{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"new","owner":"GTFOBins","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-15T16:41:16.613Z"}},{"type":"Public","name":"GTFOBins.github.io","owner":"GTFOBins","isFork":false,"description":"GTFOBins is a curated list of Unix binaries that can be used to bypass local security restrictions in misconfigured systems","allTopics":["linux","unix","reverse-shell","binaries","post-exploitation","bypass","exfiltration","blueteam","redteam","bind-shell","gtfobins"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":43,"issueCount":8,"starsCount":10653,"forksCount":1314,"license":"GNU General Public License v3.0","participation":[1,0,0,5,0,0,0,0,2,2,1,0,14,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,1,0,0,0,0,0,0,0,0,1,0,1,0,0,1,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-23T10:47:57.777Z"}}],"repositoryCount":2,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"GTFOBins repositories"}