{"payload":{"header_redesign_enabled":false,"results":[{"id":"483806852","archived":false,"color":null,"followers":11,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-swapping","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483806852,"name":"two-factor-authentication-sim-swapping","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:59.852Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vulnerability","sim","2fa","swapping","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"517132939","archived":false,"color":null,"followers":9,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-cloning","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":517132939,"name":"two-factor-authentication-sim-cloning","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:41.229Z","has_issues":true}},"sponsorable":true,"topics":["vulnerability","bypass","2factor","qeeqbox","infosecsimplified","authintacation"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525646685","archived":false,"color":null,"followers":8,"has_funding_file":true,"hl_name":"qeeqbox/threat-intelligence","hl_trunc_description":"Threat intelligence or Cyber Threat Intelligence is the process of identifying and analyzing gathered information about past, current, an…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525646685,"name":"threat-intelligence","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-02-18T18:01:28.257Z","has_issues":true}},"sponsorable":true,"topics":["cycle","threat-intelligence","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"527675909","archived":false,"color":null,"followers":5,"has_funding_file":true,"hl_name":"qeeqbox/cyber-kill-chain","hl_trunc_description":"Cyber Kill Chain is a model that Lockheed Martin created for understanding (Describe the sequence of events) and stopping cyberattacks","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":527675909,"name":"cyber-kill-chain","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:14:19.840Z","has_issues":true}},"sponsorable":true,"topics":["chain","lifecycle","kill","cyberattack","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486722717","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/stored-cross-site-scripting","hl_trunc_description":"An adversary may inject malicious content into a vulnerable target","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486722717,"name":"stored-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:01:03.812Z","has_issues":true}},"sponsorable":true,"topics":["metadata","example","stored","scripting","site","vulnerability","xss-vulnerability","cross","visulization","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525129051","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/incident-response","hl_trunc_description":"Incident response is a set of steps that are used to handle the aftermath of a data breach or cyberattack","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525129051,"name":"incident-response","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:08:17.770Z","has_issues":true}},"sponsorable":true,"topics":["incident-response","cycle","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525165070","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/digital-forensics","hl_trunc_description":"Digital Forensics is the process of finding and analyzing electronic data","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525165070,"name":"digital-forensics","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:06.126Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","digital-forensics","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486443706","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/reflected-cross-site-scripting","hl_trunc_description":"A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the vi…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486443706,"name":"reflected-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:42.646Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","scripting","site","xss","vulnerability","cross","reflected","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"485967347","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/vertical-privilege-escalation","hl_trunc_description":"A threat actor may perform unauthorized functions belonging to another user with a higher privileges level","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":485967347,"name":"vertical-privilege-escalation","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:26.187Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vertical","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486839456","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/directory-listing","hl_trunc_description":"A threat actor may list files on a misconfigured server","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486839456,"name":"directory-listing","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:58.160Z","has_issues":true}},"sponsorable":true,"topics":["directory","listing","vulnerability","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":5,"elapsed_millis":212,"errors":[],"result_count":44,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Aqeeqbox%2Borg%253Aqeeqbox%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"csrf_tokens":{"/qeeqbox/two-factor-authentication-sim-swapping/star":{"post":"26C0n6vAV0zKMiDpjcLJfWkgMbAGqM-DfHATOnDVSLNoDHaBf3BHGZAtySTXPmrs7W3lqDfPiopVKP9MV8EILw"},"/qeeqbox/two-factor-authentication-sim-swapping/unstar":{"post":"zxQhAfpPjQD7d6sp5E5q1sotnRrv8Oij6F752D6joMPJnIDBYeZ5UvCj02PFv5sJtv-fkpsyaCcol5j-GHYC_Q"},"/qeeqbox/two-factor-authentication-sim-cloning/star":{"post":"vEqJuOc_DjUVROjE4WaGN4tEcJEUSbB-OCFqchhybzxZiBPY3i3IHmBP01-jX8mp9wqua3cgWWLNCztvidAQ1A"},"/qeeqbox/two-factor-authentication-sim-cloning/unstar":{"post":"VVlHerEuag4lyZkw6D4b14p3O4ckVf99jhPLt3W-GXnwJbIMWDysFkBmHhXGemk4V-D2OflfSpwFolFwycPGMA"},"/qeeqbox/threat-intelligence/star":{"post":"qgUCYq4xUnRgqePWY1IPLog1ee7mOrxmDPuUq7hHvfXwH19URXMaAOe5nGAOVPlEP6YXJ6dAde_Udtct6czISg"},"/qeeqbox/threat-intelligence/unstar":{"post":"4CuYuLRaV_BuzS0pp7ZpbyDRxEyb3HGg5GzrxpaboUiROAnzOucD6HZHtUOIiWEx0iKa1lJr076X5WA6GjL7lA"},"/qeeqbox/cyber-kill-chain/star":{"post":"dArjF8M53iRp_6GMbRg6UUu7_kUWeOcyaQjAEhWEYIxx6JsqLgXekvuB0X5ZqiokqfDuN6kI8M3SMpHFaVLMlw"},"/qeeqbox/cyber-kill-chain/unstar":{"post":"V_V_1NgvhKMrcDgt9_QErwEzkcrBmYlL-6HCMrzBUtH2IMGkeO_Xf_px9j7attdi4m7ERj7b2eCC569fLsGq5Q"},"/qeeqbox/stored-cross-site-scripting/star":{"post":"oLNfpRxHxNgygeed1Nbiyq8-FiOZy5hiYhUoTFy0SGSTOvdCnCNAEjj94JnBj2RaOM-dKW0aDD43nhplStoqww"},"/qeeqbox/stored-cross-site-scripting/unstar":{"post":"zXy1ZRiXORK4AI14Di8AQ7N8E-F97M0pgP1l5teHXljTq5SXjLxK5vjirHeFZS1swaUbmwR0af2He7Z4cgtp3w"},"/qeeqbox/incident-response/star":{"post":"xy6EkebCwaSO8rBI_pbLWuI7SZ62UxUn15gz5OXPMoaQoadaNqjPMnPuAOF-dS0e5wQUyz6_QVTtGbilH0wEcQ"},"/qeeqbox/incident-response/unstar":{"post":"A8_jsgIetpYvzwvb41vWEtTL3EQkenfO_sRWC6FDrfj7eJYaa9fNwBR-WxP6fbUyhEc0iZDDvBp-suiKH-sr3Q"},"/qeeqbox/digital-forensics/star":{"post":"ZzImUc1A6r1M2kV8JtxhrDuOo2rpKyHDc-iBuuEL21HnHX94mRjxAHq0fSc233o2ZVn2vW8xgl4hY8FSCsfLXw"},"/qeeqbox/digital-forensics/unstar":{"post":"zo0Nia34tc1FmERPaDzzpSUwSszgCkyu61lRXah3E4PIN_6QwOzcmisuw9QpegYKnRSROeP2D0OlxaFufgmYYg"},"/qeeqbox/reflected-cross-site-scripting/star":{"post":"qdWaQkpKrTNIKs2yiGt_SP4szc_hEsNT1iQP8P9rOhPHZiNMSE9UD_N6YtH1JenhxQ7m5eW8_p7joLyCWKDQ9A"},"/qeeqbox/reflected-cross-site-scripting/unstar":{"post":"JZrWi7Ap_SWI0PDUlPgAJ7WkgoaTx2O3FtC9bED1VcJMqWoQjk32L21YyPZFKSB2IsIx6tf0JllpnNyhZQz59Q"},"/qeeqbox/vertical-privilege-escalation/star":{"post":"L_DvcQiLMpN31wqh4JAtPz1R8_yJjkudndG1CIuylpvFDygokMv8GVhAwBgh2EQlOgjjNN_dO0QJdjGQ8sxoDg"},"/qeeqbox/vertical-privilege-escalation/unstar":{"post":"i1VTh9iL_DqvFdMzIszEfyTx8bRZKgNZ9BWnfSTx-cEtlDNUjMxCRn_qhx-cSyfCBgYiZC3T56tb4mLcr0f-zw"},"/qeeqbox/directory-listing/star":{"post":"DK7Aw80tA2kwCSiGQUR8vmh0xVWF1ngr1vXkO7AbtsEfY84E8Q_dDy3JsObw9rxHDL8Fu_FwBJU5rJTfJsaAmg"},"/qeeqbox/directory-listing/unstar":{"post":"ZgttT6ZOZGTo8fTnJV6pz7W2O8sB3mxoHZWUOGFYDggdj2u3cCPVdlIdzLSfOCuQ88y8zzMUn7l6oy6Ihvx-cg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"zQkMgCiyDSkmMs5y6GRcjqDScggFyoq7Ezt7tmYuMcWqhkmt_LcA1GslWLB4jE-i_EtV4jyw5i7Dha_MEoASPw"}}},"title":"Repository search results"}