{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"PassiveAggression","owner":"huntandhackett","isFork":false,"description":"Source code and examples for PassiveAggression","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":33,"forksCount":8,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,10,1,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-06T08:05:04.298Z"}},{"type":"Public","name":"ir-automation","owner":"huntandhackett","isFork":false,"description":"Incident Response automation scripts","allTopics":[],"primaryLanguage":{"name":"HCL","color":"#844FBA"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-29T13:24:52.559Z"}},{"type":"Public","name":"process-cloning","owner":"huntandhackett","isFork":false,"description":"The Definitive Guide To Process Cloning on Windows","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":1,"issueCount":0,"starsCount":346,"forksCount":31,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-03T15:23:24.984Z"}},{"type":"Public","name":"Antignis","owner":"huntandhackett","isFork":false,"description":"Source code and examples for Antignis","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":36,"forksCount":2,"license":"Apache License 2.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-10-21T09:21:18.253Z"}},{"type":"Public","name":"sysmon-indepth","owner":"huntandhackett","isFork":false,"description":"Understanding the operation and limitations of Sysmon's events","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":3,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-15T12:14:08.193Z"}},{"type":"Public","name":"concealed_code_execution","owner":"huntandhackett","isFork":false,"description":"Tools and technical write-ups describing attacking techniques that rely on concealing code execution on Windows","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":194,"forksCount":27,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-12T11:53:13.214Z"}},{"type":"Public","name":"red-mudnester","owner":"huntandhackett","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-08-08T06:49:47.229Z"}},{"type":"Public","name":"accesstokens_are_fun","owner":"huntandhackett","isFork":false,"description":"Repository containing examples to play with access tokens and JWTs","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-13T11:31:54.351Z"}}],"repositoryCount":8,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}