{"payload":{"pageCount":1,"repositories":[{"type":"Public archive","name":"multidimensional-attack-path-demo","owner":"EdgewiseNetworks","isFork":false,"description":"Demo code for the talk \"Multidimensional Attack Path Analysis: Eliminating Network Blind Spots\"","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":1,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-11T17:27:15.003Z"}},{"type":"Public archive","name":"enforce-naming-conventions","owner":"EdgewiseNetworks","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-06T09:53:39.294Z"}},{"type":"Public archive","name":"jfrog-pipelines-simple-example","owner":"EdgewiseNetworks","isFork":true,"description":"Getting started with JFrog Pipelines","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":519,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-09T02:28:25.820Z"}},{"type":"Public archive","name":"api-examples","owner":"EdgewiseNetworks","isFork":false,"description":"Edgewise API examples","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":2,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-28T18:31:02.643Z"}},{"type":"Public archive","name":"mbknor-jackson-jsonSchema","owner":"EdgewiseNetworks","isFork":true,"description":"Generate JSON Schema with Polymorphism using Jackson annotations","allTopics":[],"primaryLanguage":{"name":"Scala","color":"#c22d40"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":73,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-08-16T22:19:16.376Z"}},{"type":"Public archive","name":"Obfuscate","owner":"EdgewiseNetworks","isFork":true,"description":"Guaranteed compile-time string literal obfuscation header-only library for C++14","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":166,"license":"The Unlicense","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-25T20:22:12.751Z"}},{"type":"Public archive","name":"logzio-log4j2-appender","owner":"EdgewiseNetworks","isFork":true,"description":"Log4j2 Appender that ships logs using HTTPs bulk","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":11,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-08T21:11:08.536Z"}},{"type":"Public archive","name":"luabind-deboostified","owner":"EdgewiseNetworks","isFork":true,"description":"Create Lua bindings for your C++ code easily - my improvements","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":235,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-08T21:08:08.179Z"}},{"type":"Public archive","name":"Orestes-Bloomfilter","owner":"EdgewiseNetworks","isFork":true,"description":"Library of different Bloom filters in Java with optional Redis-backing, counting and many hashing options.","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":245,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-08T21:03:40.307Z"}},{"type":"Public archive","name":"tlsh","owner":"EdgewiseNetworks","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":134,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-08T21:02:43.229Z"}},{"type":"Public archive","name":"cmdb-examples","owner":"EdgewiseNetworks","isFork":false,"description":"Edgewise CMDB examples","allTopics":[],"primaryLanguage":{"name":"Puppet","color":"#302B6D"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-04T13:50:11.613Z"}},{"type":"Public archive","name":"statistical-analysis-network-exposure","owner":"EdgewiseNetworks","isFork":false,"description":"Material from the talk \"Statistical Analysis of Network Exposure\"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-05-21T15:36:08.702Z"}},{"type":"Public archive","name":"five-sigma","owner":"EdgewiseNetworks","isFork":false,"description":"Demo code for the Five Sigma talk","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-30T18:59:39.968Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"EdgewiseNetworks repositories"}