{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Badges","owner":"EntySec","isFork":false,"description":"Badges is a Python3 library that is used for advanced and intuitive printing.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-24T21:02:53.857Z"}},{"type":"Public","name":"HatSploit","owner":"EntySec","isFork":false,"description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","topicNames":["android","python","windows","security","remote-control","exploit","exploits","infosec","post-exploitation","exploitation"],"topicsNotShown":9,"allTopics":["android","python","windows","security","remote-control","exploit","exploits","infosec","post-exploitation","exploitation","exploitation-framework","payload","hacking-tool","privilege-escalation","exploit-database","windows-hacking","exploit-development","remote-access-tool","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":262,"forksCount":62,"license":"MIT License","participation":[0,1,0,2,18,0,1,0,7,2,10,0,0,11,0,0,2,1,3,0,3,4,11,5,1,0,0,0,0,2,2,0,5,0,0,1,0,1,0,0,2,0,0,0,1,3,0,0,3,3,0,5],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-19T01:02:21.337Z"}},{"type":"Public","name":"ColorScript","owner":"EntySec","isFork":false,"description":"ColorScript is a scripting language for designing custom ASCII banners.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":1,"license":"MIT License","participation":[0,0,0,0,5,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,0,1,1,0,0,0,0,0,0,0,0,0,6,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-18T23:03:38.632Z"}},{"type":"Public","name":"Pex","owner":"EntySec","isFork":false,"description":"Python Exploitation is a collection of special tools for providing high quality penetration testing using pure python programming language.","topicNames":["python","toolkit","penetration-testing","shellcode","payload","windows-hacking","python-module","android-hacking","linux-hacking"],"topicsNotShown":0,"allTopics":["python","toolkit","penetration-testing","shellcode","payload","windows-hacking","python-module","android-hacking","linux-hacking"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":37,"forksCount":6,"license":"MIT License","participation":[0,2,0,0,5,1,3,0,0,0,14,0,0,10,0,0,1,0,13,2,0,8,12,3,1,3,0,0,0,1,11,1,3,0,0,1,0,0,1,0,1,0,1,6,0,1,0,0,1,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-03T21:19:38.354Z"}},{"type":"Public","name":"EntySec-Website","owner":"EntySec","isFork":false,"description":"EntySec is a group of security professionals and software engineers involved in the development of security tools and services.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,4,0,0,0,0,0,0,0,0,1,0,0,0,0,3,1,5,0,0,9,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-25T15:46:27.350Z"}},{"type":"Public","name":"Ghost","owner":"EntySec","isFork":false,"description":"Ghost Framework is an Android post-exploitation framework that exploits the Android Debug Bridge to remotely access an Android device.","topicNames":["hack","backdoor","adb","exploit","hacking","android-device","rat","remote-shell","post-exploitation","android-debug-bridge"],"topicsNotShown":10,"allTopics":["hack","backdoor","adb","exploit","hacking","android-device","rat","remote-shell","post-exploitation","android-debug-bridge","kali-linux","exploitation-framework","remote-access","android-rat","hacking-tools","android-hacking","android-hack","android-exploit","entysec","android"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":2562,"forksCount":905,"license":"MIT License","participation":[0,0,0,18,2,2,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,5,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-24T17:26:36.816Z"}},{"type":"Public","name":"SeaShell","owner":"EntySec","isFork":false,"description":"SeaShell Framework is an iOS post-exploitation framework that enables you to access the device remotely, control it and extract sensitive information.","topicNames":["ios","reverse-shell","exploit","jailbreak","post-exploitation","exploitation","remote-admin-tool","remote-access-tool","ipados","ios-exploit"],"topicsNotShown":5,"allTopics":["ios","reverse-shell","exploit","jailbreak","post-exploitation","exploitation","remote-admin-tool","remote-access-tool","ipados","ios-exploit","ios-hacking","post-exploitation-toolkit","trollstore","ios-exploitation","ios-malware"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":6,"starsCount":316,"forksCount":39,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,14,39,28,8,7,0,2,0,0,7,0,2,1,0,0,0,0,5,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T13:39:46.392Z"}},{"type":"Public","name":"libpawn","owner":"EntySec","isFork":false,"description":"C library that is intended for providing methods for executing and injecting code.","topicNames":["loader","injector","dll-injection","rop","pe-loader","reflective-injection","elf-loader","c-programming","elf-parser","reflective-pe-loaders"],"topicsNotShown":3,"allTopics":["loader","injector","dll-injection","rop","pe-loader","reflective-injection","elf-loader","c-programming","elf-parser","reflective-pe-loaders","macho-parser","elf-format","macho-loader"],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":12,"forksCount":3,"license":"MIT License","participation":[0,0,0,0,53,8,11,1,5,0,0,0,0,0,0,0,0,2,5,1,23,0,2,0,0,0,0,0,0,1,0,0,3,0,0,0,0,0,0,0,0,0,2,1,1,0,5,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-13T13:58:48.195Z"}},{"type":"Public","name":"HatSploit-Docs","owner":"EntySec","isFork":false,"description":"HatSploit Documentation","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":"MIT License","participation":[0,0,0,0,0,0,0,6,0,0,8,0,0,1,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-19T22:56:36.597Z"}},{"type":"Public","name":"Pwny","owner":"EntySec","isFork":false,"description":"Pwny is an implementation of an advanced payload written in pure C and designed for portability and extensibility.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":36,"forksCount":5,"license":"MIT License","participation":[0,0,0,3,11,12,9,8,2,6,12,0,0,5,0,0,1,2,10,9,11,0,8,7,0,0,0,0,0,3,30,3,9,0,0,1,1,0,7,4,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-26T22:29:07.886Z"}},{"type":"Public","name":".github","owner":"EntySec","isFork":false,"description":"EntySec is a group of security professionals and software engineers involved in the development of security tools and services.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-16T17:59:16.326Z"}},{"type":"Public","name":"EntySec-Blog","owner":"EntySec","isFork":true,"description":"Latest EntySec security researches, news and tutorials.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":15693,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-10T22:43:36.015Z"}},{"type":"Public","name":"CamOver","owner":"EntySec","isFork":false,"description":" CamOver is a camera exploitation tool that allows to disclosure network camera admin password.","topicNames":["iot","camera","exploit","camera-control","iot-hacking","camera-hacking","entysec","webcam-hacking","camera-exploitation"],"topicsNotShown":0,"allTopics":["iot","camera","exploit","camera-control","iot-hacking","camera-hacking","entysec","webcam-hacking","camera-exploitation"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":412,"forksCount":89,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:54:01.985Z"}},{"type":"Public","name":"CamRaptor","owner":"EntySec","isFork":false,"description":"CamRaptor is a tool that exploits several vulnerabilities in popular DVR cameras to obtain network camera credentials.","topicNames":["iot","camera","exploit","payload","kalilinux","camera-hacking","entysec"],"topicsNotShown":0,"allTopics":["iot","camera","exploit","payload","kalilinux","camera-hacking","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":203,"forksCount":32,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:53:25.669Z"}},{"type":"Public","name":"HatAsm","owner":"EntySec","isFork":false,"description":"HatAsm is a powerful assembler and disassembler that provides support for all common architectures.","topicNames":["arm","compiler","mips","intel","shellcode","payload","assembly-x86","assembler-x86","assembly-x86-64","assembly-mips"],"topicsNotShown":6,"allTopics":["arm","compiler","mips","intel","shellcode","payload","assembly-x86","assembler-x86","assembly-x86-64","assembly-mips","assembly-arm","assembler-implementation","assembly","x86-64","assembler","x86"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":13,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:51:35.707Z"}},{"type":"Public","name":"HatVenom","owner":"EntySec","isFork":false,"description":"HatVenom is a powerful payload generation tool that provides support for all common platforms and architectures.","topicNames":["exploit","binary","malware","executable","exploits","shellcode","elf","binary-exploitation","macho","pe"],"topicsNotShown":7,"allTopics":["exploit","binary","malware","executable","exploits","shellcode","elf","binary-exploitation","macho","pe","payload","payloads","exe","architectures","shellcodes","shellcode-injection","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":128,"forksCount":29,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:50:30.649Z"}},{"type":"Public","name":"Pawn","owner":"EntySec","isFork":false,"description":"Pawn is a collection of Python techniques used for crafting, manipulating and injecting payloads.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:49:25.506Z"}},{"type":"Public","name":"Shreder","owner":"EntySec","isFork":false,"description":"Shreder is a powerful multi-threaded SSH protocol password brute-force tool.","topicNames":["ssh","hacking","bruteforce","brute-force-attacks","kalilinux","bruteforce-attacks","ssh-bruteforce","ssh-hacking","entysec"],"topicsNotShown":0,"allTopics":["ssh","hacking","bruteforce","brute-force-attacks","kalilinux","bruteforce-attacks","ssh-bruteforce","ssh-hacking","entysec"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":191,"forksCount":38,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:48:47.357Z"}},{"type":"Public","name":"RomBuster","owner":"EntySec","isFork":false,"description":"RomBuster is a router exploitation tool that allows to disclosure network router admin password.","topicNames":["iot","router","hack","exploit","information-extraction","exploits","passwords","payload","payloads","password-cracker"],"topicsNotShown":7,"allTopics":["iot","router","hack","exploit","information-extraction","exploits","passwords","payload","payloads","password-cracker","information-gathering","kalilinux","router-hacking","credentials-gathering","iot-hacking","entysec","hacking"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":438,"forksCount":71,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-08T22:47:20.730Z"}},{"type":"Public","name":"eterpay","owner":"EntySec","isFork":false,"description":"Crypto payment system that we deserve. Can be used for marketplaces and etc.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-27T02:06:17.131Z"}},{"type":"Public","name":"EntySec-Docs","owner":"EntySec","isFork":false,"description":"EntySec Documentation","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-30T00:52:18.924Z"}},{"type":"Public","name":"Checkmate","owner":"EntySec","isFork":false,"description":"Powerful advanced web platform for C2 managing and automated penetration testing.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-30T20:06:22.609Z"}},{"type":"Public","name":"HatSploit-Website","owner":"EntySec","isFork":false,"description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","topicNames":[],"topicsNotShown":0,"allTopics":[],"primaryLanguage":{"name":"CSS","color":"#563d7c"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-21T16:38:00.219Z"}}],"repositoryCount":23,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}