{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"aspisec","owner":"Acceis","isFork":false,"description":"Vacuuming out the remnants of offensive tools. AspiSec is responsible for removing the traces and confidential information left by offensive security tools on an auditor's computer in various cache and log files.","allTopics":["hacking","infosec","cleaner"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T21:23:45.597Z"}},{"type":"Public","name":"hivexcavator","owner":"Acceis","isFork":false,"description":"Extracting the contents of Microsoft Windows Registry (hive) and display it as a colorful tree but mainly focused on parsing BCD files to extract WIM files path for PXE attacks.","allTopics":["windows","registry","hive","bcd","pxe","wim"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-04T21:23:29.289Z"}},{"type":"Public","name":"unisec","owner":"Acceis","isFork":false,"description":"Unicode Security Toolkit","allTopics":["security","unicode","homoglyphs","icu","utf-8","cldr","utf-16","utf-32","surrogates","unicode-tools","confusables"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":1,"starsCount":23,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T21:20:52.189Z"}},{"type":"Public","name":"bqm","owner":"Acceis","isFork":false,"description":"Deduplicate custom BloudHound queries from different datasets and merge them in one customqueries.json file.","allTopics":["bloodhound","bloodhound-json-files","bloodhoundad-cypher-queries","bloodhound-queries"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":35,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-23T19:28:05.419Z"}},{"type":"Public","name":"exploit-CVE-2023-23752","owner":"Acceis","isFork":false,"description":"Joomla! < 4.2.8 - Unauthenticated information disclosure","allTopics":["exploit","joomla","vulnerability","cve","information-disclosure","cve-2023-23752"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":76,"forksCount":16,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-27T11:30:46.898Z"}},{"type":"Public","name":"vulnerable-code-snippets","owner":"Acceis","isFork":false,"description":"Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.","allTopics":["infosec","pentesting","codereview","appsec","codesnippet","avcs","vulnerablecode","brokencode","securityexplained"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":22,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-04T08:46:22.707Z"}},{"type":"Public","name":"prez-graphql","owner":"Acceis","isFork":false,"description":"GraphQL for Pentesters presentation","allTopics":["graphql","presentation","pentesting","pentest","presentation-slides"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-12T14:35:46.873Z"}},{"type":"Public","name":"exploit-CVE-2022-24780","owner":"Acceis","isFork":false,"description":"iTop < 2.7.6 - (Authenticated) Remote command execution","allTopics":["exploit","rce","cve","ssti","cve-2022-24780"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-02T07:48:18.464Z"}},{"type":"Public","name":"exploit-CVE-2022-0482","owner":"Acceis","isFork":false,"description":"Easy!Appointments < 1.4.3 - Unauthenticated PII (events) disclosure","allTopics":["exploit","cve","disclosure","pii","cve-2022-0482"],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-27T08:20:23.645Z"}}],"repositoryCount":9,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}