{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":667905361,"defaultBranch":"main","name":"saas-attacks","ownerLogin":"pushsecurity","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2023-07-18T15:05:29.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/59915245?v=4","public":true,"private":false,"isOrgOwned":true},"refInfo":{"name":"","listCacheKey":"v0:1713787293.0","currentOid":""},"activityList":{"items":[{"before":"abdd60aa8063d47fd474261ebbb5d0c4a54b3322","after":"9d99a99553de372c4d138a85a11f2899f6a30fe2","ref":"refs/heads/main","pushedAt":"2024-04-23T13:55:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Fixing dark vs light mode image rendering","shortMessageHtmlLink":"Fixing dark vs light mode image rendering"}},{"before":"1b00aa136cec4814fb24940eee701c078fcd428a","after":"abdd60aa8063d47fd474261ebbb5d0c4a54b3322","ref":"refs/heads/main","pushedAt":"2024-04-23T13:24:54.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Add banner badges/links to readme","shortMessageHtmlLink":"Add banner badges/links to readme"}},{"before":"ec8578b5ae3805161c811be64c39531c1ae37e92","after":null,"ref":"refs/heads/65-add-example-for-in-app-phishing-of-github-using-trick-to-host-files-on-github-repos-you-do-not-control","pushedAt":"2024-04-22T12:01:33.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"52ff4aae96222820b694c958bdf78394e6cf1bd7","after":"1b00aa136cec4814fb24940eee701c078fcd428a","ref":"refs/heads/main","pushedAt":"2024-04-22T12:01:32.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #66 from pushsecurity/65-add-example-for-in-app-phishing-of-github-using-trick-to-host-files-on-github-repos-you-do-not-control\n\nAdding in-app phishing example for github with additional trick for h…","shortMessageHtmlLink":"Merge pull request #66 from pushsecurity/65-add-example-for-in-app-ph…"}},{"before":"52ff4aae96222820b694c958bdf78394e6cf1bd7","after":"ec8578b5ae3805161c811be64c39531c1ae37e92","ref":"refs/heads/65-add-example-for-in-app-phishing-of-github-using-trick-to-host-files-on-github-repos-you-do-not-control","pushedAt":"2024-04-22T12:00:59.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding in-app phishing example for github with additional trick for hosting files in non-writable repos","shortMessageHtmlLink":"Adding in-app phishing example for github with additional trick for h…"}},{"before":null,"after":"52ff4aae96222820b694c958bdf78394e6cf1bd7","ref":"refs/heads/65-add-example-for-in-app-phishing-of-github-using-trick-to-host-files-on-github-repos-you-do-not-control-1","pushedAt":"2024-04-22T11:37:12.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique\n\nAdding device enrollment technique","shortMessageHtmlLink":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique"}},{"before":null,"after":"52ff4aae96222820b694c958bdf78394e6cf1bd7","ref":"refs/heads/65-add-example-for-in-app-phishing-of-github-using-trick-to-host-files-on-github-repos-you-do-not-control","pushedAt":"2024-04-22T11:36:57.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique\n\nAdding device enrollment technique","shortMessageHtmlLink":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique"}},{"before":"8817a410b1cf5ba75896a064f2edc26305352a87","after":null,"ref":"refs/heads/61-device-enrollment-technique","pushedAt":"2024-03-20T10:42:48.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"59395c6b847bfb86866ad7e3eb83e3025516f214","after":"52ff4aae96222820b694c958bdf78394e6cf1bd7","ref":"refs/heads/main","pushedAt":"2024-03-20T10:42:47.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique\n\nAdding device enrollment technique","shortMessageHtmlLink":"Merge pull request #62 from pushsecurity/61-device-enrollment-technique"}},{"before":"59395c6b847bfb86866ad7e3eb83e3025516f214","after":"8817a410b1cf5ba75896a064f2edc26305352a87","ref":"refs/heads/61-device-enrollment-technique","pushedAt":"2024-03-20T10:42:18.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding device enrollment technique","shortMessageHtmlLink":"Adding device enrollment technique"}},{"before":null,"after":"59395c6b847bfb86866ad7e3eb83e3025516f214","ref":"refs/heads/61-device-enrollment-technique","pushedAt":"2024-03-20T10:36:05.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #60 from pushsecurity/43-add-aitm-phishing-proxying-as-a-techinique\n\nAdding aitm phishing technique","shortMessageHtmlLink":"Merge pull request #60 from pushsecurity/43-add-aitm-phishing-proxyin…"}},{"before":"d671943928479fca18b8fb873f2e0c696bedd292","after":"59395c6b847bfb86866ad7e3eb83e3025516f214","ref":"refs/heads/main","pushedAt":"2024-03-19T17:14:13.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #60 from pushsecurity/43-add-aitm-phishing-proxying-as-a-techinique\n\nAdding aitm phishing technique","shortMessageHtmlLink":"Merge pull request #60 from pushsecurity/43-add-aitm-phishing-proxyin…"}},{"before":"792618803735841259b1f5470c81ad0c8e814cea","after":null,"ref":"refs/heads/43-add-aitm-phishing-proxying-as-a-techinique","pushedAt":"2024-03-19T17:14:13.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"d671943928479fca18b8fb873f2e0c696bedd292","after":"792618803735841259b1f5470c81ad0c8e814cea","ref":"refs/heads/43-add-aitm-phishing-proxying-as-a-techinique","pushedAt":"2024-03-19T17:13:08.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding aitm phishing technique","shortMessageHtmlLink":"Adding aitm phishing technique"}},{"before":null,"after":"d671943928479fca18b8fb873f2e0c696bedd292","ref":"refs/heads/43-add-aitm-phishing-proxying-as-a-techinique","pushedAt":"2024-03-19T17:05:31.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #59 from pushsecurity/58-add-password-manager-extraction-examples-to-password-scraping-technique\n\n58 add password manager extraction examples to password scraping technique","shortMessageHtmlLink":"Merge pull request #59 from pushsecurity/58-add-password-manager-extr…"}},{"before":"fc185d41225d6b127d74f559ad6de23b7b76bf43","after":null,"ref":"refs/heads/58-add-password-manager-extraction-examples-to-password-scraping-technique","pushedAt":"2024-03-14T17:01:05.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"ff683680e636ce538689933d916ba9a92b95da27","after":"d671943928479fca18b8fb873f2e0c696bedd292","ref":"refs/heads/main","pushedAt":"2024-03-14T17:01:04.000Z","pushType":"pr_merge","commitsCount":3,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #59 from pushsecurity/58-add-password-manager-extraction-examples-to-password-scraping-technique\n\n58 add password manager extraction examples to password scraping technique","shortMessageHtmlLink":"Merge pull request #59 from pushsecurity/58-add-password-manager-extr…"}},{"before":"ecb87534ab52d601315543ba78d4432c84cb1388","after":"fc185d41225d6b127d74f559ad6de23b7b76bf43","ref":"refs/heads/58-add-password-manager-extraction-examples-to-password-scraping-technique","pushedAt":"2024-03-14T17:00:40.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"typo","shortMessageHtmlLink":"typo"}},{"before":"ff683680e636ce538689933d916ba9a92b95da27","after":"ecb87534ab52d601315543ba78d4432c84cb1388","ref":"refs/heads/58-add-password-manager-extraction-examples-to-password-scraping-technique","pushedAt":"2024-03-14T16:59:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Tweaking password scraping description and adding reference for cloud password manager secret theft","shortMessageHtmlLink":"Tweaking password scraping description and adding reference for cloud…"}},{"before":null,"after":"ff683680e636ce538689933d916ba9a92b95da27","ref":"refs/heads/58-add-password-manager-extraction-examples-to-password-scraping-technique","pushedAt":"2024-03-14T16:50:59.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Add ref to MS blog","shortMessageHtmlLink":"Add ref to MS blog"}},{"before":"e63eea2d45f05957f26e706402bff7aab11be8c6","after":"ff683680e636ce538689933d916ba9a92b95da27","ref":"refs/heads/main","pushedAt":"2024-01-29T20:56:39.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jacques-","name":null,"path":"/jacques-","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/4180872?s=80&v=4"},"commit":{"message":"Add ref to MS blog","shortMessageHtmlLink":"Add ref to MS blog"}},{"before":"a8807dce51e83a7a88496e35806aac6067ecf464","after":null,"ref":"refs/heads/56-shadow-workflow-reference-for-use-of-fivetran-by-scattered-spider","pushedAt":"2024-01-15T17:11:14.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"efd706681962b9bd1e40d59c9adb3290248af29e","after":"e63eea2d45f05957f26e706402bff7aab11be8c6","ref":"refs/heads/main","pushedAt":"2024-01-15T17:11:13.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #57 from pushsecurity/56-shadow-workflow-reference-for-use-of-fivetran-by-scattered-spider\n\nAdding octo tempest/scattered spider reference to real-world use of s…","shortMessageHtmlLink":"Merge pull request #57 from pushsecurity/56-shadow-workflow-reference…"}},{"before":"efd706681962b9bd1e40d59c9adb3290248af29e","after":"a8807dce51e83a7a88496e35806aac6067ecf464","ref":"refs/heads/56-shadow-workflow-reference-for-use-of-fivetran-by-scattered-spider","pushedAt":"2024-01-15T17:10:47.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding octo tempest/scattered spider reference to real-world use of shadow workflows abusing FiveTran to steal databases","shortMessageHtmlLink":"Adding octo tempest/scattered spider reference to real-world use of s…"}},{"before":null,"after":"efd706681962b9bd1e40d59c9adb3290248af29e","ref":"refs/heads/56-shadow-workflow-reference-for-use-of-fivetran-by-scattered-spider","pushedAt":"2024-01-15T17:07:01.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding bluehat and DCP podcast links that cover the SaaS attack matrix","shortMessageHtmlLink":"Adding bluehat and DCP podcast links that cover the SaaS attack matrix"}},{"before":"d826650fc66db5b2bf1ed7205f9964aefe446602","after":"efd706681962b9bd1e40d59c9adb3290248af29e","ref":"refs/heads/main","pushedAt":"2023-12-22T16:55:17.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding bluehat and DCP podcast links that cover the SaaS attack matrix","shortMessageHtmlLink":"Adding bluehat and DCP podcast links that cover the SaaS attack matrix"}},{"before":"2ddac3c0370553351289618805b5dea2a0a18f66","after":null,"ref":"refs/heads/54-add-references-for-recent-microsoft-report-on-oauth-attacks","pushedAt":"2023-12-13T15:15:44.000Z","pushType":"branch_deletion","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"}},{"before":"4c0791e68bac8abeccaad3a7616693bf94c0a27c","after":"d826650fc66db5b2bf1ed7205f9964aefe446602","ref":"refs/heads/main","pushedAt":"2023-12-13T15:15:42.000Z","pushType":"pr_merge","commitsCount":2,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #55 from pushsecurity/54-add-references-for-recent-microsoft-report-on-oauth-attacks\n\nAdding references to microsoft oauth attacks blog","shortMessageHtmlLink":"Merge pull request #55 from pushsecurity/54-add-references-for-recent…"}},{"before":"4c0791e68bac8abeccaad3a7616693bf94c0a27c","after":"2ddac3c0370553351289618805b5dea2a0a18f66","ref":"refs/heads/54-add-references-for-recent-microsoft-report-on-oauth-attacks","pushedAt":"2023-12-13T15:15:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Adding references to microsoft oauth attacks blog","shortMessageHtmlLink":"Adding references to microsoft oauth attacks blog"}},{"before":null,"after":"4c0791e68bac8abeccaad3a7616693bf94c0a27c","ref":"refs/heads/54-add-references-for-recent-microsoft-report-on-oauth-attacks","pushedAt":"2023-12-13T15:08:17.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"jukelennings","name":null,"path":"/jukelennings","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/95348608?s=80&v=4"},"commit":{"message":"Merge pull request #52 from pushsecurity/51-add-okta-swa-example-for-password-scraping\n\nAdding Okta SWA example","shortMessageHtmlLink":"Merge pull request #52 from pushsecurity/51-add-okta-swa-example-for-…"}}],"hasNextPage":true,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"djE6ks8AAAAEOCLdegA","startCursor":null,"endCursor":null}},"title":"Activity · pushsecurity/saas-attacks"}