{"payload":{"pageCount":2,"repositories":[{"type":"Public","name":"math-api","owner":"exploitd","isFork":true,"description":"Put LaTeX Math equation on everywhere as <img> tag.","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":32,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-04T03:20:12.704Z"}},{"type":"Public","name":"xpcspy","owner":"exploitd","isFork":true,"description":"Bidirectional XPC message interception and more. Powered by Frida","allTopics":[],"primaryLanguage":{"name":"TypeScript","color":"#3178c6"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":47,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-10-04T18:46:45.437Z"}},{"type":"Public","name":"monkey-shell","owner":"exploitd","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":12,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-14T06:16:42.285Z"}},{"type":"Public","name":"cstrike15_src","owner":"exploitd","isFork":true,"description":"Leak of CS:GO Source code, provided by toomuchcaffeine","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":708,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-04-23T01:09:47.877Z"}},{"type":"Public","name":"exploitd.github.io","owner":"exploitd","isFork":false,"description":"A publicly available website.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-02-03T18:19:04.107Z"}},{"type":"Public","name":"P4wnP1","owner":"exploitd","isFork":true,"description":"P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":659,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-31T12:30:16.965Z"}},{"type":"Public","name":"phpsploit","owner":"exploitd","isFork":true,"description":"Stealth post-exploitation framework","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":437,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-08-15T11:27:29.242Z"}},{"type":"Public","name":"httprobe","owner":"exploitd","isFork":true,"description":"Take a list of domains and probe for working HTTP and HTTPS servers","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":495,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-07-26T15:31:16.246Z"}},{"type":"Public","name":"geoip2.cr","owner":"exploitd","isFork":true,"description":"Crystal GeoIP2 database reader","allTopics":[],"primaryLanguage":{"name":"Crystal","color":"#000100"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-11T17:04:51.687Z"}},{"type":"Public","name":"disposable-email-domains","owner":"exploitd","isFork":true,"description":"a list of disposable and temporary email address domains","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":549,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-22T04:14:27.324Z"}},{"type":"Public","name":"Free-Security-eBooks","owner":"exploitd","isFork":true,"description":"Free Security and Hacking eBooks","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1036,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-01-20T11:26:26.884Z"}},{"type":"Public","name":"twint","owner":"exploitd","isFork":true,"description":"An advanced Twitter scraping & OSINT tool written in Python that doesn't use Twitter's API, allowing you to scrape a user's followers, following, Tweets and more while evading most API limitations.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2713,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-20T12:26:30.600Z"}},{"type":"Public","name":"cadmium","owner":"exploitd","isFork":true,"description":"Natural Language Processing (NLP) library for Crystal","allTopics":[],"primaryLanguage":{"name":"Crystal","color":"#000100"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":15,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-14T20:20:38.378Z"}},{"type":"Public","name":"crecto-admin","owner":"exploitd","isFork":true,"description":"Crecto Admin","allTopics":[],"primaryLanguage":{"name":"Crystal","color":"#000100"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-11T22:39:33.760Z"}},{"type":"Public","name":"kemal-csrf","owner":"exploitd","isFork":true,"description":"Add CSRF protection to your Kemal application","allTopics":[],"primaryLanguage":{"name":"Crystal","color":"#000100"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":21,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-11T22:37:56.864Z"}},{"type":"Public","name":"WebMap","owner":"exploitd","isFork":true,"description":"Nmap Web Dashboard and Reporting","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":207,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-11-09T16:35:13.784Z"}},{"type":"Public","name":"udtrace","owner":"exploitd","isFork":true,"description":"UNIX domain socket tracing LD_PRELOAD wrapper, mirror from git://git.gnumonks.org/udtrace","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-10-31T12:28:16.455Z"}},{"type":"Public","name":"Photon","owner":"exploitd","isFork":true,"description":"Incredibly fast crawler which extracts urls, emails, files, website accounts and much more.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1489,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-24T09:45:30.641Z"}},{"type":"Public","name":"httpdirfs","owner":"exploitd","isFork":true,"description":"A filesystem which allows you to mount HTTP directory listings","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":60,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-24T06:23:51.611Z"}},{"type":"Public","name":"ant-design-pro","owner":"exploitd","isFork":true,"description":"👨🏻‍💻👩🏻‍💻 Use Ant Design like a Pro!","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":8141,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-07-09T09:58:17.529Z"}},{"type":"Public","name":"tko-subs","owner":"exploitd","isFork":true,"description":"A tool that can help detect and takeover subdomains with dead DNS records","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":137,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-06-24T18:51:59.380Z"}},{"type":"Public","name":"CVE-2018-9995_dvr_credentials","owner":"exploitd","isFork":true,"description":"(CVE-2018-9995) Get DVR Credentials","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":198,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-05-05T17:48:06.087Z"}},{"type":"Public","name":"SSH-Brute-Force","owner":"exploitd","isFork":true,"description":"Crack SSH Password using Dictionary and Brute Force Method","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":13,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-05-04T09:54:45.808Z"}},{"type":"Public","name":"CASPER-1","owner":"exploitd","isFork":true,"description":"👻 Socket based RAT for Windows with evasion techniques and other features for control","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-16T08:28:06.055Z"}},{"type":"Public","name":"whonow","owner":"exploitd","isFork":true,"description":"A malicious DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":102,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-04-02T20:06:08.146Z"}},{"type":"Public","name":"S3Scanner","owner":"exploitd","isFork":true,"description":"Scan for open S3 buckets and dump","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":360,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-19T03:23:31.101Z"}},{"type":"Public","name":"joomscan","owner":"exploitd","isFork":true,"description":"OWASP Joomla Vulnerability Scanner Project","allTopics":[],"primaryLanguage":{"name":"Perl 6","color":"#ededed"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":242,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-17T14:23:37.084Z"}},{"type":"Public","name":"amass","owner":"exploitd","isFork":true,"description":"Subdomain Enumeration in Go","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":198,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-08T03:38:13.516Z"}},{"type":"Public","name":"Probable-Wordlists","owner":"exploitd","isFork":true,"description":"Version 2 is live! Wordlists sorted by probability originally created for password generation and testing - make sure your passwords aren't popular!","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1612,"license":"Creative Commons Attribution Share Alike 4.0 International","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-27T16:53:48.798Z"}},{"type":"Public","name":"PoT","owner":"exploitd","isFork":true,"description":"Phishing on Twitter","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":69,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-02-21T20:05:00.451Z"}}],"repositoryCount":51,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"exploitd repositories"}