{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"pyrdp","owner":"GoSecure","isFork":false,"description":"RDP monster-in-the-middle (mitm) and library for Python with the ability to watch connections live or after the fact","allTopics":["security","honeypot","mitm","rdp","pentest","hacktoberfest","pyrdp"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":10,"issueCount":42,"starsCount":1446,"forksCount":240,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-28T06:08:59.309Z"}},{"type":"Public","name":"request-smuggling-workshop","owner":"GoSecure","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":21,"forksCount":11,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-10T16:04:24.822Z"}},{"type":"Public","name":"php7-opcache-override","owner":"GoSecure","isFork":false,"description":"Security-related PHP7 OPcache abuse tools and demo","allTopics":["php7","poc","vulnerability","opcache"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":303,"forksCount":121,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-02T07:56:03.875Z"}},{"type":"Public","name":"pywsus","owner":"GoSecure","isFork":false,"description":"Standalone implementation of a part of the WSUS spec. Built for offensive security purposes.","allTopics":["attack","wsus","hacktoberfest","python"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":5,"starsCount":275,"forksCount":44,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-11-11T19:59:21.212Z"}},{"type":"Public","name":"ldap-scanner","owner":"GoSecure","isFork":false,"description":"Checks for signature requirements over LDAP","allTopics":["ldap","hacktoberfest","ntlm-relay"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":87,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-11T18:14:59.659Z"}},{"type":"Public","name":"Spray365","owner":"GoSecure","isFork":true,"description":"Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":57,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-16T19:03:09.485Z"}},{"type":"Public","name":"peas","owner":"GoSecure","isFork":true,"description":"PEAS is a Python 2 library and command line application for running commands on an ActiveSync server e.g. Microsoft Exchange.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":58,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-10T14:54:57.019Z"}},{"type":"Public","name":"ScoutSuite","owner":"GoSecure","isFork":true,"description":"Multi-Cloud Security Auditing Tool","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1008,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-12-10T16:11:55.875Z"}},{"type":"Public","name":"linkedin-osint","owner":"GoSecure","isFork":false,"description":"A simple proof of concept that demonstrate how emails can easily be tie to LinkedIn profile","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":32,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-26T12:47:26.328Z"}},{"type":"Public","name":"malboxes","owner":"GoSecure","isFork":false,"description":"Builds malware analysis Windows VMs so that you don't have to.","allTopics":["vagrant","packer","virtual-machine","python3","malware-analysis","malware-research","hacktoberfest"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":25,"starsCount":1020,"forksCount":136,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-23T19:51:38.085Z"}},{"type":"Public","name":"Cisco2Checkpoint","owner":"GoSecure","isFork":false,"description":"Tool that assists in migrating firewall rules from Cisco to Checkpoint. Will optimize rules for you (rationalization, reuse merging, etc.).","allTopics":["cisco","checkpoint","firewall-rules","ciscoconfparse"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":9,"starsCount":21,"forksCount":11,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-10T13:35:23.659Z"}},{"type":"Public","name":"CrackMapExec","owner":"GoSecure","isFork":true,"description":"A swiss army knife for pentesting networks","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1628,"license":"BSD 2-Clause \"Simplified\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-21T13:03:33.824Z"}},{"type":"Public","name":"impacket","owner":"GoSecure","isFork":true,"description":"Impacket is a collection of Python classes for working with network protocols.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3465,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-02T16:29:56.479Z"}},{"type":"Public archive","name":"freshonions-torscraper","owner":"GoSecure","isFork":true,"description":"Fresh Onions is an open source TOR spider / hidden service onion crawler","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":6,"starsCount":81,"forksCount":147,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-26T20:51:20.619Z"}},{"type":"Public","name":"SprayingToolkit","owner":"GoSecure","isFork":true,"description":"Scripts to make password spraying attacks against Lync/S4B & OWA a lot quicker, less painful and more efficient","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":264,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-27T14:17:44.371Z"}},{"type":"Public","name":"cpAnsible","owner":"GoSecure","isFork":true,"description":"Ansible module provides control over a Check Point Management server using Check Point's web-services APIs.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":26,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-16T02:31:12.392Z"}},{"type":"Public","name":"oletools","owner":"GoSecure","isFork":true,"description":"oletools - python tools to analyze MS OLE2 files (Structured Storage, Compound File Binary Format) and MS Office documents, for malware analysis, forensics and debugging.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":559,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-13T19:36:58.635Z"}},{"type":"Public","name":"cowrie","owner":"GoSecure","isFork":true,"description":"Cowrie SSH Honeypot (based on kippo)","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":853,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-23T03:55:23.768Z"}},{"type":"Public","name":"orange-code-widget","owner":"GoSecure","isFork":false,"description":"🍊 Widget for Orange to visualize code sample","allTopics":["data-science","machine-learning","code","data-visualization","add-on","widget","orange"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":6,"forksCount":1,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-19T14:52:59.630Z"}},{"type":"Public","name":"gophish-cli","owner":"GoSecure","isFork":false,"description":"Gophish Python cli to perform huge phishing campaigns","allTopics":["phishing","campaign"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":40,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-19T08:52:39.099Z"}},{"type":"Public","name":"api-client-python","owner":"GoSecure","isFork":true,"description":"A Python API Client for Gophish","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":43,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-06-28T15:36:45.345Z"}},{"type":"Public","name":"pandas","owner":"GoSecure","isFork":true,"description":"Flexible and powerful data analysis / manipulation library for Python, providing labeled data structures similar to R data.frame objects, statistical functions, and much more","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":17423,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-20T16:50:39.612Z"}},{"type":"Public","name":"break-fast-serial","owner":"GoSecure","isFork":false,"description":"A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs","allTopics":["java","security","serialization","exploit","tool","vulnerability"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":54,"forksCount":16,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-03-27T21:34:22.677Z"}},{"type":"Public","name":"wsuspect-proxy","owner":"GoSecure","isFork":true,"description":"WSUSpect Proxy - a tool for MITM'ing insecure WSUS connections","allTopics":["windows","blackhat","wsus","man-in-the-middle","exploitation"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":76,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-01-30T15:59:35.113Z"}},{"type":"Public","name":"ciscoconfparse","owner":"GoSecure","isFork":true,"description":"Parse, Audit, Query, Build, and Modify Cisco IOS-style configurations","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":220,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-08-15T12:28:39.693Z"}},{"type":"Public","name":"tachyon","owner":"GoSecure","isFork":true,"description":"Fast Multi-Threaded Web Discovery Tool","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":33,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-06-28T14:14:19.603Z"}},{"type":"Public","name":"inception","owner":"GoSecure","isFork":true,"description":"Inception is a physical memory manipulation and hacking tool exploiting PCI-based DMA. The tool can attack over FireWire, Thunderbolt, ExpressCard, PC Card and any other PCI/PCIe interfaces.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":195,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-04-05T17:38:43.937Z"}},{"type":"Public","name":"docker-cowrie-kost","owner":"GoSecure","isFork":true,"description":"A Docker container for Cowrie - SSH honeypot based on kippo","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":7,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-02-04T16:02:46.065Z"}}],"repositoryCount":28,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}