{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Public-Intelligence-Feeds","owner":"CriticalPathSecurity","isFork":false,"description":"Standard-Format Threat Intelligence Feeds","allTopics":["threatintel","threat-intelligence"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":94,"forksCount":17,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-15T10:17:06.240Z"}},{"type":"Public","name":"Zeek-Intelligence-Feeds","owner":"CriticalPathSecurity","isFork":false,"description":"Zeek-Formatted Threat Intelligence Feeds","allTopics":["phishing","threatintel","zeek","threat-intelligence","zeek-ids","malware"],"primaryLanguage":{"name":"Zeek","color":"#ccc"},"pullRequestCount":0,"issueCount":0,"starsCount":331,"forksCount":46,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-15T10:16:06.070Z"}},{"type":"Public","name":"Zeek-Intelligence-File-Names","owner":"CriticalPathSecurity","isFork":false,"description":"Zeek-Formatted Ransomware File Name Extensions","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":4,"license":"MIT License","participation":[171,164,169,174,168,172,176,171,173,172,176,175,175,177,173,174,175,49,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-14T18:14:57.579Z"}},{"type":"Public","name":"turbo-parakeet","owner":"CriticalPathSecurity","isFork":false,"description":"Zeek Intelligence Feed Modifier","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-27T19:14:20.023Z"}},{"type":"Public","name":"CIRCL-Services","owner":"CriticalPathSecurity","isFork":false,"description":"OSINT Tools for querying CIRCL Passive DNS and SSL APIs","allTopics":["osint","osint-python"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-17T13:50:16.791Z"}},{"type":"Public","name":"file-extraction","owner":"CriticalPathSecurity","isFork":true,"description":"Extract files from network traffic with Zeek.","allTopics":[],"primaryLanguage":{"name":"Zeek","color":"#ccc"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":47,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-30T21:05:50.063Z"}},{"type":"Public","name":"zeek-scripts","owner":"CriticalPathSecurity","isFork":false,"description":"Bro Detection Scripts","allTopics":[],"primaryLanguage":{"name":"Zeek","color":"#ccc"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":6,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-03-09T16:37:29.162Z"}},{"type":"Public","name":"Suricata-Signatures","owner":"CriticalPathSecurity","isFork":false,"description":"Created or Collected Suricata Signatures for Public Use.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-16T20:45:37.465Z"}},{"type":"Public","name":"SecLists","owner":"CriticalPathSecurity","isFork":true,"description":"SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":23564,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-11T12:00:54.824Z"}},{"type":"Public","name":"bzar","owner":"CriticalPathSecurity","isFork":true,"description":"A set of Zeek scripts to detect ATT&CK techniques.","allTopics":[],"primaryLanguage":{"name":"Zeek","color":"#ccc"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":72,"license":"BSD 3-Clause \"New\" or \"Revised\" License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-11-09T17:57:53.452Z"}},{"type":"Public","name":"zeek-threat-intel-parser","owner":"CriticalPathSecurity","isFork":false,"description":"A Python3 utility for parsing input into a Zeek threat intelligence feed.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-04-24T18:41:06.982Z"}},{"type":"Public","name":"o365beat","owner":"CriticalPathSecurity","isFork":true,"description":"Elastic Beat for fetching and shipping Office 365 audit events","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":27,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-04T04:06:29.242Z"}},{"type":"Public","name":"physical-docs","owner":"CriticalPathSecurity","isFork":true,"description":"This is a collection of legal wording and documentation used for physical security assessments. The goal is to hopefully allow this as a template for other companies to use and to protect themselves when conducting physical security assessments.","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":104,"license":"The Unlicense","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-20T17:47:41.471Z"}},{"type":"Public","name":"nghttp2","owner":"CriticalPathSecurity","isFork":true,"description":"nghttp2 - HTTP/2 C Library and tools","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":860,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-04T19:27:27.524Z"}},{"type":"Public","name":"gsuite2mfe","owner":"CriticalPathSecurity","isFork":true,"description":"Send events from G Suite to McAfee SIEM","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":7,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-08-23T18:50:19.961Z"}},{"type":"Public","name":"bro-http2","owner":"CriticalPathSecurity","isFork":true,"description":"Plugin for Zeek/Bro which provides http2 decoder/analyzer","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":22,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-04-12T14:54:06.164Z"}},{"type":"Public","name":"ptf","owner":"CriticalPathSecurity","isFork":true,"description":"The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":1223,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-08-01T10:37:05.563Z"}}],"repositoryCount":17,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"CriticalPathSecurity repositories"}