{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"cve","owner":"trickest","isFork":false,"description":"Gather and update all available and newest CVEs with their PoC.","allTopics":["security","exploit","hacking","penetration-testing","poc","vulnerability","infosec","pentesting","vulnerabilities","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","latest-cve","cve-poc"],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":1,"issueCount":14,"starsCount":6178,"forksCount":775,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-01T02:06:16.236Z"}},{"type":"Public","name":"inventory","owner":"trickest","isFork":false,"description":"Asset inventory of over 800 public bug bounty programs.","allTopics":["bug-bounty","fuzzing","recon","software-security","red-team","threat-intelligence","pentest-tool","osint-resources","osint-tool","bugbountytips","security","osint","hacking","penetration-testing","infosec","pentesting","bugbounty","security-tools","reconnaissance"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":1,"issueCount":4,"starsCount":1137,"forksCount":200,"license":"MIT License","participation":[297,238,227,243,227,179,223,232,146,0,0,0,0,0,0,0,1,0,1,0,63,0,0,0,0,4,29,39,40,36,31,38,27,28,37,32,37,26,206,168,385,377,391,309,426,403,481,376,415,337,110,278],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T18:43:10.243Z"}},{"type":"Public","name":"resolvers","owner":"trickest","isFork":false,"description":"The most exhaustive list of reliable DNS resolvers.","allTopics":["resolver","dns","security","network","cybersecurity","brute-force","bug-bounty","infosec","pentesting","resolvers","red-team","security-tool"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":2,"starsCount":603,"forksCount":64,"license":"MIT License","participation":[7,7,7,6,7,7,7,8,8,6,1,5,7,7,7,7,8,7,7,7,6,6,7,7,5,4,6,7,7,8,6,7,5,6,7,6,7,7,7,7,7,7,7,7,7,7,7,7,7,6,7,7],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T16:33:32.330Z"}},{"type":"Public","name":"wordlists","owner":"trickest","isFork":false,"description":"Real-world infosec wordlists, updated regularly","allTopics":["security","hacking","wordlist","penetration-testing","infosec","pentesting","bugbounty","wordlist-generator","content-discovery","reconnaissance","wordlists","directory-bruteforce","wordlists-dictionary-collection"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":1281,"forksCount":161,"license":"MIT License","participation":[22,23,22,22,21,15,15,15,14,13,1,12,14,15,15,14,15,15,14,15,17,17,15,15,11,8,14,15,15,15,16,23,16,21,23,25,22,21,21,24,22,22,22,22,22,21,23,23,22,22,21,20],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-31T12:50:38.757Z"}},{"type":"Public","name":"cloud","owner":"trickest","isFork":false,"description":"Monitoring the Cloud Landscape","allTopics":["security","cloud","osint","monitoring","penetration-testing","bug-bounty","pentesting","recon","red-team","security-tools","reconnaissance"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":2,"starsCount":67,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T01:04:20.163Z"}},{"type":"Public","name":"trickest-agent-init","owner":"trickest","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":1,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-08T14:28:58.528Z"}},{"type":"Public","name":"trickest-cli","owner":"trickest","isFork":false,"description":"Execute Trickest workflows right from your terminal","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":0,"starsCount":69,"forksCount":10,"license":"MIT License","participation":[0,0,0,0,0,0,3,2,0,0,0,0,0,0,0,3,3,2,2,0,0,8,22,0,0,9,2,6,4,2,0,4,2,0,4,2,0,5,2,2,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-07T15:23:28.744Z"}},{"type":"Public","name":"s5cmd","owner":"trickest","isFork":true,"description":"Parallel S3 and local filesystem execution tool.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":5,"forksCount":208,"license":"MIT License","participation":[0,2,1,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-11T10:32:34.649Z"}},{"type":"Public","name":"elasticsearch_index","owner":"trickest","isFork":false,"description":"Manage attack surface data on Elasticsearch","allTopics":["data","web-server","asm","penetration-testing","pentesting","recon","vulnerabilities","elastic","elasticsearch-client","security-tools","threat-intelligence","pentesting-tools","penetration-testing-tools","attack-surface-management"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":17,"forksCount":2,"license":"MIT License","participation":[0,0,0,0,2,0,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,4,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-20T17:49:43.758Z"}},{"type":"Public","name":"containers","owner":"trickest","isFork":false,"description":"Automated privilege escalation of the world's most popular Docker images.","allTopics":["security","exploit","containers","exploits","poc","vulnerability","infosec","pentesting","cve","security-tools","software-vulnerability","latest-cve"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":59,"forksCount":6,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,1,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:39:21.268Z"}},{"type":"Public","name":"dsieve","owner":"trickest","isFork":false,"description":"Filter and enrich a list of subdomains by level","allTopics":["security","subdomain","enumeration","penetration-testing","infosec","pentesting","bugbounty","subdomain-scanner","subdomain-enumeration","pentesting-tools","penetration-testing-tools","subdomain-finder","infosectools"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":1,"issueCount":0,"starsCount":183,"forksCount":25,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:39:02.548Z"}},{"type":"Public","name":"enumerepo","owner":"trickest","isFork":false,"description":"List all public repositories for (valid) GitHub usernames","allTopics":["security","osint","enumeration","penetration-testing","pentesting","recon","reconnaissance","github-user-search","pentesting-tools","github-repository-search","open-source-intelligence","github-osint","penetration-testing-tools"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":64,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:38:59.060Z"}},{"type":"Public","name":"github-logs","owner":"trickest","isFork":false,"description":"Extracting OSINT Insights from 15TB of GitHub Event Logs","allTopics":["github","github-api","security","osint","penetration-testing","event-log","pentesting","recon","red-team","github-events"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":62,"forksCount":8,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:37:26.818Z"}},{"type":"Public","name":"insiders","owner":"trickest","isFork":false,"description":"Archive of Potential Insider Threats","allTopics":["security","osint","assets","hacking","penetration-testing","infosec","pentesting","recon","bugbounty","red-team","security-tools","threat-intelligence","reconnaissance","osint-resources","github-recon","osint-tool","bugbountytips","bugbounty-tool"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":134,"forksCount":21,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:20:03.315Z"}},{"type":"Public","name":"mkpath","owner":"trickest","isFork":false,"description":"Make URL path combinations using a wordlist","allTopics":["security","enumeration","penetration-testing","fuzzing","pentesting","recon","reconnaissance","directory-bruteforce","pentesting-tools","penetration-testing-tools","bugbountytips","webappsecurity"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":168,"forksCount":26,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:57.655Z"}},{"type":"Public template","name":"recon-and-vulnerability-scanner-template","owner":"trickest","isFork":false,"description":"Create your own recon & vulnerability scanner with Trickest and GitHub","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":48,"forksCount":8,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:54.123Z"}},{"type":"Public","name":"mksub","owner":"trickest","isFork":false,"description":"Generate tens of thousands of subdomain combinations in a matter of seconds","allTopics":["security","penetration-testing","recon","security-tools","reconnaissance","subdomain-scanner","subdomain-enumeration","pentesting-tools","penetration-testing-tools","bugbountytips","subdomain-finder","infosectools","subdomain","enumeration","infosec","pentesting","bugbounty"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":245,"forksCount":25,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:50.485Z"}},{"type":"Public","name":"mgwls","owner":"trickest","isFork":false,"description":"Combine words from two wordlist files and concatenate them with an optional delimiter","allTopics":["security","enumeration","penetration-testing","fuzzing","pentesting","recon","reconnaissance","directory-bruteforce","pentesting-tools","penetration-testing-tools","web-app-security"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":1,"starsCount":34,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:48.565Z"}},{"type":"Public","name":"packages","owner":"trickest","isFork":false,"description":"Automated compromise detection of the world's most popular packages","allTopics":["security","package","packages","penetration-testing","infosec","pentesting","threat-hunting","python-packages","python-security","software-security","threat-analysis","threat-intelligence","compromise-detection"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":16,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:45.080Z"}},{"type":"Public","name":"find-gh-poc","owner":"trickest","isFork":false,"description":"Find CVE PoCs on GitHub","allTopics":["security","exploit","hacking","penetration-testing","poc","vulnerability","pentesting","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","penetration-testing-tools","latest-cve","cve-poc"],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":134,"forksCount":22,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:41.569Z"}},{"type":"Public","name":"safe-harbour","owner":"trickest","isFork":false,"description":"security.txt collection of most popular world-wide domains","allTopics":["security","automation","bug-bounty","bugbounty","automation-framework","hall-of-fame","ethical-hacking","security-automation","responsible-disclosure","security-txt","ethical-hacking-tools"],"primaryLanguage":null,"pullRequestCount":1,"issueCount":0,"starsCount":50,"forksCount":10,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:39.241Z"}},{"type":"Public","name":"zip","owner":"trickest","isFork":false,"description":"Monitoring the internet for new .zip domains","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":210,"forksCount":0,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-25T15:19:34.208Z"}},{"type":"Public","name":"action","owner":"trickest","isFork":false,"description":"Github Action for Trickest Workflows","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":1,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-25T16:00:58.105Z"}},{"type":"Public","name":"scripts","owner":"trickest","isFork":false,"description":"Handy scripts and one-liners to make life easier","allTopics":["bash","security","script","scripts","aliases","infosec","recon","scripts-collection","security-automation","security-tools","reconnaissance","one-liners","bugbountytips"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":33,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-06T07:48:57.588Z"}},{"type":"Public","name":"vault-k8s","owner":"trickest","isFork":true,"description":"First-class support for Vault and Kubernetes.","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":162,"license":"Mozilla Public License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-03-04T16:51:08.001Z"}},{"type":"Public","name":"log4j","owner":"trickest","isFork":false,"description":"Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.","allTopics":["security","exploit","log4j","hacking","penetration-testing","vulnerability","infosec","pentesting","vulnerabilities","bugbounty","cve","software-security","red-team","security-tools","software-vulnerability","software-vulnerabilities","log4shell"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":111,"forksCount":23,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-16T21:45:10.151Z"}}],"repositoryCount":26,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Repositories"}