{"payload":{"pageCount":3,"repositories":[{"type":"Public","name":"manage.get.gov","owner":"cisagov","isFork":false,"description":"A Django-based domain name registrar used by the .gov domain to communicate with an EPP registry","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":13,"issueCount":258,"starsCount":51,"forksCount":14,"license":"Other","participation":[64,69,29,17,6,21,6,21,35,41,94,66,68,48,90,80,95,205,110,158,209,148,164,122,183,210,153,165,126,93,102,202,133,143,111,92,87,63,120,120,84,115,70,103,140,124,131,165,85,46,45,19],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-02T00:00:11.882Z"}},{"type":"Public","name":"publish-egress-ip-lambda","owner":"cisagov","isFork":false,"description":"A Lambda function that scans a set of AWS accounts and publishes file(s) (to an S3 bucket) containing the public IP addresses of EC2 instances or Elastic IPs that have been properly tagged","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":5,"issueCount":0,"starsCount":3,"forksCount":2,"license":"Creative Commons Zero v1.0 Universal","participation":[5,0,0,0,0,17,1,3,1,0,1,1,8,1,18,1,4,0,0,0,0,4,1,0,0,0,0,2,0,0,2,1,4,15,4,9,6,5,15,15,0,0,0,0,0,0,0,0,20,17,9,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T18:49:51.213Z"}},{"type":"Public","name":"saver","owner":"cisagov","isFork":false,"description":"Save scan results to a database","allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":9,"forksCount":7,"license":"Creative Commons Zero v1.0 Universal","participation":[4,0,0,0,0,24,2,4,2,3,2,1,8,1,23,3,0,0,2,0,0,0,0,0,0,0,16,1,0,0,0,0,0,0,6,4,0,6,3,0,0,0,0,0,0,0,0,0,0,0,0,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T20:09:16.230Z"}},{"type":"Public","name":"LME","owner":"cisagov","isFork":false,"description":"Logging Made Easy (LME) is a no-cost and open logging and protective monitoring solution serving all organizations.","allTopics":["security","elasticsearch","log","logging","elk","cybersecurity","elastic","network-analysis","zeek","elk-stack","security-tools"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":93,"starsCount":752,"forksCount":57,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,3,0,6,20,18,14,0,1,1,1,1,2,0,1,3,4,7,3,0,6,0,0,0,0,0,2,0,0,1,0,0,3],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T18:42:17.431Z"}},{"type":"Public","name":"prescup-challenges","owner":"cisagov","isFork":false,"description":"President's Cup Cybersecurity Competition Challenges","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":135,"forksCount":29,"license":"Other","participation":[0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,1,0,0,0,0,0,1,0,0,1,0,0,1,0,1,0,0,0,0,0,1,0,0,0,0,6,0,0,0,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T17:00:39.669Z"}},{"type":"Public","name":"Malcolm","owner":"cisagov","isFork":false,"description":"Malcolm is a powerful, easily deployable network traffic analysis tool suite for full packet capture artifacts (PCAP files), Zeek logs and Suricata alerts.","allTopics":["cybersecurity","suricata","infosec","zeek","opensearch","network-traffic-analysis","networksecurity","arkime","opensearch-dashboards","networktrafficanalysis","security","pcap","network-security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1786,"forksCount":297,"license":"Other","participation":[12,11,26,14,27,2,45,33,15,21,38,8,9,11,26,29,0,18,26,0,39,15,4,22,7,23,60,20,25,0,41,33,58,24,40,34,51,25,40,21,30,33,21,27,25,5,25,26,28,15,25,15],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T15:35:58.256Z"}},{"type":"Public","name":"cyhy-core","owner":"cisagov","isFork":false,"description":"Core code for Cyber Hygiene (CyHy)","allTopics":["python","cyhy"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":11,"starsCount":7,"forksCount":9,"license":"Other","participation":[0,0,0,0,2,5,0,0,0,0,0,0,0,0,0,0,0,0,0,7,5,0,0,0,0,0,2,2,5,0,0,0,0,0,0,2,0,0,0,0,2,0,1,5,2,0,3,0,0,0,0,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-28T19:01:04.051Z"}},{"type":"Public","name":"github-projects-burndown-chart","owner":"cisagov","isFork":true,"description":"An easy-to-use burndown chart generator for GitHub Project Boards.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":16,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,9,3,0,1,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-28T10:53:02.868Z"}},{"type":"Public","name":"parsnip","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":60,"forksCount":7,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,3,5,1,1,0,2,0,6,4,3,4,0,3,1,1,9,21,6,1,2,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-22T14:56:46.864Z"}},{"type":"Public","name":"cyhy-commander","owner":"cisagov","isFork":false,"description":"The central brain of the Cyber Hygiene vulnerability scanner","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":5,"starsCount":7,"forksCount":2,"license":null,"participation":[0,0,0,2,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-21T18:46:31.150Z"}},{"type":"Public","name":"client-cert-update","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":3,"forksCount":3,"license":"Creative Commons Zero v1.0 Universal","participation":[4,0,0,0,0,24,3,3,5,3,2,1,8,1,23,3,0,0,2,0,3,4,4,3,3,3,19,1,3,3,2,1,3,3,3,3,5,3,3,3,3,3,3,2,4,5,3,3,3,3,3,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-27T09:27:08.284Z"}},{"type":"Public","name":"guacscanner","owner":"cisagov","isFork":false,"description":"Scan for EC2 instances added (removed) from a VPC and create (destroy) the corresponding Guacamole connections.","allTopics":["hacktoberfest"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":9,"starsCount":4,"forksCount":3,"license":"Creative Commons Zero v1.0 Universal","participation":[5,0,0,0,0,20,1,0,1,0,1,1,8,1,20,0,0,0,1,0,1,0,0,0,0,0,0,0,17,2,2,4,2,2,4,4,2,2,2,2,2,2,2,0,2,2,2,2,4,4,2,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-27T01:06:26.256Z"}},{"type":"Public","name":"vdp-scanner-docker","owner":"cisagov","isFork":false,"description":"Docker image to run VDP scanning.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":5,"issueCount":2,"starsCount":9,"forksCount":2,"license":"Creative Commons Zero v1.0 Universal","participation":[4,0,0,0,0,23,2,2,5,4,2,1,8,1,23,3,0,0,2,4,7,0,0,0,0,0,18,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,1,0,0,1,1,1,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-27T14:29:19.114Z"}},{"type":"Public","name":"cyhy-reports","owner":"cisagov","isFork":false,"description":"Code to generate Cyber Hygiene (CyHy) reports","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":3,"starsCount":8,"forksCount":6,"license":null,"participation":[0,0,0,0,2,0,10,9,1,0,2,0,1,4,3,3,0,0,2,0,30,8,0,9,3,7,9,2,0,0,0,0,0,10,19,3,0,3,2,7,0,6,19,4,3,4,0,0,0,1,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-13T15:56:08.902Z"}},{"type":"Public","name":"development-guide","owner":"cisagov","isFork":false,"description":"A set of guidelines and best practices for an awesome engineering team","allTopics":["documentation","guide","start-here"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":21,"starsCount":202,"forksCount":51,"license":"Creative Commons Zero v1.0 Universal","participation":[6,1,0,4,0,17,1,0,1,0,1,1,8,1,22,1,0,0,0,0,0,4,1,0,0,0,0,2,0,0,2,1,4,15,4,9,6,5,15,17,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T13:02:38.065Z"}},{"type":"Public","name":"untitledgoosetool","owner":"cisagov","isFork":false,"description":"Untitled Goose Tool is a robust and flexible hunt and incident response tool that adds novel authentication and data gathering methods in order to run a full investigation against a customer’s Azure Active Directory (AzureAD), Azure, and M365 environments.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":4,"starsCount":896,"forksCount":77,"license":"Creative Commons Zero v1.0 Universal","participation":[3,0,0,0,0,0,8,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-29T14:08:55.742Z"}},{"type":"Public","name":"cyhy-mailer","owner":"cisagov","isFork":false,"description":"Email Cyber Hygiene, Trustworthy Email, and HTTPS reports to the appropriate technical or distribution addresses","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":10,"forksCount":6,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-24T14:10:26.460Z"}},{"type":"Public","name":"pshtt_reporter","owner":"cisagov","isFork":false,"description":"Generate HTTPS reports based on scan data","allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":5,"starsCount":12,"forksCount":9,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-16T19:23:21.419Z"}},{"type":"Public","name":"ATC-Framework","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":20,"starsCount":1,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-09T15:28:24.133Z"}},{"type":"Public","name":"skeleton-python-library","owner":"cisagov","isFork":false,"description":"A skeleton project for quickly getting a new cisagov Python library started.","allTopics":["python","skeleton"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":8,"issueCount":0,"starsCount":25,"forksCount":8,"license":"Creative Commons Zero v1.0 Universal","participation":[5,0,0,0,0,18,1,0,1,0,1,1,8,1,20,0,0,0,1,0,1,0,0,0,0,0,0,0,6,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T23:07:16.004Z"}},{"type":"Public","name":"network-architecture-verification-and-validation","owner":"cisagov","isFork":false,"description":"The NAVV (Network Architecture Verification and Validation) tool creates a spreadsheet for network traffic analysis from PCAP data and Zeek logs, automating Zeek analysis of PCAP files, the collation of Zeek logs and the dissection of conn.log and dns.log to create a summary or network traffic in an XLSX-formatted spreadsheet.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":9,"starsCount":23,"forksCount":12,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-06T16:15:37.391Z"}},{"type":"Public","name":"icsnpp-genisys","owner":"cisagov","isFork":false,"description":"Industrial Control Systems Network Protocol Parsers (ICSNPP) - Genisys over TCP/IP","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":15,"forksCount":8,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-20T18:25:19.499Z"}},{"type":"Public","name":"trustymail_reporter","owner":"cisagov","isFork":false,"description":"Generate Trustworthy Email reports based on scan data","allTopics":["cisa-directives"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":6,"starsCount":10,"forksCount":4,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-20T14:17:29.931Z"}},{"type":"Public archive","name":"pe-reports","owner":"cisagov","isFork":false,"description":"Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":28,"issueCount":165,"starsCount":17,"forksCount":5,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-13T20:09:25.156Z"}},{"type":"Public","name":"davidh_5-repo","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-13T14:45:17.487Z"}},{"type":"Public","name":"assessment-reporting-engine","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":7,"issueCount":15,"starsCount":24,"forksCount":8,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T00:13:37.018Z"}},{"type":"Public","name":"qualys-wasreport-generator","owner":"cisagov","isFork":false,"description":"Generates CISA Web Application Scanning reports from Qualys scanning data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-06T20:54:44.738Z"}},{"type":"Public","name":"davidh_4-repo","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-05T19:37:21.559Z"}},{"type":"Public","name":"gophish-tools","owner":"cisagov","isFork":false,"description":"Helpful tools for interacting with a GoPhish phishing instance","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":5,"starsCount":40,"forksCount":6,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-29T14:53:39.131Z"}},{"type":"Public","name":"cyhy-feeds","owner":"cisagov","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":4,"starsCount":1,"forksCount":2,"license":"Creative Commons Zero v1.0 Universal","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,6,1,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-14T16:25:09.663Z"}}],"repositoryCount":85,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}