mirror of
https://github.com/nomi-sec/PoC-in-GitHub.git
synced 2025-12-25 05:35:33 +01:00
596 lines
No EOL
20 KiB
JSON
596 lines
No EOL
20 KiB
JSON
[
|
|
{
|
|
"id": 703062371,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "bcdannyboy\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "bcdannyboy",
|
|
"id": 12553297,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12553297?v=4",
|
|
"html_url": "https:\/\/github.com\/bcdannyboy",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/bcdannyboy\/CVE-2023-44487",
|
|
"description": "Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487",
|
|
"fork": false,
|
|
"created_at": "2023-10-10T14:20:42Z",
|
|
"updated_at": "2025-11-24T08:21:49Z",
|
|
"pushed_at": "2024-01-08T11:12:08Z",
|
|
"stargazers_count": 243,
|
|
"watchers_count": 243,
|
|
"has_discussions": false,
|
|
"forks_count": 48,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 48,
|
|
"watchers": 243,
|
|
"score": 0,
|
|
"subscribers_count": 5
|
|
},
|
|
{
|
|
"id": 703303512,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "imabee101\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "imabee101",
|
|
"id": 29169122,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/29169122?v=4",
|
|
"html_url": "https:\/\/github.com\/imabee101",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/imabee101\/CVE-2023-44487",
|
|
"description": "Proof of concept for DoS exploit ",
|
|
"fork": false,
|
|
"created_at": "2023-10-11T01:59:47Z",
|
|
"updated_at": "2025-11-10T05:45:41Z",
|
|
"pushed_at": "2023-10-13T11:19:10Z",
|
|
"stargazers_count": 54,
|
|
"watchers_count": 54,
|
|
"has_discussions": false,
|
|
"forks_count": 17,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve",
|
|
"cve-2023-44487",
|
|
"ddos",
|
|
"dos",
|
|
"dos-attack",
|
|
"poc",
|
|
"proof-of-concept"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 17,
|
|
"watchers": 54,
|
|
"score": 0,
|
|
"subscribers_count": 2
|
|
},
|
|
{
|
|
"id": 703845749,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "ByteHackr\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "ByteHackr",
|
|
"id": 30409831,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/30409831?v=4",
|
|
"html_url": "https:\/\/github.com\/ByteHackr",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ByteHackr\/CVE-2023-44487",
|
|
"description": "Test Script for CVE-2023-44487",
|
|
"fork": false,
|
|
"created_at": "2023-10-12T03:14:34Z",
|
|
"updated_at": "2023-10-12T03:30:38Z",
|
|
"pushed_at": "2023-10-12T03:30:35Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 703914770,
|
|
"name": "rapidreset",
|
|
"full_name": "pabloec20\/rapidreset",
|
|
"owner": {
|
|
"login": "pabloec20",
|
|
"id": 24191742,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/24191742?v=4",
|
|
"html_url": "https:\/\/github.com\/pabloec20",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/pabloec20\/rapidreset",
|
|
"description": "CVE-2023-44487",
|
|
"fork": false,
|
|
"created_at": "2023-10-12T07:06:42Z",
|
|
"updated_at": "2024-06-27T16:58:23Z",
|
|
"pushed_at": "2023-10-12T07:11:17Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 704732969,
|
|
"name": "rapidresetclient",
|
|
"full_name": "secengjeff\/rapidresetclient",
|
|
"owner": {
|
|
"login": "secengjeff",
|
|
"id": 146767590,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/146767590?v=4",
|
|
"html_url": "https:\/\/github.com\/secengjeff",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/secengjeff\/rapidresetclient",
|
|
"description": "Tool for testing mitigations and exposure to Rapid Reset DDoS (CVE-2023-44487)",
|
|
"fork": false,
|
|
"created_at": "2023-10-13T23:55:32Z",
|
|
"updated_at": "2025-11-11T06:51:36Z",
|
|
"pushed_at": "2023-10-30T20:22:37Z",
|
|
"stargazers_count": 71,
|
|
"watchers_count": 71,
|
|
"has_discussions": false,
|
|
"forks_count": 15,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 15,
|
|
"watchers": 71,
|
|
"score": 0,
|
|
"subscribers_count": 3
|
|
},
|
|
{
|
|
"id": 705614213,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "studiogangster\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "studiogangster",
|
|
"id": 12793420,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/12793420?v=4",
|
|
"html_url": "https:\/\/github.com\/studiogangster",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/studiogangster\/CVE-2023-44487",
|
|
"description": "A python based exploit to test out rapid reset attack (CVE-2023-44487)",
|
|
"fork": false,
|
|
"created_at": "2023-10-16T11:07:50Z",
|
|
"updated_at": "2025-08-29T16:34:11Z",
|
|
"pushed_at": "2023-10-16T12:32:50Z",
|
|
"stargazers_count": 19,
|
|
"watchers_count": 19,
|
|
"has_discussions": false,
|
|
"forks_count": 3,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2023-44487",
|
|
"cybersecurity",
|
|
"exploit",
|
|
"http2",
|
|
"rapid",
|
|
"rapid-reset",
|
|
"reset",
|
|
"security",
|
|
"zero-day"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 3,
|
|
"watchers": 19,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 709722803,
|
|
"name": "golang-CVE-2023-44487",
|
|
"full_name": "ReToCode\/golang-CVE-2023-44487",
|
|
"owner": {
|
|
"login": "ReToCode",
|
|
"id": 16611466,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/16611466?v=4",
|
|
"html_url": "https:\/\/github.com\/ReToCode",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ReToCode\/golang-CVE-2023-44487",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-10-25T09:11:46Z",
|
|
"updated_at": "2025-09-10T17:05:17Z",
|
|
"pushed_at": "2023-10-26T15:01:38Z",
|
|
"stargazers_count": 2,
|
|
"watchers_count": 2,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 2,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 716296930,
|
|
"name": "http2-rst-stream-attacker",
|
|
"full_name": "ndrscodes\/http2-rst-stream-attacker",
|
|
"owner": {
|
|
"login": "ndrscodes",
|
|
"id": 62462135,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/62462135?v=4",
|
|
"html_url": "https:\/\/github.com\/ndrscodes",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/ndrscodes\/http2-rst-stream-attacker",
|
|
"description": "Highly configurable tool to check a server's vulnerability against CVE-2023-44487 by rapidly sending HEADERS and RST_STREAM frames and documenting the server's responses.",
|
|
"fork": false,
|
|
"created_at": "2023-11-08T20:56:22Z",
|
|
"updated_at": "2025-09-09T20:09:20Z",
|
|
"pushed_at": "2024-01-11T17:44:09Z",
|
|
"stargazers_count": 5,
|
|
"watchers_count": 5,
|
|
"has_discussions": false,
|
|
"forks_count": 2,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2023-44487",
|
|
"go",
|
|
"golang",
|
|
"http2",
|
|
"it-security",
|
|
"itsec",
|
|
"itsecurity",
|
|
"research",
|
|
"vulnerabilities",
|
|
"vulnerability"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 2,
|
|
"watchers": 5,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 716960166,
|
|
"name": "cve-2023-44487",
|
|
"full_name": "nxenon\/cve-2023-44487",
|
|
"owner": {
|
|
"login": "nxenon",
|
|
"id": 61124903,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/61124903?v=4",
|
|
"html_url": "https:\/\/github.com\/nxenon",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/nxenon\/cve-2023-44487",
|
|
"description": "Examples for Implementing cve-2023-44487 ( HTTP\/2 Rapid Reset Attack ) Concept",
|
|
"fork": false,
|
|
"created_at": "2023-11-10T08:38:51Z",
|
|
"updated_at": "2025-09-09T05:43:48Z",
|
|
"pushed_at": "2023-11-10T08:39:14Z",
|
|
"stargazers_count": 12,
|
|
"watchers_count": 12,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [
|
|
"cve-2023-44487",
|
|
"ddos",
|
|
"dos",
|
|
"http2",
|
|
"rapid-reset",
|
|
"rapid-reset-attack"
|
|
],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 12,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 730433558,
|
|
"name": "CVE-2023-44487-",
|
|
"full_name": "sigridou\/CVE-2023-44487-",
|
|
"owner": {
|
|
"login": "sigridou",
|
|
"id": 101998818,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/101998818?v=4",
|
|
"html_url": "https:\/\/github.com\/sigridou",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sigridou\/CVE-2023-44487-",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2023-12-11T23:12:03Z",
|
|
"updated_at": "2023-12-11T23:13:25Z",
|
|
"pushed_at": "2023-12-11T23:19:25Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 790095472,
|
|
"name": "cve-2023-44487",
|
|
"full_name": "TYuan0816\/cve-2023-44487",
|
|
"owner": {
|
|
"login": "TYuan0816",
|
|
"id": 91544853,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/91544853?v=4",
|
|
"html_url": "https:\/\/github.com\/TYuan0816",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/TYuan0816\/cve-2023-44487",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-04-22T08:56:39Z",
|
|
"updated_at": "2024-04-22T08:56:43Z",
|
|
"pushed_at": "2024-04-22T08:56:39Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 806127239,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "sn130hk\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "sn130hk",
|
|
"id": 166270187,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/166270187?v=4",
|
|
"html_url": "https:\/\/github.com\/sn130hk",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/sn130hk\/CVE-2023-44487",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-05-26T13:01:01Z",
|
|
"updated_at": "2024-05-26T13:01:01Z",
|
|
"pushed_at": "2024-05-26T13:01:01Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 897966381,
|
|
"name": "CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
|
|
"full_name": "threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
|
|
"owner": {
|
|
"login": "threatlabindonesia",
|
|
"id": 89779121,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/89779121?v=4",
|
|
"html_url": "https:\/\/github.com\/threatlabindonesia",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/threatlabindonesia\/CVE-2023-44487-HTTP-2-Rapid-Reset-Exploit-PoC",
|
|
"description": null,
|
|
"fork": false,
|
|
"created_at": "2024-12-03T14:54:21Z",
|
|
"updated_at": "2025-10-15T13:37:47Z",
|
|
"pushed_at": "2024-12-03T15:03:04Z",
|
|
"stargazers_count": 6,
|
|
"watchers_count": 6,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 6,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 918591329,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "aulauniversal\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "aulauniversal",
|
|
"id": 168633732,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/168633732?v=4",
|
|
"html_url": "https:\/\/github.com\/aulauniversal",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/aulauniversal\/CVE-2023-44487",
|
|
"description": "RapidResetClient",
|
|
"fork": false,
|
|
"created_at": "2025-01-18T10:39:58Z",
|
|
"updated_at": "2025-01-18T11:39:56Z",
|
|
"pushed_at": "2025-01-18T11:39:54Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 935297899,
|
|
"name": "CVE-2023-44487",
|
|
"full_name": "BMG-Black-Magic\/CVE-2023-44487",
|
|
"owner": {
|
|
"login": "BMG-Black-Magic",
|
|
"id": 118796311,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/118796311?v=4",
|
|
"html_url": "https:\/\/github.com\/BMG-Black-Magic",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/BMG-Black-Magic\/CVE-2023-44487",
|
|
"description": "POC for CVE-2023-44487",
|
|
"fork": false,
|
|
"created_at": "2025-02-19T08:13:41Z",
|
|
"updated_at": "2025-02-19T08:16:37Z",
|
|
"pushed_at": "2025-02-19T08:16:34Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 966422202,
|
|
"name": "CVE-2023-44487-HTTP-2-Rapid-Reset-Attack",
|
|
"full_name": "moften\/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack",
|
|
"owner": {
|
|
"login": "moften",
|
|
"id": 4262359,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/4262359?v=4",
|
|
"html_url": "https:\/\/github.com\/moften",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/moften\/CVE-2023-44487-HTTP-2-Rapid-Reset-Attack",
|
|
"description": "HTTP\/2 Rapid Reset Exploit PoC",
|
|
"fork": false,
|
|
"created_at": "2025-04-14T22:39:08Z",
|
|
"updated_at": "2025-11-06T20:26:07Z",
|
|
"pushed_at": "2025-11-06T20:26:02Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 970913485,
|
|
"name": "cve-2023-44487-demo",
|
|
"full_name": "zanks08\/cve-2023-44487-demo",
|
|
"owner": {
|
|
"login": "zanks08",
|
|
"id": 208688599,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/208688599?v=4",
|
|
"html_url": "https:\/\/github.com\/zanks08",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/zanks08\/cve-2023-44487-demo",
|
|
"description": "Demo for detection and mitigation of HTTP\/2 Rapid Reset vulnerability (CVE-2023-44487)",
|
|
"fork": false,
|
|
"created_at": "2025-04-22T18:15:24Z",
|
|
"updated_at": "2025-04-23T18:40:44Z",
|
|
"pushed_at": "2025-04-22T21:24:08Z",
|
|
"stargazers_count": 1,
|
|
"watchers_count": 1,
|
|
"has_discussions": false,
|
|
"forks_count": 1,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 1,
|
|
"watchers": 1,
|
|
"score": 0,
|
|
"subscribers_count": 1
|
|
},
|
|
{
|
|
"id": 1024608213,
|
|
"name": "CVE_2023_44487-Rapid_Reset",
|
|
"full_name": "madhusudhan-in\/CVE_2023_44487-Rapid_Reset",
|
|
"owner": {
|
|
"login": "madhusudhan-in",
|
|
"id": 194240082,
|
|
"avatar_url": "https:\/\/avatars.githubusercontent.com\/u\/194240082?v=4",
|
|
"html_url": "https:\/\/github.com\/madhusudhan-in",
|
|
"user_view_type": "public"
|
|
},
|
|
"html_url": "https:\/\/github.com\/madhusudhan-in\/CVE_2023_44487-Rapid_Reset",
|
|
"description": "A comprehensive Python testing tool for CVE-2023-44487, the HTTP\/2 Rapid Reset vulnerability. This enhanced version provides granular control over testing parameters, multiple attack patterns, and advanced monitoring capabilities.",
|
|
"fork": false,
|
|
"created_at": "2025-07-23T01:32:44Z",
|
|
"updated_at": "2025-10-16T06:59:47Z",
|
|
"pushed_at": "2025-08-29T09:39:17Z",
|
|
"stargazers_count": 0,
|
|
"watchers_count": 0,
|
|
"has_discussions": false,
|
|
"forks_count": 0,
|
|
"allow_forking": true,
|
|
"is_template": false,
|
|
"web_commit_signoff_required": false,
|
|
"topics": [],
|
|
"visibility": "public",
|
|
"forks": 0,
|
|
"watchers": 0,
|
|
"score": 0,
|
|
"subscribers_count": 0
|
|
}
|
|
] |