{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"cackalacky-badge-api","owner":"lockfale","isFork":false,"description":"2024 API that the badge interacts with","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-27T17:48:50.959Z"}},{"type":"Public","name":"cackalacky-high-score-processor","owner":"lockfale","isFork":false,"description":"2024 score processor for cackalacky badge api","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-27T17:44:16.602Z"}},{"type":"Public","name":"Malicious_Containers_Workshop","owner":"lockfale","isFork":false,"description":"Workshop resources and materials for Workshop presented at DefCon and other security conferences - Creating and Uncovering Malicious Containers","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":40,"forksCount":7,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-02T03:06:55.627Z"}},{"type":"Public","name":"container_registry_attacks","owner":"lockfale","isFork":false,"description":"Code for container registry attacks","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-19T16:18:44.365Z"}},{"type":"Public","name":"endgame","owner":"lockfale","isFork":true,"description":"An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share the resources with the entire internet 😈","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":510,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-16T20:59:56.051Z"}},{"type":"Public","name":"MoGic_8ball","owner":"lockfale","isFork":false,"description":"Your virtual MoG","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-15T18:23:11.403Z"}},{"type":"Public","name":"dirty_sock","owner":"lockfale","isFork":true,"description":"Ubuntu Linux privilege escalation exploit (CVE-2019-7304)","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":153,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-13T01:21:04.655Z"}},{"type":"Public","name":"SPIZZLE","owner":"lockfale","isFork":false,"description":"SPIZZLE, The Onion Spider.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":8,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-27T16:55:50.547Z"}},{"type":"Public","name":"ProxDuino","owner":"lockfale","isFork":false,"description":"Arduino/python powered RFID proximity card/maglock entry system","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-27T16:40:58.019Z"}},{"type":"Public","name":"reverse_report.py","owner":"lockfale","isFork":false,"description":"Queries the JSON provided by reverse.report to lookup matches for a domain","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-03-18T18:53:11.751Z"}},{"type":"Public","name":"ntds-data-parse","owner":"lockfale","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-03-16T18:34:51.598Z"}},{"type":"Public","name":"JavaUnserializeExploits","owner":"lockfale","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":258,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-11-11T21:39:34.481Z"}},{"type":"Public","name":"CredCrack","owner":"lockfale","isFork":true,"description":"A fast and stealthy credential harvester","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":108,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-08-14T04:35:59.117Z"}},{"type":"Public","name":"HashTag","owner":"lockfale","isFork":true,"description":"Password Hash Identification","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":53,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-11-06T23:37:32.732Z"}},{"type":"Public","name":"osintstalker","owner":"lockfale","isFork":true,"description":"osintstalker","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":216,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-10-23T18:40:17.000Z"}},{"type":"Public","name":"SpoofSpotter","owner":"lockfale","isFork":true,"description":"A tool to catch spoofed NBNS responses.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":27,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-09-05T01:20:49.000Z"}},{"type":"Public","name":"Raspberry-Pwn","owner":"lockfale","isFork":true,"description":"A Raspberry Pi pentesting suite by Pwnie Express","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":188,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-06-18T13:16:24.000Z"}},{"type":"Public","name":"Veil","owner":"lockfale","isFork":true,"description":"Veil is a tool used to generate payloads that bypass antivirus solutions","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":690,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-06-14T12:40:34.000Z"}},{"type":"Public","name":"social-engineer-toolkit","owner":"lockfale","isFork":true,"description":"The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2676,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-06-13T00:00:17.000Z"}},{"type":"Public","name":"Responder","owner":"lockfale","isFork":true,"description":"Responder is a LLMNR and NBT-NS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv2/LMv2, Extended Security NTLMSSP and Basic HTTP authentication.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1648,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-06-12T16:13:09.000Z"}},{"type":"Public","name":"Scrape-Subreddit-Users","owner":"lockfale","isFork":true,"description":"Utilities for identifying users subscribed to s subreddit, downloading their comment histories, and analyzing their commenting behavior","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2012-10-21T16:10:33.000Z"}}],"repositoryCount":21,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}