers_count": 29,
"has_discussions": false,
"forks_count": 8,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve",
"cve-2023-44487",
"ddos",
"dos",
"dos-attack",
"poc",
"proof-of-concept"
],
"visibility": "public",
"forks": 8,
"watchers": 29,
"score": 0,
"subscribers_count": 2
},
{
"id": 703845749,
"name": "CVE-2023-44487",
"full_name": "ByteHackr\/CVE-2023-44487",
"owner": {
"login": "ByteHackr",
"id": 30409831,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
"html_url": "https:\/\/github.com\/ByteHackr"
},
"html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487",
"description": "Test Script for CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T03:14:34Z",
"updated_at": "2023-10-12T03:30:38Z",
"pushed_at": "2023-10-12T03:30:35Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 703914770,
"name": "rapidreset",
"full_name": "pabloec20\/rapidreset",
"owner": {
"login": "pabloec20",
"id": 24191742,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
"html_url": "https:\/\/github.com\/pabloec20"
},
"html_url": "https:\/\/github.com\/pabloec20\/rapidreset",
"description": "CVE-2023-44487",
"fork": false,
"created_at": "2023-10-12T07:06:42Z",
"updated_at": "2023-10-13T16:10:25Z",
"pushed_at": "2023-10-12T07:11:17Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 704732969,
"name": "rapidresetclient",
"full_name": "secengjeff\/rapidresetclient",
"owner": {
"login": "secengjeff",
"id": 146767590,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4",
"html_url": "https:\/\/github.com\/secengjeff"
},
"html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient",
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-13T23:55:32Z",
"updated_at": "2023-10-18T09:41:58Z",
"pushed_at": "2023-10-16T23:36:45Z",
"stargazers_count": 13,
"watchers_count": 13,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 13,
"score": 0,
"subscribers_count": 1
},
{
"id": 705614213,
"name": "CVE-2023-44487",
"full_name": "studiogangster\/CVE-2023-44487",
"owner": {
"login": "studiogangster",
"id": 12793420,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4",
"html_url": "https:\/\/github.com\/studiogangster"
},
"html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487",
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
"fork": false,
"created_at": "2023-10-16T11:07:50Z",
"updated_at": "2023-10-18T17:59:32Z",
"pushed_at": "2023-10-16T12:32:50Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2023-44487",
"cybersecurity",
"exploit",
"http2",
"rapid",
"rapid-reset",
"reset",
"security",
"zero-day"
],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
}
]