{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"tpotmobile","owner":"telekom-security","isFork":false,"description":"🛜 T-Pot Mobile - The All In One Wireless Honeypot Solution 🍯","allTopics":["security","mobile","raspberrypi","honeypot","telekom","deception","t-pot"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":26,"forksCount":2,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T13:49:30.774Z"}},{"type":"Public","name":"SafeSCARF-Connector","owner":"telekom-security","isFork":false,"description":"SafeSCARF Connector","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,7,29,1,0,0,0,9,0,0,0,0,3,0,0,0,0,0,4,0,0,0,0,0,0,0,0,0,0,2,0,0,2,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-02T08:00:53.079Z"}},{"type":"Public","name":"malware_analysis","owner":"telekom-security","isFork":false,"description":"This repository contains analysis scripts, YARA rules, and additional IoCs related to our Telekom Security blog posts.","allTopics":["reverse-engineering","cti","malware","malware-analysis","malware-research"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":1,"starsCount":106,"forksCount":15,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-13T11:54:24.279Z"}},{"type":"Public","name":"cve-2023-3519-citrix-scanner","owner":"telekom-security","isFork":false,"description":"Citrix Scanner for CVE-2023-3519","allTopics":["patch","citrix","cve-2023-3519"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":45,"forksCount":8,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-24T11:49:37.740Z"}},{"type":"Public","name":"officerscript","owner":"telekom-security","isFork":false,"description":"Officer Script is used to generate workforce schedule according to self defined rules","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-04T08:16:22.453Z"}},{"type":"Public","name":"ewsposter","owner":"telekom-security","isFork":false,"description":"collect logs and alerts from 27 honeypots and send it to backed (eg peba, geba), hpfeeds, influxdb or jSON file.","allTopics":["honeypot","honeypots","hpfeeds"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":16,"forksCount":7,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-21T08:26:41.452Z"}},{"type":"Public","name":"PEBA","owner":"telekom-security","isFork":false,"description":"Python EWS Backend API","allTopics":["flask","ansible","elasticsearch","memcached","backend","honeypot","python3","ews","t-pot"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":1,"starsCount":27,"forksCount":12,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-03T17:45:46.853Z"}},{"type":"Public archive","name":"explo","owner":"telekom-security","isFork":false,"description":"Human and machine readable web vulnerability testing format","allTopics":["security","automation","web-security","pentesting"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":1,"starsCount":174,"forksCount":46,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-19T04:19:40.057Z"}},{"type":"Public archive","name":"acquire-aws-ec2","owner":"telekom-security","isFork":false,"description":"A python script to acquire multiple aws ec2 instances in a forensically sound-ish way","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":35,"forksCount":4,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-08T10:33:57.212Z"}}],"repositoryCount":9,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}