{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"netscan2","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"active / passive network scanner","allTopics":["cybersecurity","python2","passive-vulnerability-scanner"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":33,"forksCount":15,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-08T02:20:57.417Z"}},{"type":"Public","name":"archeyjs","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"js version of archey","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-21T22:52:31.774Z"}},{"type":"Public","name":"devicon","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"Set of icons representing programming languages, designing & development tools","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2267,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-30T06:32:34.862Z"}},{"type":"Public","name":"network","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":126,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-01T04:28:08.404Z"}},{"type":"Public","name":"Black-Hat-Python","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"black hat python","allTopics":["cybersecurity","python2","black-hat"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":131,"forksCount":79,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-03-25T01:01:36.499Z"}},{"type":"Public","name":"mischief","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"🃏 Yet another python interface into haveibeenpwned.com","allTopics":["python3","hibp","haveibeenpwned"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-01-25T01:02:40.849Z"}},{"type":"Public","name":"python-ctypes","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-07-08T00:41:57.908Z"}},{"type":"Public","name":"evil.sh","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"🙊 Subtle and not-so-subtle shell tweaks that will slowly drive people insane.","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":211,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-29T13:06:04.272Z"}},{"type":"Public","name":"protobuf-test","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"Test of using protobuf with python and c++","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-03-10T17:18:44.726Z"}},{"type":"Public","name":"node-repo","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-20T19:43:33.327Z"}},{"type":"Public","name":"c-python","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-17T22:36:40.093Z"}},{"type":"Public","name":"FTL","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"The Pi-hole FTL engine","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":187,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-06-05T15:29:53.709Z"}},{"type":"Public","name":"sockets","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"Simple socket examples in Python and C","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":9,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-05-20T03:03:51.564Z"}},{"type":"Public","name":"python-extensions","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"Python extensions","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-02T21:41:06.738Z"}},{"type":"Public","name":"pcc","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"Resources for Python Crash Course, from No Starch Press.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1840,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-01-04T06:43:31.763Z"}},{"type":"Public","name":"krackattacks","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":170,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-16T14:32:32.758Z"}},{"type":"Public","name":"MS17-010","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"MS17-010","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1104,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-14T14:16:43.283Z"}},{"type":"Public","name":"CIA-Hacking-Tools","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"WikiLeaks Vault 7 CIA Hacking Tools ","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":106,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-09T03:40:23.159Z"}},{"type":"Public","name":"nodescan","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"scans network for hosts and open ports","allTopics":["nodejs","javascript","webserver","nmap","arp-scan"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":31,"forksCount":8,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-08-07T17:27:53.157Z"}},{"type":"Public","name":"Mirai-Source-Code","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"Leaked Mirai Source Code for Research/IoC Development Purposes","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3426,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-01-07T00:21:38.209Z"}},{"type":"Public","name":"mirai-honeypot","owner":"AllGloryToTheHypnotoad","isFork":true,"description":"A fake IoT toaster that mimics a login procedure on port 23 with the hopes of recording hacking attempts.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":9,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-10-30T13:19:54.509Z"}},{"type":"Public","name":"netscan","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"scans/tracks what hosts are on your local network using nmap","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-08-22T21:54:21.634Z"}},{"type":"Public","name":"violent_python","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"Example programs from Violent Python book","allTopics":["cybersecurity","python2"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2015-05-26T20:14:51.886Z"}},{"type":"Public","name":"nmap_scan","owner":"AllGloryToTheHypnotoad","isFork":false,"description":"LAN monitoring program","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2014-12-02T04:58:30.405Z"}}],"repositoryCount":24,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}