{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Ironbark","owner":"DSTCyber","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Isabelle","color":"#FEFE00"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-23T06:06:42.124Z"}},{"type":"Public","name":"maat","owner":"DSTCyber","isFork":true,"description":"Open-source symbolic execution framework: https://maat.re","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":44,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-25T14:00:53.770Z"}},{"type":"Public","name":"bee-secure-excercise","owner":"DSTCyber","isFork":false,"description":"A workshop on web security","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-16T22:00:12.394Z"}},{"type":"Public","name":"safe-deobs-evaluation","owner":"DSTCyber","isFork":false,"description":"Artifact for \"Optimizing Away JavaScript Obfuscation\" paper","allTopics":["javascript","malware","deobfuscation"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-30T09:20:32.267Z"}},{"type":"Public","name":"infer-training","owner":"DSTCyber","isFork":false,"description":"Some limited training material on Infer","allTopics":[],"primaryLanguage":{"name":"Dockerfile","color":"#384d54"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-07T01:27:32.983Z"}},{"type":"Public","name":"from-crashes-to-exploits","owner":"DSTCyber","isFork":false,"description":"Introductory presentation on stack-based buffer overflows","allTopics":["security","exploit-exercises","exploit-development"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-06-02T04:14:05.409Z"}},{"type":"Public","name":"safe-deobs","owner":"DSTCyber","isFork":false,"description":"A static deobfuscator for JavaScript Malware","allTopics":["javascript","malware","deobfuscation"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":2,"starsCount":13,"forksCount":0,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-06T09:01:12.244Z"}},{"type":"Public","name":"presentations","owner":"DSTCyber","isFork":false,"description":"An archive of presentations by DST cyber security researchers","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-03-17T00:17:30.160Z"}}],"repositoryCount":8,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"DSTCyber repositories"}