PoC-in-GitHub/2022/CVE-2022-30190.json
2025-03-07 03:12:43 +09:00

751 lines
No EOL
26 KiB
JSON
Raw Permalink Blame History

This file contains ambiguous Unicode characters

This file contains Unicode characters that might be confused with other characters. If you think that this is intentional, you can safely ignore this warning. Use the Escape button to reveal them.

[
{
"id": 498710957,
"name": "CVE-2022-30190-follina",
"full_name": "drgreenthumb93\/CVE-2022-30190-follina",
"owner": {
"login": "drgreenthumb93",
"id": 50826299,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/50826299?v=4",
"html_url": "https:\/\/github.com\/drgreenthumb93",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/drgreenthumb93\/CVE-2022-30190-follina",
"description": "Just another PoC for the new MSDT-Exploit",
"fork": false,
"created_at": "2022-06-01T11:37:08Z",
"updated_at": "2024-08-12T20:23:45Z",
"pushed_at": "2023-04-20T20:34:05Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 4,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 4,
"watchers": 8,
"score": 0,
"subscribers_count": 2
},
{
"id": 498888452,
"name": "Follina-Remediation",
"full_name": "Cosmo121\/Follina-Remediation",
"owner": {
"login": "Cosmo121",
"id": 3526206,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/3526206?v=4",
"html_url": "https:\/\/github.com\/Cosmo121",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Cosmo121\/Follina-Remediation",
"description": "Removes the ability for MSDT to run, in response to CVE-2022-30190 (Follina)",
"fork": false,
"created_at": "2022-06-01T20:26:56Z",
"updated_at": "2023-01-27T20:26:21Z",
"pushed_at": "2022-10-08T23:22:12Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 5,
"score": 0,
"subscribers_count": 2
},
{
"id": 499022838,
"name": "FollinaScanner",
"full_name": "ErrorNoInternet\/FollinaScanner",
"owner": {
"login": "ErrorNoInternet",
"id": 61157623,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61157623?v=4",
"html_url": "https:\/\/github.com\/ErrorNoInternet",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ErrorNoInternet\/FollinaScanner",
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2022-06-02T06:45:19Z",
"updated_at": "2024-11-16T19:54:48Z",
"pushed_at": "2022-09-13T10:05:02Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 6,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"antivirus",
"cve-2022-30190",
"follina",
"golang",
"scanner",
"vulnerability-scanners"
],
"visibility": "public",
"forks": 6,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 499127993,
"name": "CVE-2022-30190-follina-Office-MSDT-Fixed",
"full_name": "komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
"owner": {
"login": "komomon",
"id": 52700174,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/52700174?v=4",
"html_url": "https:\/\/github.com\/komomon",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/komomon\/CVE-2022-30190-follina-Office-MSDT-Fixed",
"description": "CVE-2022-30190-follina.py-修改版可以自定义word模板方便实战中钓鱼使用。",
"fork": false,
"created_at": "2022-06-02T12:33:18Z",
"updated_at": "2025-01-22T21:26:56Z",
"pushed_at": "2023-04-13T16:46:26Z",
"stargazers_count": 397,
"watchers_count": 397,
"has_discussions": false,
"forks_count": 54,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 54,
"watchers": 397,
"score": 0,
"subscribers_count": 4
},
{
"id": 499137152,
"name": "CVE-2022-30190-Fix",
"full_name": "swaiist\/CVE-2022-30190-Fix",
"owner": {
"login": "swaiist",
"id": 67833362,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/67833362?v=4",
"html_url": "https:\/\/github.com\/swaiist",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/swaiist\/CVE-2022-30190-Fix",
"description": null,
"fork": false,
"created_at": "2022-06-02T13:01:46Z",
"updated_at": "2023-01-09T11:28:21Z",
"pushed_at": "2022-12-16T15:09:34Z",
"stargazers_count": 3,
"watchers_count": 3,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 3,
"score": 0,
"subscribers_count": 1
},
{
"id": 499205371,
"name": "CVE-2022-30190",
"full_name": "arozx\/CVE-2022-30190",
"owner": {
"login": "arozx",
"id": 87201477,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/87201477?v=4",
"html_url": "https:\/\/github.com\/arozx",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/arozx\/CVE-2022-30190",
"description": "A very simple MSDT \"Follina\" exploit **patched**",
"fork": false,
"created_at": "2022-06-02T16:14:13Z",
"updated_at": "2023-02-14T18:19:06Z",
"pushed_at": "2022-11-01T16:53:17Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-30190",
"exploit",
"follina",
"patched",
"poc",
"security",
"vulnerability",
"windows"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 1
},
{
"id": 499331391,
"name": "follina",
"full_name": "Noxtal\/follina",
"owner": {
"login": "Noxtal",
"id": 44851191,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/44851191?v=4",
"html_url": "https:\/\/github.com\/Noxtal",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Noxtal\/follina",
"description": "All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps such as Word. This is a very simple POC, feel free to check the sources below for more threat intelligence.",
"fork": false,
"created_at": "2022-06-03T00:25:37Z",
"updated_at": "2025-01-13T07:54:46Z",
"pushed_at": "2022-08-06T01:04:51Z",
"stargazers_count": 24,
"watchers_count": 24,
"has_discussions": false,
"forks_count": 5,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 5,
"watchers": 24,
"score": 0,
"subscribers_count": 2
},
{
"id": 499846982,
"name": "Follina",
"full_name": "AbdulRKB\/Follina",
"owner": {
"login": "AbdulRKB",
"id": 82715493,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82715493?v=4",
"html_url": "https:\/\/github.com\/AbdulRKB",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/AbdulRKB\/Follina",
"description": "Remote Access Shell for Windows (based on cve-2022-30190)",
"fork": false,
"created_at": "2022-06-04T14:18:38Z",
"updated_at": "2024-08-12T20:23:50Z",
"pushed_at": "2024-02-09T17:18:42Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-30190",
"follina",
"mstd",
"reverse-shell",
"windows"
],
"visibility": "public",
"forks": 2,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 499922590,
"name": "CVE-2022-30190",
"full_name": "DerZiad\/CVE-2022-30190",
"owner": {
"login": "DerZiad",
"id": 40337316,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/40337316?v=4",
"html_url": "https:\/\/github.com\/DerZiad",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/DerZiad\/CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-04T19:48:37Z",
"updated_at": "2025-02-14T17:11:09Z",
"pushed_at": "2023-07-25T07:47:33Z",
"stargazers_count": 6,
"watchers_count": 6,
"has_discussions": true,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 6,
"score": 0,
"subscribers_count": 1
},
{
"id": 500111558,
"name": "Follina-CVE-2022-30190-POC",
"full_name": "ItsNee\/Follina-CVE-2022-30190-POC",
"owner": {
"login": "ItsNee",
"id": 28183719,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/28183719?v=4",
"html_url": "https:\/\/github.com\/ItsNee",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ItsNee\/Follina-CVE-2022-30190-POC",
"description": null,
"fork": false,
"created_at": "2022-06-05T13:54:04Z",
"updated_at": "2023-02-09T18:20:51Z",
"pushed_at": "2022-07-04T13:27:13Z",
"stargazers_count": 5,
"watchers_count": 5,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 5,
"score": 0,
"subscribers_count": 1
},
{
"id": 501212142,
"name": "Deathnote",
"full_name": "Malwareman007\/Deathnote",
"owner": {
"login": "Malwareman007",
"id": 86009160,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/86009160?v=4",
"html_url": "https:\/\/github.com\/Malwareman007",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Malwareman007\/Deathnote",
"description": "Proof of Concept of CVE-2022-30190",
"fork": false,
"created_at": "2022-06-08T10:58:23Z",
"updated_at": "2024-09-08T14:28:01Z",
"pushed_at": "2022-10-06T14:49:56Z",
"stargazers_count": 37,
"watchers_count": 37,
"has_discussions": false,
"forks_count": 7,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2022-30190",
"follina",
"microsoft",
"msdt",
"msword",
"vulnerability",
"zeroday"
],
"visibility": "public",
"forks": 7,
"watchers": 37,
"score": 0,
"subscribers_count": 1
},
{
"id": 501283166,
"name": "Follina-Workaround-CVE-2022-30190",
"full_name": "sentrium-security\/Follina-Workaround-CVE-2022-30190",
"owner": {
"login": "sentrium-security",
"id": 53477514,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/53477514?v=4",
"html_url": "https:\/\/github.com\/sentrium-security",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/sentrium-security\/Follina-Workaround-CVE-2022-30190",
"description": null,
"fork": false,
"created_at": "2022-06-08T14:20:50Z",
"updated_at": "2022-06-08T14:29:37Z",
"pushed_at": "2022-07-14T16:18:28Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 1,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 1,
"watchers": 0,
"score": 0,
"subscribers_count": 0
},
{
"id": 507979018,
"name": "go_follina",
"full_name": "Zitchev\/go_follina",
"owner": {
"login": "Zitchev",
"id": 61007904,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61007904?v=4",
"html_url": "https:\/\/github.com\/Zitchev",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Zitchev\/go_follina",
"description": "Follina (CVE-2022-30190) proof-of-concept",
"fork": false,
"created_at": "2022-06-27T16:14:34Z",
"updated_at": "2023-07-26T14:55:32Z",
"pushed_at": "2023-02-21T19:21:48Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 508614565,
"name": "CVE-2022-30190_EXP_PowerPoint",
"full_name": "Gra3s\/CVE-2022-30190_EXP_PowerPoint",
"owner": {
"login": "Gra3s",
"id": 76804515,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/76804515?v=4",
"html_url": "https:\/\/github.com\/Gra3s",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Gra3s\/CVE-2022-30190_EXP_PowerPoint",
"description": "This is exploit of CVE-2022-30190 on PowerPoint.",
"fork": false,
"created_at": "2022-06-29T08:48:12Z",
"updated_at": "2024-08-12T20:24:36Z",
"pushed_at": "2023-03-23T03:18:46Z",
"stargazers_count": 8,
"watchers_count": 8,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 8,
"score": 0,
"subscribers_count": 1
},
{
"id": 537107690,
"name": "CVE-2022-30190",
"full_name": "winstxnhdw\/CVE-2022-30190",
"owner": {
"login": "winstxnhdw",
"id": 56998716,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/56998716?v=4",
"html_url": "https:\/\/github.com\/winstxnhdw",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/winstxnhdw\/CVE-2022-30190",
"description": "A proof of concept for CVE-2022-30190 (Follina).",
"fork": false,
"created_at": "2022-09-15T16:12:57Z",
"updated_at": "2023-08-29T16:29:42Z",
"pushed_at": "2024-03-01T16:26:36Z",
"stargazers_count": 2,
"watchers_count": 2,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [
"cve-2021-40444",
"follina",
"msdt",
"remote-code-execution",
"trojan"
],
"visibility": "public",
"forks": 2,
"watchers": 2,
"score": 0,
"subscribers_count": 2
},
{
"id": 613736106,
"name": "FOLLINA-CVE-2022-30190",
"full_name": "ToxicEnvelope\/FOLLINA-CVE-2022-30190",
"owner": {
"login": "ToxicEnvelope",
"id": 23465872,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/23465872?v=4",
"html_url": "https:\/\/github.com\/ToxicEnvelope",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ToxicEnvelope\/FOLLINA-CVE-2022-30190",
"description": "Implementation of FOLLINA-CVE-2022-30190",
"fork": false,
"created_at": "2023-03-14T07:00:47Z",
"updated_at": "2024-06-20T18:44:33Z",
"pushed_at": "2023-08-27T09:39:26Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 2
},
{
"id": 635211834,
"name": "CVE-2022-30190",
"full_name": "hycheng15\/CVE-2022-30190",
"owner": {
"login": "hycheng15",
"id": 74200918,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/74200918?v=4",
"html_url": "https:\/\/github.com\/hycheng15",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/hycheng15\/CVE-2022-30190",
"description": "An exploitation of CVE-2022-30190 (Follina)",
"fork": false,
"created_at": "2023-05-02T07:56:28Z",
"updated_at": "2023-07-26T14:55:29Z",
"pushed_at": "2023-11-14T10:19:33Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 724428602,
"name": "AmzWord",
"full_name": "Jump-Wang-111\/AmzWord",
"owner": {
"login": "Jump-Wang-111",
"id": 69379868,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/69379868?v=4",
"html_url": "https:\/\/github.com\/Jump-Wang-111",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Jump-Wang-111\/AmzWord",
"description": "An automated attack chain based on CVE-2022-30190, 163 email backdoor, and image steganography.",
"fork": false,
"created_at": "2023-11-28T03:47:32Z",
"updated_at": "2024-09-04T02:59:22Z",
"pushed_at": "2023-11-28T10:16:25Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 758899750,
"name": "ZipScan",
"full_name": "shri142\/ZipScan",
"owner": {
"login": "shri142",
"id": 81535914,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/81535914?v=4",
"html_url": "https:\/\/github.com\/shri142",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/shri142\/ZipScan",
"description": "A tool written in Go that scans files & directories for the Follina exploit (CVE-2022-30190)",
"fork": false,
"created_at": "2024-02-17T12:10:12Z",
"updated_at": "2024-02-24T17:59:28Z",
"pushed_at": "2024-02-24T17:59:25Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 784462275,
"name": "CVE-2022-30190",
"full_name": "alien-keric\/CVE-2022-30190",
"owner": {
"login": "alien-keric",
"id": 102582785,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/102582785?v=4",
"html_url": "https:\/\/github.com\/alien-keric",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/alien-keric\/CVE-2022-30190",
"description": "The script is from https:\/\/github.com\/JohnHammond\/msdt-follina, just make it simple for me to use it and this script aim at generating the payload for more information refer the johnn hammond link",
"fork": false,
"created_at": "2024-04-09T22:40:09Z",
"updated_at": "2024-04-10T01:26:23Z",
"pushed_at": "2024-04-09T22:41:53Z",
"stargazers_count": 1,
"watchers_count": 1,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 1,
"score": 0,
"subscribers_count": 1
},
{
"id": 831490675,
"name": "Follina-CVE-2022-30190-Sample",
"full_name": "ethicalblue\/Follina-CVE-2022-30190-Sample",
"owner": {
"login": "ethicalblue",
"id": 82314652,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/82314652?v=4",
"html_url": "https:\/\/github.com\/ethicalblue",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/ethicalblue\/Follina-CVE-2022-30190-Sample",
"description": "Educational exploit for CVE-2022-30190",
"fork": false,
"created_at": "2024-07-20T17:50:48Z",
"updated_at": "2024-07-20T19:56:33Z",
"pushed_at": "2024-07-20T18:23:38Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 2,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 2,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 928632164,
"name": "CVE-2022-30190_page",
"full_name": "Potato-9257\/CVE-2022-30190_page",
"owner": {
"login": "Potato-9257",
"id": 198144657,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/198144657?v=4",
"html_url": "https:\/\/github.com\/Potato-9257",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/Potato-9257\/CVE-2022-30190_page",
"description": "PoC of CVE-2022-30190",
"fork": false,
"created_at": "2025-02-07T00:35:46Z",
"updated_at": "2025-02-07T00:37:28Z",
"pushed_at": "2025-02-07T00:37:24Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
},
{
"id": 941432225,
"name": "ICT287_CVE-2022-30190_Exploit",
"full_name": "yeep1115\/ICT287_CVE-2022-30190_Exploit",
"owner": {
"login": "yeep1115",
"id": 107627976,
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/107627976?v=4",
"html_url": "https:\/\/github.com\/yeep1115",
"user_view_type": "public"
},
"html_url": "https:\/\/github.com\/yeep1115\/ICT287_CVE-2022-30190_Exploit",
"description": "Project on CVE-2022-30190 exploitation and mitigation strategies",
"fork": false,
"created_at": "2025-03-02T09:25:27Z",
"updated_at": "2025-03-02T09:27:47Z",
"pushed_at": "2025-03-02T09:27:44Z",
"stargazers_count": 0,
"watchers_count": 0,
"has_discussions": false,
"forks_count": 0,
"allow_forking": true,
"is_template": false,
"web_commit_signoff_required": false,
"topics": [],
"visibility": "public",
"forks": 0,
"watchers": 0,
"score": 0,
"subscribers_count": 1
}
]