{"payload":{"pageCount":4,"repositories":[{"type":"Public archive","name":"TALOS","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Computer Network Defender's Toolkit, specializing in active defense techniques.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":12,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T11:09:06.447Z"}},{"type":"Public","name":"VxCommunity","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"This repository contains free Payload Security contributions to the IT-Security community","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":12,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T11:04:20.826Z"}},{"type":"Public","name":"nzyme","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Nzyme collects 802.11 management frames directly from the air and sends them to a Graylog (Open Source log management) setup for WiFi IDS, monitoring, and incident response. It only needs a JVM and a WiFi adapter that supports monitor mode.","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":146,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:57:38.674Z"}},{"type":"Public","name":"scapy","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Scapy: the python-based interactive packet manipulation program & library","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1986,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:55:12.971Z"}},{"type":"Public","name":"mutiny-fuzzer","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":101,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:47:52.528Z"}},{"type":"Public","name":"moloch","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Moloch is an open source, large scale, full packet capturing, indexing, and database system.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1033,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:41:38.319Z"}},{"type":"Public","name":"cuckoo","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Cuckoo Sandbox is an automated dynamic malware analysis system","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1693,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:18:09.393Z"}},{"type":"Public","name":"pafish","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Pafish is a demonstration tool that employs several techniques to detect sandboxes and analysis environments in the same way as malware families do.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":454,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:08:33.220Z"}},{"type":"Public","name":"anticuckoo","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"A tool to detect and crash Cuckoo Sandbox ","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":67,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T10:01:38.760Z"}},{"type":"Public","name":"glastopf","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Web Application Honeypot","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":173,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T09:59:25.541Z"}},{"type":"Public","name":"PowerOPS","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"PowerShell Runspace Portable Post Exploitation Tool aimed at making Penetration Testing with PowerShell \"easier\"","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":125,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:19:19.608Z"}},{"type":"Public","name":"MozDef","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"MozDef: The Mozilla Defense Platform","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":329,"license":"Mozilla Public License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:19:08.496Z"}},{"type":"Public","name":"mylg","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Network Diagnostic Tool","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":230,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:17:48.465Z"}},{"type":"Public","name":"multiav","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"MultiAV scanner with Python and JSON API. Disclaimer: I don't maintain it any more.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":124,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:16:35.120Z"}},{"type":"Public","name":"malware","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Malware source code samples leaked online uploaded to GitHub for those who want to analyze the code.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":763,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:16:12.160Z"}},{"type":"Public","name":"routersploit","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"The Router Exploitation Framework","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2309,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:14:08.920Z"}},{"type":"Public","name":"SCUTUM","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Linux ARP (TCP / UDP / ICMP) Firewall Automatic Controller","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":23,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:13:18.456Z"}},{"type":"Public","name":"airgeddon","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"This is a multi-use bash script for Linux systems to audit wireless networks.","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1139,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:08:55.414Z"}},{"type":"Public","name":"PacketWhisper","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":118,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:08:05.376Z"}},{"type":"Public","name":"netcap","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"A framework for secure and scalable network traffic analysis","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":158,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:07:43.423Z"}},{"type":"Public","name":"trape","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"People tracker on the Internet: OSINT analysis and research tool by Jose Pino","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1282,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:07:09.585Z"}},{"type":"Public","name":"singularity","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"A DNS rebinding attack framework.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":137,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:06:36.530Z"}},{"type":"Public","name":"awesome-hacking","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Awesome hacking is an awesome collection of hacking tools.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":544,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:06:20.049Z"}},{"type":"Public","name":"archerysec","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Open Source Vulnerability Assessment and Management helps developers and pentesters to perform scans and manage vulnerabilities. ","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":499,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:05:31.079Z"}},{"type":"Public","name":"rekall","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Rekall Memory Forensic Framework","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":399,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:05:19.954Z"}},{"type":"Public","name":"nmap-vulners","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"NSE script based on Vulners.com API","allTopics":[],"primaryLanguage":{"name":"Lua","color":"#000080"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":536,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:04:36.910Z"}},{"type":"Public","name":"O-Saft","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"O-Saft - OWASP SSL advanced forensic tool","allTopics":[],"primaryLanguage":{"name":"Perl","color":"#0298c3"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":97,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:04:18.918Z"}},{"type":"Public","name":"flightsim","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"A utility to generate malicious network traffic and evaluate controls","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":129,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:00:53.451Z"}},{"type":"Public","name":"dnsleaktest","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"DNS Leak Test","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":49,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:00:29.732Z"}},{"type":"Public","name":"streisand","owner":"The-Oinkprotocol-Labs","isFork":true,"description":"Streisand sets up a new server running your choice of WireGuard, OpenConnect, OpenSSH, OpenVPN, Shadowsocks, sslh, Stunnel, or a Tor bridge. It also generates custom instructions for all of these services. At the end of the run you are given an HTML file with instructions that can be shared with friends, family members, and fellow activists.","allTopics":[],"primaryLanguage":{"name":"Jinja","color":"#a52a22"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1993,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-03T12:00:12.702Z"}}],"repositoryCount":100,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}