{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"ctf-tools","owner":"devnullteam","isFork":true,"description":"Some setup scripts for security research tools.","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1877,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-16T23:27:48.996Z"}},{"type":"Public","name":"phpbash","owner":"devnullteam","isFork":true,"description":"A semi-interactive PHP shell compressed into a single file.","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":195,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-12-10T07:24:56.507Z"}},{"type":"Public","name":"stego-toolkit","owner":"devnullteam","isFork":true,"description":"Collection of steganography tools - helps with CTF challenges","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":312,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-26T13:33:02.734Z"}},{"type":"Public","name":"krackattacks-test-ap-ft","owner":"devnullteam","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":768,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-18T22:27:40.907Z"}},{"type":"Public","name":"CVE-2017-12617","owner":"devnullteam","isFork":true,"description":"Apache Tomcat < 9.0.1 (Beta) / < 8.5.23 / < 8.0.47 / < 7.0.8 - JSP Upload Bypass / Remote Code Execution ","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":124,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-10T18:06:21.353Z"}},{"type":"Public","name":"CTFd","owner":"devnullteam","isFork":true,"description":"CTFs as you need them","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2048,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-10-08T01:29:04.424Z"}},{"type":"Public","name":"Blueborne-CVE-2017-1000251","owner":"devnullteam","isFork":true,"description":"Blueborne CVE-2017-1000251 PoC for linux machines","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-25T14:31:05.151Z"}},{"type":"Public","name":"pbscan","owner":"devnullteam","isFork":true,"description":"Faster and more efficient stateless SYN scanner and banner grabber due to userland TCP/IP stack usage.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":36,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-24T14:00:29.544Z"}},{"type":"Public","name":"pycrypto","owner":"devnullteam","isFork":true,"description":"The Python Cryptography Toolkit","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":637,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-24T03:52:51.933Z"}},{"type":"Public","name":"LSB-Steganography","owner":"devnullteam","isFork":true,"description":"Python program to steganography files into images using the Least Significant Bit.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":263,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-09-07T11:47:46.760Z"}},{"type":"Public","name":"RsaCtfTool","owner":"devnullteam","isFork":true,"description":"RSA tool for ctf - retreive private key from weak public key and/or uncipher data","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":893,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-08-18T10:23:36.340Z"}},{"type":"Public","name":"spectrology","owner":"devnullteam","isFork":true,"description":"Images to audio files with corresponding spectrograms encoder.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":47,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-07-13T02:59:06.013Z"}},{"type":"Public","name":"CTF-Crypto","owner":"devnullteam","isFork":true,"description":"Contains tools for solving RSA and other crypto problems in CTFs.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":68,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-26T10:43:42.095Z"}},{"type":"Public","name":"Brutal","owner":"devnullteam","isFork":true,"description":"Payload for teensy like a rubber ducky but the syntax is different. this Human interfaes device ( HID attacks ). Penetration With Teensy . Brutal is a toolkit to quickly create various payload,powershell attack , virus attack and launch listener for a Human Interface Device ( Payload Teensy )","allTopics":[],"primaryLanguage":{"name":"Arduino","color":"#ededed"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":265,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-06-02T06:48:28.566Z"}},{"type":"Public","name":"RC4-.Net-Object","owner":"devnullteam","isFork":false,"description":"Objeto .Net para trabajar con cifrados RC4","allTopics":[],"primaryLanguage":{"name":"Visual Basic","color":"#945db7"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-02-18T23:20:29.075Z"}},{"type":"Public","name":"zsteg","owner":"devnullteam","isFork":true,"description":"detect stegano-hidden data in PNG & BMP","allTopics":[],"primaryLanguage":{"name":"Ruby","color":"#701516"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":139,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2014-03-01T20:45:03.000Z"}},{"type":"Public","name":"steghide","owner":"devnullteam","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":84,"license":"GNU General Public License v2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2013-10-28T00:09:33.000Z"}}],"repositoryCount":17,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"devnullteam repositories"}