{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"cve","owner":"trickest","isFork":false,"description":"Gather and update all available and newest CVEs with their PoC.","allTopics":["security","exploit","hacking","penetration-testing","poc","vulnerability","infosec","pentesting","vulnerabilities","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","latest-cve","cve-poc"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":3,"issueCount":14,"starsCount":6462,"forksCount":814,"license":"MIT License","participation":[8,7,5,7,7,7,7,5,5,5,8,7,7,7,6,5,7,7,7,11,21,21,21,21,21,21,21,20,20,21,21,21,21,21,21,21,21,21,6,19,21,21,21,7,20,19,21,21,21,21,21,21],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-23T06:37:07.208Z"}},{"type":"Public","name":"inventory","owner":"trickest","isFork":false,"description":"Asset inventory of over 800 public bug bounty programs.","allTopics":["bug-bounty","fuzzing","recon","software-security","red-team","threat-intelligence","pentest-tool","osint-resources","osint-tool","bugbountytips","security","osint","hacking","penetration-testing","infosec","pentesting","bugbounty","security-tools","reconnaissance"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":1,"issueCount":5,"starsCount":1239,"forksCount":218,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-22T19:49:26.243Z"}},{"type":"Public","name":"resolvers","owner":"trickest","isFork":false,"description":"The most exhaustive list of reliable DNS resolvers.","allTopics":["resolver","dns","security","network","cybersecurity","brute-force","bug-bounty","infosec","pentesting","resolvers","red-team","security-tool"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":2,"starsCount":665,"forksCount":69,"license":"MIT License","participation":[8,7,7,7,6,6,7,6,6,3,7,7,7,8,6,5,7,6,7,6,7,7,7,7,7,7,7,7,7,7,7,7,7,6,7,7,7,7,7,6,7,7,7,2,7,6,7,7,7,7,7,7],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-22T16:31:04.621Z"}},{"type":"Public","name":"wordlists","owner":"trickest","isFork":false,"description":"Real-world infosec wordlists, updated regularly","allTopics":["security","hacking","wordlist","penetration-testing","infosec","pentesting","bugbounty","wordlist-generator","content-discovery","reconnaissance","wordlists","directory-bruteforce","wordlists-dictionary-collection"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":1358,"forksCount":167,"license":"MIT License","participation":[16,14,15,15,18,16,15,13,13,8,15,15,15,15,18,16,22,21,24,24,22,21,23,22,22,22,22,22,22,22,22,23,22,21,22,20,19,21,22,20,19,21,20,7,20,19,19,21,19,19,19,22],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-22T15:59:48.757Z"}},{"type":"Public","name":"cloud","owner":"trickest","isFork":false,"description":"Monitoring the Cloud Landscape","allTopics":["security","cloud","osint","monitoring","penetration-testing","bug-bounty","pentesting","recon","red-team","security-tools","reconnaissance"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":2,"starsCount":71,"forksCount":10,"license":"MIT License","participation":[2,1,1,1,1,1,1,1,3,1,1,1,1,1,1,0,1,2,1,1,1,0,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,1,0,0,0,0,1,1,1,1,1],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-19T01:03:42.163Z"}},{"type":"Public","name":"trickest-cli","owner":"trickest","isFork":false,"description":"Execute Trickest workflows right from your terminal","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":1,"starsCount":77,"forksCount":11,"license":"MIT License","participation":[3,2,2,0,0,8,22,0,0,9,2,6,4,2,0,4,2,0,4,2,0,5,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,17,0,0,5,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-26T10:27:19.545Z"}},{"type":"Public","name":"trickest-agent-init","owner":"trickest","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-19T14:51:34.528Z"}},{"type":"Public","name":"s5cmd","owner":"trickest","isFork":true,"description":"Parallel S3 and local filesystem execution tool.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":226,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-11T10:32:34.649Z"}},{"type":"Public","name":"elasticsearch_index","owner":"trickest","isFork":false,"description":"Manage attack surface data on Elasticsearch","allTopics":["data","web-server","asm","penetration-testing","pentesting","recon","vulnerabilities","elastic","elasticsearch-client","security-tools","threat-intelligence","pentesting-tools","penetration-testing-tools","attack-surface-management"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":19,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-20T17:49:43.758Z"}},{"type":"Public","name":"containers","owner":"trickest","isFork":false,"description":"Automated privilege escalation of the world's most popular Docker images.","allTopics":["security","exploit","containers","exploits","poc","vulnerability","infosec","pentesting","cve","security-tools","software-vulnerability","latest-cve"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":62,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:39:21.268Z"}},{"type":"Public","name":"dsieve","owner":"trickest","isFork":false,"description":"Filter and enrich a list of subdomains by level","allTopics":["security","subdomain","enumeration","penetration-testing","infosec","pentesting","bugbounty","subdomain-scanner","subdomain-enumeration","pentesting-tools","penetration-testing-tools","subdomain-finder","infosectools"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":0,"starsCount":187,"forksCount":25,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:39:02.548Z"}},{"type":"Public","name":"enumerepo","owner":"trickest","isFork":false,"description":"List all public repositories for (valid) GitHub usernames","allTopics":["security","osint","enumeration","penetration-testing","pentesting","recon","reconnaissance","github-user-search","pentesting-tools","github-repository-search","open-source-intelligence","github-osint","penetration-testing-tools"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":67,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:38:59.060Z"}},{"type":"Public","name":"github-logs","owner":"trickest","isFork":false,"description":"Extracting OSINT Insights from 15TB of GitHub Event Logs","allTopics":["github","github-api","security","osint","penetration-testing","event-log","pentesting","recon","red-team","github-events"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":66,"forksCount":9,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:37:26.818Z"}},{"type":"Public","name":"insiders","owner":"trickest","isFork":false,"description":"Archive of Potential Insider Threats","allTopics":["security","osint","assets","hacking","penetration-testing","infosec","pentesting","recon","bugbounty","red-team","security-tools","threat-intelligence","reconnaissance","osint-resources","github-recon","osint-tool","bugbountytips","bugbounty-tool"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":138,"forksCount":21,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:20:03.315Z"}},{"type":"Public","name":"mkpath","owner":"trickest","isFork":false,"description":"Make URL path combinations using a wordlist","allTopics":["security","enumeration","penetration-testing","fuzzing","pentesting","recon","reconnaissance","directory-bruteforce","pentesting-tools","penetration-testing-tools","bugbountytips","webappsecurity"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":171,"forksCount":28,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:57.655Z"}},{"type":"Public template","name":"recon-and-vulnerability-scanner-template","owner":"trickest","isFork":false,"description":"Create your own recon & vulnerability scanner with Trickest and GitHub","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":49,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:54.123Z"}},{"type":"Public","name":"mksub","owner":"trickest","isFork":false,"description":"Generate tens of thousands of subdomain combinations in a matter of seconds","allTopics":["security","penetration-testing","recon","security-tools","reconnaissance","subdomain-scanner","subdomain-enumeration","pentesting-tools","penetration-testing-tools","bugbountytips","subdomain-finder","infosectools","subdomain","enumeration","infosec","pentesting","bugbounty"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":251,"forksCount":22,"license":"MIT License","participation":[1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:50.485Z"}},{"type":"Public","name":"mgwls","owner":"trickest","isFork":false,"description":"Combine words from two wordlist files and concatenate them with an optional delimiter","allTopics":["security","enumeration","penetration-testing","fuzzing","pentesting","recon","reconnaissance","directory-bruteforce","pentesting-tools","penetration-testing-tools","web-app-security"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":1,"starsCount":34,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:48.565Z"}},{"type":"Public","name":"packages","owner":"trickest","isFork":false,"description":"Automated compromise detection of the world's most popular packages","allTopics":["security","package","packages","penetration-testing","infosec","pentesting","threat-hunting","python-packages","python-security","software-security","threat-analysis","threat-intelligence","compromise-detection"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":15,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:45.080Z"}},{"type":"Public","name":"find-gh-poc","owner":"trickest","isFork":false,"description":"Find CVE PoCs on GitHub","allTopics":["security","exploit","hacking","penetration-testing","poc","vulnerability","pentesting","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","penetration-testing-tools","latest-cve","cve-poc"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":1,"starsCount":136,"forksCount":20,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:41.569Z"}},{"type":"Public","name":"safe-harbour","owner":"trickest","isFork":false,"description":"security.txt collection of most popular world-wide domains","allTopics":["security","automation","bug-bounty","bugbounty","automation-framework","hall-of-fame","ethical-hacking","security-automation","responsible-disclosure","security-txt","ethical-hacking-tools"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":51,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:39.241Z"}},{"type":"Public","name":"zip","owner":"trickest","isFork":false,"description":"Monitoring the internet for new .zip domains","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":209,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:34.208Z"}},{"type":"Public","name":"action","owner":"trickest","isFork":false,"description":"Github Action for Trickest Workflows","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-25T16:00:58.105Z"}},{"type":"Public","name":"scripts","owner":"trickest","isFork":false,"description":"Handy scripts and one-liners to make life easier","allTopics":["bash","security","script","scripts","aliases","infosec","recon","scripts-collection","security-automation","security-tools","reconnaissance","one-liners","bugbountytips"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":34,"forksCount":6,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-06T07:48:57.588Z"}},{"type":"Public","name":"vault-k8s","owner":"trickest","isFork":true,"description":"First-class support for Vault and Kubernetes.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":170,"license":"Mozilla Public License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-04T16:51:08.001Z"}},{"type":"Public","name":"log4j","owner":"trickest","isFork":false,"description":"Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.","allTopics":["security","exploit","log4j","hacking","penetration-testing","vulnerability","infosec","pentesting","vulnerabilities","bugbounty","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","log4shell"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":112,"forksCount":23,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-16T21:45:10.151Z"}}],"repositoryCount":26,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"trickest repositories"}