{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"install-aws-cli-action","owner":"BishopFox","isFork":true,"description":"Install AWS CLI on a GitHub Actions Linux host","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":31,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-26T20:41:06.955Z"}},{"type":"Public","name":"minisign-action","owner":"BishopFox","isFork":true,"description":"Github action to sign and verify minisign/signify signatures","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-26T20:39:33.404Z"}},{"type":"Public","name":"badPods","owner":"BishopFox","isFork":false,"description":"A collection of manifests that will create pods with elevated privileges.","allTopics":["kubernetes","security","assessment","penetration-testing","exploitation","podspec","pods","privileged","hostpath","hostpid","hostnetwork","hostipc"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":554,"forksCount":99,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-02T20:34:52.386Z"}},{"type":"Public","name":"docker-selenium","owner":"BishopFox","isFork":true,"description":"Docker images for the Selenium Grid Server","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":2496,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-18T11:21:39.943Z"}},{"type":"Public","name":"ca-clone","owner":"BishopFox","isFork":false,"description":"Scripts to clone CA certificates for use in HTTPS client attacks.","allTopics":["reverse-engineering","mitm","pentesting","security-tools"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":32,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-26T19:55:52.614Z"}},{"type":"Public","name":"pwn-pulse","owner":"BishopFox","isFork":false,"description":"Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)","allTopics":["exploit","penetration-testing","infosec","pentesting","cve","red-team","pentest-scripts","security-tools"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":1,"starsCount":136,"forksCount":60,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-15T17:01:50.621Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}