{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"moodle-rce-calculatedquestions","owner":"RedTeamPentesting","isFork":false,"description":"Scripts for Analysis of a RCE in Moodle Calculated Questions (CVE-2024-43425)","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-23T09:36:55.770Z"}},{"type":"Public","name":"monsoon","owner":"RedTeamPentesting","isFork":false,"description":"Fast HTTP enumerator","allTopics":["go","fast","http","security","enumerator","fuzzer","fuzz"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":2,"starsCount":454,"forksCount":40,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-02T15:46:37.581Z"}},{"type":"Public","name":"postscript_blog_examples","owner":"RedTeamPentesting","isFork":false,"description":"PostScript examples useful for attacking Ghostscript.","allTopics":[],"primaryLanguage":{"name":"PostScript","color":"#da291c"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-01T07:55:18.710Z"}},{"type":"Public","name":"pretender","owner":"RedTeamPentesting","isFork":false,"description":"Your MitM sidekick for relaying attacks featuring DHCPv6 DNS takeover as well as mDNS, LLMNR and NetBIOS-NS spoofing.","allTopics":["go","security","pentesting","mdns","llmnr","dhcpv6","netbios","spoofer","pretender","relaying","dns"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":943,"forksCount":66,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-07T14:11:43.407Z"}},{"type":"Public","name":"kbtls","owner":"RedTeamPentesting","isFork":false,"description":"Establishes mutually trusted TLS connections based on a pre-shared connection key.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":46,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-21T10:26:33.870Z"}},{"type":"Public","name":"bitwarden-windows-hello","owner":"RedTeamPentesting","isFork":false,"description":"Tools to Exploit Bitwarden v2023.3.0 with Windows Hello","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":29,"forksCount":4,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-03T10:27:39.088Z"}},{"type":"Public","name":"resocks","owner":"RedTeamPentesting","isFork":false,"description":"mTLS-Encrypted Back-Connect SOCKS5 Proxy","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":382,"forksCount":24,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-19T10:43:29.472Z"}},{"type":"Public","name":"CVE-2023-33243","owner":"RedTeamPentesting","isFork":false,"description":"PoC for login with password hash in STARFACE","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-02T14:35:23.459Z"}},{"type":"Public","name":"remarkable-encryption","owner":"RedTeamPentesting","isFork":false,"description":"A document encryption solution for the reMarkable 2 ePaper tablet.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":0,"starsCount":50,"forksCount":4,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-24T14:38:38.506Z"}},{"type":"Public","name":".github","owner":"RedTeamPentesting","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-09-13T11:00:04.437Z"}},{"type":"Public","name":"CVE-2020-13935","owner":"RedTeamPentesting","isFork":false,"description":"Exploit for WebSocket Vulnerability in Apache Tomcat","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":162,"forksCount":37,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-02T14:51:48.201Z"}}],"repositoryCount":11,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"RedTeamPentesting repositories"}