{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"exploit-MS09-050","owner":"strm-exploits","isFork":true,"description":"Microsoft Windows 7 SMB2.0 Remote Blue Screen of Death","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-06T00:29:05.176Z"}},{"type":"Public","name":"exploit-phpldapadmin-remote-dump","owner":"strm-exploits","isFork":true,"description":"phpldapadmin remote exploit and vulnerable container !","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-09T20:48:32.273Z"}},{"type":"Public","name":"exploit-cve-2017-5715","owner":"strm-exploits","isFork":true,"description":"Spectre exploit","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":19,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-01-09T22:27:25.393Z"}},{"type":"Public","name":"exploit-CVE-2017-7494","owner":"strm-exploits","isFork":true,"description":"SambaCry exploit and vulnerable container (CVE-2017-7494)","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":100,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-31T16:20:29.259Z"}},{"type":"Public","name":"exploit-CVE-2014-6271","owner":"strm-exploits","isFork":true,"description":"Shellshock exploit + vulnerable environment","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":56,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-30T22:46:11.111Z"}},{"type":"Public","name":"exploit-CVE-2016-7434","owner":"strm-exploits","isFork":true,"description":"NTPD remote DOS exploit and vulnerable container","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":15,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-30T22:35:46.951Z"}},{"type":"Public","name":"exploit-CVE-2016-6515","owner":"strm-exploits","isFork":true,"description":"OpenSSH remote DOS exploit and vulnerable container","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":30,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-30T22:29:20.203Z"}},{"type":"Public","name":"exploit-blacknurse","owner":"strm-exploits","isFork":true,"description":"Black Nurse DOS attack","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":24,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-30T22:04:42.849Z"}},{"type":"Public","name":"exploit-CVE-2016-10033","owner":"strm-exploits","isFork":true,"description":"PHPMailer < 5.2.18 Remote Code Execution exploit and vulnerable container","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":150,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-30T21:59:07.154Z"}}],"repositoryCount":9,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}