{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"jbxapi","owner":"joesecurity","isFork":false,"description":"Python API wrapper for the Joe Sandbox API.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":62,"forksCount":24,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-17T15:00:25.612Z"}},{"type":"Public","name":"sigma-rules","owner":"joesecurity","isFork":false,"description":"Sigma rules from Joe Security","topicNames":[],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":2,"issueCount":2,"starsCount":188,"forksCount":28,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-01T08:12:51.788Z"}},{"type":"Public","name":"jbxuploadps","owner":"joesecurity","isFork":false,"description":"Powershell script to upload files to Joe Sandbox","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-29T22:24:19.452Z"}},{"type":"Public","name":"Joe-Sandbox-Microsoft-Defender-Connector","owner":"joesecurity","isFork":false,"description":"Script to enrich Microsoft Defender for Endpoint Alerts with Joe Sandbox Analysis","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-24T10:39:32.031Z"}},{"type":"Public","name":"DocBleachShell","owner":"joesecurity","isFork":false,"description":"DocBleachShell is the integration of the great DocBleach, https://github.com/docbleach/DocBleach Content Disarm and Reconstruction tool into the Microsoft Windows Shell Handler.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":1,"starsCount":21,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-15T12:45:34.337Z"}},{"type":"Public","name":"Joe-Sandbox-Splunk-Addon","owner":"joesecurity","isFork":false,"description":"This plugin feeds Joe Sandbox JSON reports automatically into Splunk","topicNames":[],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":5,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-02-25T11:41:56.742Z"}},{"type":"Public","name":"misp-modules","owner":"joesecurity","isFork":true,"description":"Modules for expansion services, import and export in MISP","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":228,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-24T13:52:11.503Z"}},{"type":"Public","name":"sigma","owner":"joesecurity","isFork":true,"description":"Generic Signature Format for SIEM Systems","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2093,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-21T11:52:39.272Z"}},{"type":"Public","name":"AttackDetection","owner":"joesecurity","isFork":true,"description":"Attack Detection","topicNames":[],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":358,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-25T18:56:10.044Z"}},{"type":"Public","name":"PowerSploit","owner":"joesecurity","isFork":true,"description":"PowerSploit - A PowerShell Post-Exploitation Framework","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":4570,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-19T16:30:29.951Z"}},{"type":"Public","name":"carbonblack-connector","owner":"joesecurity","isFork":true,"description":"Carbon Black - JoeSandbox Binary Detonation Connector","topicNames":["carbonblack","joesecurity"],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-08-26T14:36:04.228Z"}},{"type":"Public","name":"DrSemu","owner":"joesecurity","isFork":true,"description":"Dr.Semu - Malware Detection and Classification Tool Based on Dynamic Behavior","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":62,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-08-15T08:03:01.476Z"}},{"type":"Public","name":"viper","owner":"joesecurity","isFork":true,"description":"Binary analysis and management framework","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":351,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-07T13:19:18.404Z"}},{"type":"Public","name":"malsub","owner":"joesecurity","isFork":true,"description":"A Python RESTful API framework for online malware analysis and threat intelligence services.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":83,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-07T13:17:12.117Z"}},{"type":"Public","name":"Joe-Sandbox-Bro","owner":"joesecurity","isFork":false,"description":"JoeSandbox-Bro is a simple bro script which extracts files from your internet connection and analyzes them automatically on Joe Sandbox","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Zeek","color":"#ccc"},"pullRequestCount":0,"issueCount":0,"starsCount":43,"forksCount":16,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-06-06T12:58:25.289Z"}},{"type":"Public","name":"joesandbox_crits","owner":"joesecurity","isFork":false,"description":"Integration of Joe Sandbox for the Threat Intelligence Platform CRITs","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":2,"starsCount":5,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-04-17T14:29:20.776Z"}},{"type":"Public","name":"scmwrap","owner":"joesecurity","isFork":false,"description":"SettingContent-ms Wrapper","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-26T09:41:57.712Z"}},{"type":"Public","name":"scripts","owner":"joesecurity","isFork":false,"description":"Collection of scripts for interaction with Joe Sandbox","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":7,"forksCount":7,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-20T10:37:40.552Z"}},{"type":"Public","name":"crits_services","owner":"joesecurity","isFork":true,"description":"CRITs Services Collection","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":131,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-21T11:46:11.553Z"}},{"type":"Public","name":"acefile","owner":"joesecurity","isFork":true,"description":"read/test/extract ACE 1.0 and 2.0 archives in pure python","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":31,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-28T18:47:39.386Z"}},{"type":"Public","name":"yara","owner":"joesecurity","isFork":true,"description":"The pattern matching swiss knife","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1390,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-15T09:35:40.538Z"}},{"type":"Public","name":"DocBleach","owner":"joesecurity","isFork":true,"description":"🚿 Sanitising your documents, one threat at a time. — Content Disarm & Reconstruction Software","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":34,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-27T12:44:50.336Z"}},{"type":"Public","name":"awesome-malware-analysis","owner":"joesecurity","isFork":true,"description":"A curated list of awesome malware analysis tools and resources","topicNames":[],"topicsNotShown":0,"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":20,"forksCount":2489,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-10T12:17:05.216Z"}},{"type":"Public","name":"cpython","owner":"joesecurity","isFork":true,"description":"The Python programming language","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":28906,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-06T06:41:31.762Z"}},{"type":"Public","name":"crits","owner":"joesecurity","isFork":true,"description":"CRITs - Collaborative Research Into Threats","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":258,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-07-02T18:54:40.834Z"}},{"type":"Public","name":"pafishmacro","owner":"joesecurity","isFork":false,"description":"Pafish Macro is a Macro enabled Office Document to detect malware analysis systems and sandboxes. It uses evasion & detection techniques implemented by malicious documents.","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Visual Basic","color":"#945db7"},"pullRequestCount":0,"issueCount":1,"starsCount":279,"forksCount":72,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-27T07:59:17.048Z"}}],"repositoryCount":26,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}