{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"napalm","owner":"ik-network-analyzers","isFork":true,"description":"Network Automation and Programmability Abstraction Layer with Multivendor support","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":546,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-07-17T03:45:09.963Z"}},{"type":"Public","name":"Pentesting-Toolkit","owner":"ik-network-analyzers","isFork":true,"description":"Tools for pentesting, CTFs & wargames.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":401,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-12-21T03:47:55.212Z"}},{"type":"Public","name":"exploit-workshop","owner":"ik-network-analyzers","isFork":true,"description":"A step by step workshop to exploit various vulnerabilities in Node.js and Java applications","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":95,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-03-24T23:09:15.943Z"}},{"type":"Public","name":"EyeWitness","owner":"ik-network-analyzers","isFork":true,"description":"EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":823,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-06T11:52:26.275Z"}},{"type":"Public","name":"Awesome-Red-Teaming","owner":"ik-network-analyzers","isFork":true,"description":"List of Awesome Red Teaming Resources","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1639,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-02T03:31:54.172Z"}},{"type":"Public","name":"wireshark","owner":"ik-network-analyzers","isFork":true,"description":"Read-only mirror of Wireshark's Git repository. GitHub won't let us disable pull requests. ☞ THEY WILL BE IGNORED HERE ☜ Please upload them at https://code.wireshark.org/review/ .","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1805,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-12-14T04:59:40.317Z"}},{"type":"Public","name":"metasploit-framework","owner":"ik-network-analyzers","isFork":true,"description":"Metasploit Framework","allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":13742,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-12-14T04:28:15.107Z"}},{"type":"Public","name":"wifi-hack-pixie-dust-attack","owner":"ik-network-analyzers","isFork":true,"description":"Dockerized example of Pixie Dust attack on Wireless Access Point.","allTopics":[],"primaryLanguage":{"name":"Dockerfile","color":"#384d54"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-21T05:36:51.899Z"}},{"type":"Public","name":"Red-Teaming-Toolkit","owner":"ik-network-analyzers","isFork":true,"description":"A collection of open source and commercial tools that aid in red team operations. ","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2148,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-15T11:55:21.287Z"}},{"type":"Public","name":"AggressorAssessor","owner":"ik-network-analyzers","isFork":true,"description":"Aggressor scripts for phases of a pen test or red team assessment","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":49,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-31T16:20:12.864Z"}},{"type":"Public","name":"sparta","owner":"ik-network-analyzers","isFork":true,"description":"Network Infrastructure Penetration Testing Tool","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":446,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-08T19:33:40.828Z"}},{"type":"Public","name":"pentest-lab","owner":"ik-network-analyzers","isFork":true,"description":"Pentest Lab on OpenStack with Heat, Chef provisioning and Docker","allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":88,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-02T23:07:39.726Z"}},{"type":"Public","name":"Veil-Evasion","owner":"ik-network-analyzers","isFork":true,"description":"Veil Evasion is no longer supported, use Veil 3.0!","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":690,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-04-20T12:21:44.866Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}