{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Social-Engineering-Labs","owner":"Red-Labs-Cloud","isFork":false,"description":"Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.Test & strengthen defenses against social attacks. Simulate phishing, vishing & more in a safe, ethical LAB.","allTopics":["red-team","social-engineering-attacks","social-engineering","red-team-engagement","red-teaming","red-teams","social-engeneering-toolkit","social-engineering-techniques","social-engineering-toolkit","social-engineering-scam-phishing-page"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-15T11:25:21.394Z"}},{"type":"Public","name":"Threat-Intelligence-Lab","owner":"Red-Labs-Cloud","isFork":false,"description":"The Threat-Intelligence-Lab is a comprehensive platform that empowers organizations to proactively identify, analyze, and combat cyber threats. We provide real-time threat intelligence, advanced threat analysis tools, and expert guidance to help you stay ahead of the curve and protect your valuable data.","allTopics":["threat","threat-hunting","threatintel","threat-modeling","threat-analysis","threat-intelligence","threat-detection"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-10T22:26:44.103Z"}},{"type":"Public","name":"Telecom-5G-LAB","owner":"Red-Labs-Cloud","isFork":false,"description":"Validate & optimize your 5G apps & devices in a controlled, real-world emulation environment.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-09T19:07:50.954Z"}},{"type":"Public","name":".github","owner":"Red-Labs-Cloud","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-09T12:52:03.990Z"}},{"type":"Public","name":"RedLabs_Dashboard","owner":"Red-Labs-Cloud","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-08T13:21:53.428Z"}},{"type":"Public","name":"RedLabs_CLI","owner":"Red-Labs-Cloud","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-08T13:07:47.413Z"}},{"type":"Public","name":"C2_Infrastructure","owner":"Red-Labs-Cloud","isFork":false,"description":"Unveiling the secret weapon of cyber attackers. This series explores Command & Control, the nerve center of online threats. Learn how attackers control your systems & how to defend your organization.","allTopics":["red","c2","redteam"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-08T13:06:07.691Z"}},{"type":"Public","name":"Browser-Exploitation","owner":"Red-Labs-Cloud","isFork":false,"description":"Delve into the world of Browser Exploitation! This series explores how attackers target your browser, exposes vulnerabilities, and unveils methods to fortify your defenses. Learn to identify exploits, implement security measures, and stay a step ahead of cyber threats.","allTopics":["b33f"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-26T20:35:59.356Z"}},{"type":"Public","name":"Network-Security-LAB","owner":"Red-Labs-Cloud","isFork":false,"description":"Build & test your cyber defenses in a safe, simulated network. Train security teams & harden your systems.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-26T20:31:38.813Z"}},{"type":"Public","name":"Telecom-2G-LAB","owner":"Red-Labs-Cloud","isFork":false,"description":"Private Mobile Network - 2G / 4G / 5G","allTopics":["gateway","osmohlr","osmomsc","osmobts","osmobsc"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-09T17:01:32.537Z"}}],"repositoryCount":10,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}