{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Binary-Exploitation","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Binary Exploitation","allTopics":[],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-04-21T04:52:40.307Z"}},{"type":"Public","name":"Forensics","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Forensics","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-03T12:34:14.515Z"}},{"type":"Public","name":"CTF-WriteUps","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"A bunch of CTF write-ups from members with love <3","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-05T08:41:24.703Z"}},{"type":"Public","name":"Malware-Analysis-Training","owner":"KMA-Cyber-Security-Club","isFork":true,"description":"Retired beginner/intermediate malware analysis training materials from @pedramamini and @erocarrera.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":168,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-25T19:03:11.041Z"}},{"type":"Public","name":"Reversing","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Reversing","allTopics":[],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-14T20:30:51.897Z"}},{"type":"Public","name":"Newbies-Research","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Newbies Research","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-12-29T13:46:32.186Z"}},{"type":"Public","name":"Web-Exploitation","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Web Exploitation","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-08T17:57:52.648Z"}},{"type":"Public","name":"Cryptography","owner":"KMA-Cyber-Security-Club","isFork":false,"description":"Cryptography","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-08T15:14:41.743Z"}}],"repositoryCount":8,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"KMA-Cyber-Security-Club repositories"}