{"payload":{"pageCount":3,"repositories":[{"type":"Public","name":"vdp-scanner-docker","owner":"cisagov","isFork":false,"description":"Docker image to run VDP scanning.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":2,"starsCount":9,"forksCount":2,"license":"Creative Commons Zero v1.0 Universal","participation":[2,8,2,2,0,0,0,13,11,1,6,5,2,1,8,1,23,3,0,0,2,3,7,1,0,0,0,0,11,8,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,0,1,0,0,1,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-16T13:20:13.617Z"}},{"type":"Public","name":"manage.get.gov","owner":"cisagov","isFork":false,"description":"A Django-based domain name registrar used by the .gov domain to communicate with an EPP registry","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":7,"issueCount":247,"starsCount":51,"forksCount":13,"license":"Other","participation":[54,39,70,65,46,29,10,9,21,11,23,49,84,66,73,37,109,56,83,178,141,125,146,234,180,111,196,163,198,127,154,87,101,185,136,142,143,105,79,56,102,130,99,117,69,103,115,146,117,147,134,19],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-16T15:50:18.462Z"}},{"type":"Public","name":"cyhy-reports","owner":"cisagov","isFork":false,"description":"Code to generate Cyber Hygiene (CyHy) reports","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":3,"starsCount":8,"forksCount":6,"license":null,"participation":[0,0,0,0,0,0,0,2,8,5,7,0,0,2,1,4,1,3,2,0,0,2,26,12,0,7,5,2,13,3,0,0,0,0,0,0,22,10,0,0,4,7,1,2,8,15,7,4,0,0,0,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T15:56:08.902Z"}},{"type":"Public","name":"guacscanner","owner":"cisagov","isFork":false,"description":"Scan for EC2 instances added (removed) from a VPC and create (destroy) the corresponding Guacamole connections.","topicNames":["hacktoberfest"],"topicsNotShown":0,"allTopics":["hacktoberfest"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":9,"starsCount":4,"forksCount":3,"license":"Creative Commons Zero v1.0 Universal","participation":[3,4,2,3,0,0,0,16,5,0,0,1,1,1,8,1,20,0,0,0,1,0,1,0,0,0,0,0,0,0,6,12,3,4,2,2,4,4,2,2,2,2,2,2,2,0,2,2,2,2,4,4],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T15:23:32.888Z"}},{"type":"Public","name":"client-cert-update","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":3,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T15:01:49.455Z"}},{"type":"Public","name":"parsnip","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":55,"forksCount":7,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T15:01:22.989Z"}},{"type":"Public","name":"Malcolm","owner":"cisagov","isFork":false,"description":"Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.","topicNames":["cybersecurity","suricata","infosec","zeek","opensearch","network-traffic-analysis","networksecurity","arkime","opensearch-dashboards","networktrafficanalysis"],"topicsNotShown":3,"allTopics":["cybersecurity","suricata","infosec","zeek","opensearch","network-traffic-analysis","networksecurity","arkime","opensearch-dashboards","networktrafficanalysis","security","pcap","network-security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":1,"starsCount":1760,"forksCount":294,"license":"Other","participation":[31,17,8,15,25,19,3,26,37,27,29,17,32,17,6,12,13,40,5,9,20,15,23,31,1,21,11,17,29,52,24,6,13,53,37,47,23,49,40,36,29,38,14,45,18,33,25,4,14,26,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-06T21:19:23.774Z"}},{"type":"Public","name":"development-guide","owner":"cisagov","isFork":false,"description":"A set of guidelines and best practices for an awesome engineering team","topicNames":["documentation","guide","start-here"],"topicsNotShown":0,"allTopics":["documentation","guide","start-here"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":21,"starsCount":200,"forksCount":52,"license":"Creative Commons Zero v1.0 Universal","participation":[5,4,2,5,0,0,4,13,5,0,0,1,1,1,8,1,18,4,1,0,0,0,0,1,3,1,0,0,0,2,0,0,0,2,1,11,12,9,6,5,14,18,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T13:02:38.065Z"}},{"type":"Public","name":"prescup-challenges","owner":"cisagov","isFork":false,"description":"President's Cup Cybersecurity Competition Challenges","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":132,"forksCount":28,"license":"Other","participation":[1,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,1,0,0,0,0,0,1,0,0,0,1,0,1,0,1,0,0,0,0,0,0,1,0,0,0,6,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-01T20:03:27.041Z"}},{"type":"Public","name":"untitledgoosetool","owner":"cisagov","isFork":false,"description":"Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":4,"starsCount":894,"forksCount":77,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-29T14:08:55.742Z"}},{"type":"Public","name":"cyhy-mailer","owner":"cisagov","isFork":false,"description":"Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":5,"starsCount":10,"forksCount":6,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-24T14:10:26.460Z"}},{"type":"Public","name":"cyhy-core","owner":"cisagov","isFork":false,"description":"","topicNames":["python","cyhy"],"topicsNotShown":0,"allTopics":["python","cyhy"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":11,"starsCount":6,"forksCount":9,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-26T22:48:33.020Z"}},{"type":"Public","name":"pshtt_reporter","owner":"cisagov","isFork":false,"description":"Generate HTTPS reports based on scan data","topicNames":["cisa-directives"],"topicsNotShown":0,"allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":12,"forksCount":9,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-16T19:23:21.419Z"}},{"type":"Public","name":"ATC-Framework","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":17,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-09T15:28:24.133Z"}},{"type":"Public","name":"skeleton-python-library","owner":"cisagov","isFork":false,"description":"A skeleton project for quickly getting a new cisagov Python library started.","topicNames":["python","skeleton"],"topicsNotShown":0,"allTopics":["python","skeleton"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":8,"issueCount":0,"starsCount":25,"forksCount":8,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T23:07:16.004Z"}},{"type":"Public","name":"network-architecture-verification-and-validation","owner":"cisagov","isFork":false,"description":"The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":9,"starsCount":23,"forksCount":12,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-06T16:15:37.391Z"}},{"type":"Public","name":"saver","owner":"cisagov","isFork":false,"description":"Save scan results to a database","topicNames":["cisa-directives"],"topicsNotShown":0,"allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":7,"issueCount":5,"starsCount":9,"forksCount":7,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-16T14:06:25.644Z"}},{"type":"Public","name":"icsnpp-genisys","owner":"cisagov","isFork":false,"description":"Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":15,"forksCount":8,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-20T18:25:19.499Z"}},{"type":"Public","name":"trustymail_reporter","owner":"cisagov","isFork":false,"description":"Generate Trustworthy Email reports based on scan data","topicNames":["cisa-directives"],"topicsNotShown":0,"allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":6,"starsCount":10,"forksCount":4,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-20T14:17:29.931Z"}},{"type":"Public archive","name":"pe-reports","owner":"cisagov","isFork":false,"description":"Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":28,"issueCount":165,"starsCount":17,"forksCount":5,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-13T20:09:25.156Z"}},{"type":"Public","name":"davidh_5-repo","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-13T14:45:17.487Z"}},{"type":"Public","name":"assessment-reporting-engine","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":7,"issueCount":14,"starsCount":24,"forksCount":8,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T00:13:37.018Z"}},{"type":"Public","name":"qualys-wasreport-generator","owner":"cisagov","isFork":false,"description":"Generates CISA Web Application Scanning reports from Qualys scanning data","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-06T20:54:44.738Z"}},{"type":"Public","name":"davidh_4-repo","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-05T19:37:21.559Z"}},{"type":"Public","name":"gophish-tools","owner":"cisagov","isFork":false,"description":"Helpful tools for interacting with a GoPhish phishing instance","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":13,"issueCount":5,"starsCount":40,"forksCount":6,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T14:53:39.131Z"}},{"type":"Public","name":"cyhy-feeds","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":4,"starsCount":1,"forksCount":2,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-14T16:25:09.663Z"}},{"type":"Public","name":"manage-cyhy-ops","owner":"cisagov","isFork":false,"description":"Manage CyHy Operators in the production CyHy environment.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":1,"starsCount":2,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-17T17:05:07.485Z"}},{"type":"Public","name":"action-lineage","owner":"cisagov","isFork":false,"description":"","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":6,"starsCount":6,"forksCount":4,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-11T19:34:01.805Z"}},{"type":"Public","name":"tpt-reports","owner":"cisagov","isFork":false,"description":"Process to build and distribute Technical Phishing Test (TPT) reports","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":4,"starsCount":4,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-02T16:37:54.644Z"}},{"type":"Public","name":"mongo-db-from-config","owner":"cisagov","isFork":false,"description":"Simple library to instantiate a MongoDB database connection based on the data in a YAML configuration file","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-26T18:27:49.183Z"}}],"repositoryCount":82,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}