{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"install-aws-cli-action","owner":"BishopFox","isFork":true,"description":"Install AWS CLI on a GitHub Actions Linux host","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":31,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-26T20:41:06.955Z"}},{"type":"Public","name":"minisign-action","owner":"BishopFox","isFork":true,"description":"Github action to sign and verify minisign/signify signatures","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-07-26T20:39:33.404Z"}},{"type":"Public","name":"badPods","owner":"BishopFox","isFork":false,"description":"A collection of manifests that will create pods with elevated privileges.","topicNames":["kubernetes","security","assessment","penetration-testing","exploitation","podspec","pods","privileged","hostpath","hostpid"],"topicsNotShown":2,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":549,"forksCount":98,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-02T20:34:52.386Z"}},{"type":"Public","name":"docker-selenium","owner":"BishopFox","isFork":true,"description":"Docker images for the Selenium Grid Server","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":2487,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-18T11:21:39.943Z"}},{"type":"Public","name":"ca-clone","owner":"BishopFox","isFork":false,"description":"Scripts to clone CA certificates for use in HTTPS client attacks.","topicNames":["reverse-engineering","mitm","pentesting","security-tools"],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":32,"forksCount":22,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-26T19:55:52.614Z"}},{"type":"Public","name":"pwn-pulse","owner":"BishopFox","isFork":false,"description":"Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)","topicNames":["exploit","penetration-testing","infosec","pentesting","cve","red-team","pentest-scripts","security-tools"],"topicsNotShown":0,"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":1,"starsCount":136,"forksCount":60,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-15T17:01:50.621Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}