{"payload":{"pageCount":3,"repositories":[{"type":"Public","name":"analyzer","owner":"qeeqbox","isFork":false,"description":"Analyze, extract and visualize features, artifacts and IoCs of files and memory dumps (Windows, Linux, Android, iPhone, Blackberry, macOS binaries, emails and more)","allTopics":["analysis","analyzer","visualizes","python","osint","malware","phishing","malware-analysis"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":255,"forksCount":59,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,4,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-15T20:22:51.217Z"}},{"type":"Public","name":"honeypots","owner":"qeeqbox","isFork":false,"description":"30 different honeypots in one package! (dhcp, dns, elastic, ftp, http proxy, https proxy, http, https, imap, ipp, irc, ldap, memcache, mssql, mysql, ntp, oracle, pjl, pop3, postgres, rdp, redis, sip, smb, smtp, snmp, socks5, ssh, telnet, vnc)","allTopics":["python","emulator","credentials","pypi","twisted","malware-analysis","network-analysis","monitoring-tool","honeypots","pypi-package","honeypot"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":10,"starsCount":604,"forksCount":108,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,6,0,4,0,0,6,0,0,12,0,0,0,0,0,0,0,0,17,0,0,0,0,25,31,23,13,24,31,3,0,6,0,5,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-09T09:15:48.880Z"}},{"type":"Public","name":"social-analyzer","owner":"qeeqbox","isFork":false,"description":"API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \\ websites","allTopics":["nodejs","javascript","cli","profile","social-media","analysis","analyzer","pentesting","username","pentest","nodejs-cli","security-tools","social-analyzer","person-profile","sosint","python","osint","information-gathering","reconnaissance"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":5,"issueCount":7,"starsCount":11180,"forksCount":890,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-16T22:47:55.237Z"}},{"type":"Public","name":"threat-intelligence","owner":"qeeqbox","isFork":false,"description":"Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, and future cyber threats (Collecting information about a potential threat, then analyzing that information to learn more about the negative events)","allTopics":["cycle","threat-intelligence","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-18T18:01:28.257Z"}},{"type":"Public","name":"data-lifecycle-management","owner":"qeeqbox","isFork":false,"description":"Data Lifecycle Management (DLM) is a policy-based model for managing data in an organization","allTopics":["data","management","lifecycle","qeeqbox","infosecsimplified","data-lifecycle-management"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:14:50.478Z"}},{"type":"Public","name":"cyber-kill-chain","owner":"qeeqbox","isFork":false,"description":"Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks","allTopics":["chain","lifecycle","kill","cyberattack","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:14:19.840Z"}},{"type":"Public","name":"two-factor-authentication-sim-swapping","owner":"qeeqbox","isFork":false,"description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","allTopics":["visualization","metadata","example","vulnerability","sim","2fa","swapping","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":2,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:13:59.852Z"}},{"type":"Public","name":"two-factor-authentication-sim-cloning","owner":"qeeqbox","isFork":false,"description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","allTopics":["vulnerability","bypass","2factor","qeeqbox","infosecsimplified","authintacation"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":2,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:13:41.229Z"}},{"type":"Public","name":"digital-forensics","owner":"qeeqbox","isFork":false,"description":"Digital Forensics is the process of finding and analyzing electronic data","allTopics":["visualization","cycle","digital-forensics","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:13:06.126Z"}},{"type":"Public","name":"cybersecurity","owner":"qeeqbox","isFork":false,"description":"Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks","allTopics":["visualization","cycle","cybersecurity","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:12:36.614Z"}},{"type":"Public","name":"incident-response","owner":"qeeqbox","isFork":false,"description":"Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack","allTopics":["incident-response","cycle","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":2,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:08:17.770Z"}},{"type":"Public","name":"authorization-bypass","owner":"qeeqbox","isFork":false,"description":"A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier","allTopics":["metadata","example","authorization","vulnerability","bypass","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:08:03.374Z"}},{"type":"Public","name":"default-credential","owner":"qeeqbox","isFork":false,"description":"A threat actor may gain unauthorized access using the default username and password","allTopics":["visualization","metadata","credentials","example","vulnerability","default","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:07:48.223Z"}},{"type":"Public","name":"password-spraying","owner":"qeeqbox","isFork":false,"description":"A threat actor may guess the target credentials using a single password with a large set of usernames against the target","allTopics":["visualization","metadata","example","password","vulnerability","spraying","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:07:23.113Z"}},{"type":"Public","name":"credential-stuffing","owner":"qeeqbox","isFork":false,"description":"A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks","allTopics":["visualization","credentials","example","vulnerability","metadta","stuffing","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:06:15.155Z"}},{"type":"Public","name":"directory-listing","owner":"qeeqbox","isFork":false,"description":"A threat actor may list files on a misconfigured server","allTopics":["directory","listing","vulnerability","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:05:58.160Z"}},{"type":"Public","name":"reflected-cross-site-scripting","owner":"qeeqbox","isFork":false,"description":"A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the victim's browser","allTopics":["visualization","metadata","scripting","site","xss","vulnerability","cross","reflected","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:05:42.646Z"}},{"type":"Public","name":"vertical-privilege-escalation","owner":"qeeqbox","isFork":false,"description":"A threat actor may perform unauthorized functions belonging to another user with a higher privileges level","allTopics":["visualization","metadata","example","vertical","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:05:26.187Z"}},{"type":"Public","name":"risk-management","owner":"qeeqbox","isFork":false,"description":"Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)","allTopics":["visualization","cycle","risk-management","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:05:11.084Z"}},{"type":"Public","name":"horizontal-privilege-escalation","owner":"qeeqbox","isFork":false,"description":"A threat actor may perform unauthorized functions belonging to another user with a similar privileges level","allTopics":["visualization","metadata","example","horizontal","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:04:56.001Z"}},{"type":"Public","name":"two-factor-authentication-brute-force","owner":"qeeqbox","isFork":false,"description":"A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target","allTopics":["visualization","authentication","example","brute-force","vulnerability","2fa","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:04:37.641Z"}},{"type":"Public","name":"authentication-bypass","owner":"qeeqbox","isFork":false,"description":"A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism","allTopics":["visualization","metadata","authentication","example","vulnerability","bypass","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:04:20.993Z"}},{"type":"Public","name":"captcha-bypass","owner":"qeeqbox","isFork":false,"description":"A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology","allTopics":["metadata","captcha","example","vulnerability","bypass","visulization","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:04:06.606Z"}},{"type":"Public","name":"xpath-injection","owner":"qeeqbox","isFork":false,"description":"A threat actor may alter the XML path language (XPath) query to read data on the target","allTopics":["visualization","metadata","injection","xpath","vulnerability","xpath-injection","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:03:48.211Z"}},{"type":"Public","name":"client-side-template-injection","owner":"qeeqbox","isFork":false,"description":"A threat actor may trick a victim into executing native template syntax on a vulnerable target","allTopics":["template","client","injection","vulnerability","side","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:03:28.104Z"}},{"type":"Public","name":"data-compliance","owner":"qeeqbox","isFork":false,"description":"Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse","allTopics":["data","compliance","data-compliance","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:02:56.444Z"}},{"type":"Public","name":"access-control","owner":"qeeqbox","isFork":false,"description":"Access Control is using security techniques to protect a system against unauthorized access","allTopics":["control","access","access-control","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:02:34.167Z"}},{"type":"Public","name":"data-security","owner":"qeeqbox","isFork":false,"description":"Safeguarding your personal information (How your info is protected)","allTopics":["security","data","data-security","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:02:20.385Z"}},{"type":"Public","name":"data-classification","owner":"qeeqbox","isFork":false,"description":"Data classification defines and categorizes data according to its type, sensitivity, and value","allTopics":["data","classification","data-classification","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:02:05.966Z"}},{"type":"Public","name":"stored-cross-site-scripting","owner":"qeeqbox","isFork":false,"description":"An adversary may inject malicious content into a vulnerable target","allTopics":["metadata","example","stored","scripting","site","vulnerability","xss-vulnerability","cross","visulization","qeeqbox","infosecsimplified"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1,"license":"GNU Affero General Public License v3.0","participation":[0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T01:01:03.812Z"}}],"repositoryCount":90,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}