{"payload":{"pageCount":4,"repositories":[{"type":"Public","name":"PowerHuntShares","owner":"NetSPI","isFork":false,"description":"PowerHuntShares is an audit script designed in inventory, analyze, and report excessive privileges configured on Active Directory domains.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":6,"starsCount":549,"forksCount":77,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,0,2,8,11,10,0,1,0,0,11,8,8,29,2,5,0,0,25,21],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-20T15:56:15.450Z"}},{"type":"Public","name":"gcpwn","owner":"NetSPI","isFork":false,"description":"Enumeration/exploit/analysis/download/etc pentesting framework for GCP; modeled like Pacu for AWS; a product of numerous hours via @WebbinRoot\n","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":194,"forksCount":16,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,6,3,4,2,3,2,2,0,2,2,0,0,0,6,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-09T06:03:57.387Z"}},{"type":"Public","name":"MicroBurst","owner":"NetSPI","isFork":false,"description":"A collection of scripts for assessing Microsoft Azure security","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":3,"starsCount":2015,"forksCount":312,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-22T21:03:46.531Z"}},{"type":"Public","name":"PowerUpSQL","owner":"NetSPI","isFork":false,"description":"PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":3,"issueCount":19,"starsCount":2438,"forksCount":461,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-20T17:39:55.958Z"}},{"type":"Public","name":"BypassFuzzer","owner":"NetSPI","isFork":true,"description":"Fuzz 401/403/404 pages for bypasses","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":26,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-09T16:04:11.189Z"}},{"type":"Public","name":"PESecurity","owner":"NetSPI","isFork":false,"description":"PowerShell module to check if a Windows binary (EXE/DLL) has been compiled with ASLR, DEP, SafeSEH, StrongNaming, and Authenticode.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":1,"issueCount":6,"starsCount":621,"forksCount":148,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-31T09:53:02.174Z"}},{"type":"Public","name":"Scheduled-Task","owner":"NetSPI","isFork":false,"description":"Native Binary for Creating a Scheduled Task","allTopics":["central","attack-sim"],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":0,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-25T23:25:45.277Z"}},{"type":"Public","name":"bambdas","owner":"NetSPI","isFork":true,"description":"Bambdas collection for Burp Suite Professional and Community.","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":27,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-11T00:40:22.646Z"}},{"type":"Public","name":"FuncoPop","owner":"NetSPI","isFork":false,"description":"Tools for attacking Azure Function Apps","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":61,"forksCount":6,"license":"Other","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,3,0,0,0,0,0,4,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-20T22:47:40.345Z"}},{"type":"Public","name":"AWSSigner","owner":"NetSPI","isFork":false,"description":"Burp Extension for AWS Signing ","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":2,"issueCount":6,"starsCount":85,"forksCount":36,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-14T00:05:12.854Z"}},{"type":"Public","name":"WikiJekyllTheme","owner":"NetSPI","isFork":false,"description":"Wiki theme for various NetSPI wikis","allTopics":["jekyll-theme"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-20T18:09:01.872Z"}},{"type":"Public","name":"SQLInjectionWiki","owner":"NetSPI","isFork":false,"description":"A wiki focusing on aggregating and documenting various SQL injection methods","allTopics":["mysql","sql","wiki","injection","oracle","sqli","mssql","sqlserver","netspi"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":2,"issueCount":2,"starsCount":761,"forksCount":148,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-08T20:34:28.010Z"}},{"type":"Public","name":"PowerHunt","owner":"NetSPI","isFork":false,"description":"PowerHunt is a modular threat hunting framework written in PowerShell that leverages PowerShell Remoting for data collection on scale.","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":3,"starsCount":61,"forksCount":11,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-25T15:25:44.133Z"}},{"type":"Public","name":"AutoDirbuster","owner":"NetSPI","isFork":false,"description":"Automatically run and save ffuf scans for multiple IPs","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":74,"forksCount":21,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-19T19:34:33.622Z"}},{"type":"Public","name":"ruler","owner":"NetSPI","isFork":true,"description":"A tool to abuse Exchange services","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":9,"forksCount":356,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-18T00:40:19.825Z"}},{"type":"Public","name":"silkwasm","owner":"NetSPI","isFork":false,"description":"HTML Smuggling with Web Assembly","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":18,"forksCount":1,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-20T18:20:14.474Z"}},{"type":"Public","name":"JavaSerialKiller","owner":"NetSPI","isFork":false,"description":"Burp extension to perform Java Deserialization Attacks","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":6,"issueCount":1,"starsCount":208,"forksCount":97,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-02T20:35:42.843Z"}},{"type":"Public","name":"vbamc","owner":"NetSPI","isFork":true,"description":"Visual Basic for Applications macro project compiler.","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-23T18:10:00.772Z"}},{"type":"Public","name":"PowerShell","owner":"NetSPI","isFork":false,"description":"NetSPI PowerShell Scripts","allTopics":[],"primaryLanguage":{"name":"PowerShell","color":"#012456"},"pullRequestCount":0,"issueCount":0,"starsCount":321,"forksCount":105,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-15T18:47:13.111Z"}},{"type":"Public","name":"BetaFast","owner":"NetSPI","isFork":false,"description":"Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":3,"issueCount":0,"starsCount":96,"forksCount":12,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-09T19:06:22.102Z"}},{"type":"Public","name":"GOAD","owner":"NetSPI","isFork":true,"description":"game of active directory","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":708,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-03T21:19:59.622Z"}},{"type":"Public","name":"MonkeyWorks","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":60,"forksCount":28,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-12-20T19:44:05.937Z"}},{"type":"Public","name":"XPath-Injection-Lab","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-03T13:56:32.735Z"}},{"type":"Public","name":"DetectionRules","owner":"NetSPI","isFork":false,"description":"This is a single location to store detection rules of various types.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-30T14:36:07.894Z"}},{"type":"Public","name":"BAS-Rubeus","owner":"NetSPI","isFork":true,"description":"Trying to tame the three-headed dog.","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":775,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-15T02:19:02.531Z"}},{"type":"Public","name":"NetblockTool","owner":"NetSPI","isFork":false,"description":"Find netblocks owned by a company","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":3,"starsCount":336,"forksCount":64,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-03T16:28:15.413Z"}},{"type":"Public","name":"shopizer-admin","owner":"NetSPI","isFork":true,"description":"","allTopics":[],"primaryLanguage":{"name":"SCSS","color":"#c6538c"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":145,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-16T02:16:37.567Z"}},{"type":"Public","name":"ESC","owner":"NetSPI","isFork":false,"description":"Evil SQL Client (ESC) is an interactive .NET SQL console client with enhanced SQL Server discovery, access, and data exfiltration features. While ESC can be a handy SQL Client for daily tasks, it was originally designed for targeting SQL Servers during penetration tests and red team engagements. The intent of the project is to provide an .exe, b…","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":2,"starsCount":277,"forksCount":40,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-25T14:39:35.876Z"}},{"type":"Public","name":"cmdsql","owner":"NetSPI","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"ASP.NET","color":"#9400ff"},"pullRequestCount":0,"issueCount":0,"starsCount":54,"forksCount":23,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-01-30T19:11:32.179Z"}},{"type":"Public","name":"DInvoke","owner":"NetSPI","isFork":true,"description":"Dynamically invoke arbitrary unmanaged code from managed code without PInvoke.","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":107,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-21T16:52:53.673Z"}}],"repositoryCount":116,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"NetSPI repositories"}