{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"HCSystem","owner":"Hacker-Combat-Organization","isFork":false,"description":"Hacker Combat is an experimental game environment enabling head-to-head competition using Cyber Security, and Computer Science","topicNames":["cybersecurity","penetration-testing","ctf","combat","hacker","cyber-security","cyberwar","hackercombat","hacker-combat"],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":2,"issueCount":0,"starsCount":6,"forksCount":0,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-03T07:25:06.441Z"}},{"type":"Public","name":"HCReferee","owner":"Hacker-Combat-Organization","isFork":false,"description":"Referee Tools for running HC-based competitions","topicNames":["cybersecurity","penetration-testing","ctf","cyber-security","cyberwar","hackercombat","hacker-combat"],"topicsNotShown":0,"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":2,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-06T18:17:55.515Z"}},{"type":"Public","name":"HCPaper","owner":"Hacker-Combat-Organization","isFork":false,"description":"The published paper proposing Hacker Combat. ","topicNames":["cybersecurity","penetration-testing","ctf","combat","hacker","cyber-security","cyberwar","hackercombat","hacker-combat"],"topicsNotShown":0,"primaryLanguage":{"name":"TeX","color":"#3D6117"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-30T02:22:45.853Z"}},{"type":"Public","name":"HCLegacyExperiments","owner":"Hacker-Combat-Organization","isFork":false,"description":"All Legacy prototypes for HC","topicNames":["penetration-testing","ctf","combat","hacker","cyberwar","cybers","hackercombat","hacker-combat","cyber-se"],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-30T02:20:05.616Z"}},{"type":"Public","name":"HCAI","owner":"Hacker-Combat-Organization","isFork":false,"description":"Experiments for developing competent training agents for HC","topicNames":["cybersecurity","ctf","combat","hacker","cyber-security","cyberwar","hackercombat","hacker-combat"],"topicsNotShown":0,"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-29T23:46:16.179Z"}}],"repositoryCount":5,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}