{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"SupplyChainAttacks","owner":"binarly-io","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":257,"forksCount":34,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-20T01:22:09.621Z"}},{"type":"Public","name":"Vulnerability-REsearch","owner":"binarly-io","isFork":false,"description":"Binarly Vulnerability Research Advisories","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":162,"forksCount":21,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-19T20:31:19.567Z"}},{"type":"Public","name":"efiXplorer","owner":"binarly-io","isFork":false,"description":"IDA plugin for UEFI firmware analysis and reverse engineering automation","allTopics":["firmware","reverse-engineering","uefi","ida-pro","ida-plugin","efi-protocols","efi-guid","uefi-firmware-analysis"],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":1,"issueCount":1,"starsCount":871,"forksCount":104,"license":"GNU General Public License v3.0","participation":[10,0,0,0,0,0,0,0,0,0,0,0,7,0,0,0,0,0,0,0,6,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,3,0,0,0,0,0,0,0,0,1,0,1,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-12T06:51:39.377Z"}},{"type":"Public","name":"fwhunt-scan","owner":"binarly-io","isFork":false,"description":"Tools for analyzing UEFI firmware and checking UEFI modules with FwHunt rules","allTopics":["reverse-engineering","uefi","radare2","uefi-firmware","efi-protocols","efi-guid","uefi-firmware-analysis"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":211,"forksCount":30,"license":"GNU General Public License v3.0","participation":[0,0,0,0,3,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,1,0,0,0,14,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-27T17:51:42.685Z"}},{"type":"Public","name":"guiddb","owner":"binarly-io","isFork":false,"description":"GUIDs used in various projects to analyze UEFI firmware","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":7,"forksCount":1,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-13T12:52:22.912Z"}},{"type":"Public","name":"binary-risk-intelligence","owner":"binarly-io","isFork":false,"description":"Binary Risk Intelligence","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":144,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-19T23:43:13.401Z"}},{"type":"Public","name":"logo","owner":"binarly-io","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-12T17:35:25.455Z"}},{"type":"Public","name":"FwHunt","owner":"binarly-io","isFork":false,"description":"The Binarly Firmware Hunt (FwHunt) rule format was designed to scan for known vulnerabilities in UEFI firmware.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":224,"forksCount":26,"license":"Creative Commons Zero v1.0 Universal","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-12T18:13:50.398Z"}},{"type":"Public","name":"ToolsAndPoCs","owner":"binarly-io","isFork":false,"description":"BINARLY Research Tools and PoCs","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-01T17:27:40.678Z"}},{"type":"Public","name":"fwhunt-ida","owner":"binarly-io","isFork":false,"description":"Helper tool for generating FwHunt compliant rules in IDA","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":7,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-28T09:48:58.227Z"}},{"type":"Public","name":"Research_Publications","owner":"binarly-io","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":98,"forksCount":16,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-18T17:48:09.743Z"}},{"type":"Public","name":"idapcode","owner":"binarly-io","isFork":false,"description":"IDA plugin displaying the P-Code for the current function","allTopics":["reverse-engineering","ida-plugin","idapython","p-code","ghidra"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":62,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-27T20:19:16.862Z"}},{"type":"Public","name":"FirmwareBleed","owner":"binarly-io","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-18T22:41:38.417Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"binarly-io repositories"}