{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"LLVM-Obfuscation-Experiments","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":1,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-22T18:37:38.585Z"}},{"type":"Public","name":"CS-Remote-OPs-BOF","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":4,"issueCount":0,"starsCount":701,"forksCount":115,"license":"GNU General Public License v2.0","participation":[0,0,0,0,0,0,0,0,0,0,1,1,0,0,0,0,2,0,3,0,2,2,0,0,0,0,0,0,0,0,0,0,0,0,4,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-08T14:08:30.028Z"}},{"type":"Public","name":"VerifyELF","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":20,"forksCount":0,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,1,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-06T20:17:13.689Z"}},{"type":"Public","name":"CS-Situational-Awareness-BOF","owner":"trustedsec","isFork":false,"description":"Situational Awareness commands implemented using Beacon Object Files","allTopics":["c","cna","bof"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":2,"issueCount":1,"starsCount":1154,"forksCount":206,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-13T00:03:22.799Z"}},{"type":"Public","name":"Windows-MS-LSAT-RPC-Example","owner":"trustedsec","isFork":false,"description":"Windows RPC example calling stubs generated from MS-LSAT and MS-LSAD","allTopics":["c","windows","visual-studio","cpp","rpc"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":24,"forksCount":4,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-04T19:34:07.677Z"}},{"type":"Public","name":"TCS_InjectionTechniques","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":12,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-11T12:05:35.019Z"}},{"type":"Public","name":"PPLFaultDumpBOF","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":129,"forksCount":11,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-17T12:57:20.084Z"}},{"type":"Public","name":"COFFLoader","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":432,"forksCount":68,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-15T20:42:41.921Z"}},{"type":"Public","name":"ELFLoader","owner":"trustedsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":225,"forksCount":41,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-16T17:48:40.862Z"}},{"type":"Public","name":"trevorc2","owner":"trustedsec","isFork":false,"description":"TrevorC2 is a legitimate website (browsable) that tunnels client/server communications for covert command execution.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":2,"starsCount":1195,"forksCount":246,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-31T20:16:24.405Z"}},{"type":"Public","name":"inProc_Evade_Get-InjectedThread","owner":"trustedsec","isFork":false,"description":"PoC code from blog","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":15,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-10T16:10:41.925Z"}},{"type":"Public","name":"pivoter","owner":"trustedsec","isFork":false,"description":"Pivoter is a proxy tool for pentesters to have easier lateral movement. ","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":2,"starsCount":138,"forksCount":41,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-08-09T08:08:08.606Z"}}],"repositoryCount":12,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}