{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"leprechaun","owner":"vonahisec","isFork":false,"description":"This tool is used to map out the network data flow to help penetration testers identify potentially valuable targets.","topicNames":["post-exploitation","privilege-escalation"],"topicsNotShown":0,"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":243,"forksCount":38,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-22T22:54:51.458Z"}},{"type":"Public","name":"bloodhound-parse-cli","owner":"vonahisec","isFork":false,"description":"Tool to parse domain admin sessions from the CLI using Bloodhound's files","topicNames":[],"topicsNotShown":0,"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-11T17:36:25.736Z"}}],"repositoryCount":2,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"mirror","text":"Mirrors"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}