{"payload":{"header_redesign_enabled":false,"results":[{"id":"397346691","archived":false,"color":"#f1e05a","followers":154,"has_funding_file":true,"hl_name":"qeeqbox/raven","hl_trunc_description":"Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)","language":"JavaScript","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":397346691,"name":"raven","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2023-08-08T22:27:58.231Z","has_issues":true}},"sponsorable":true,"topics":["visualization","world","attack","maps","raven","countries","threat-hunting","d3js","threat-intelligence","cyberattack"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483806852","archived":false,"color":null,"followers":11,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-swapping","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483806852,"name":"two-factor-authentication-sim-swapping","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:59.852Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vulnerability","sim","2fa","swapping","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525165070","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/digital-forensics","hl_trunc_description":"Digital Forensics is the process of finding and analyzing electronic data","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525165070,"name":"digital-forensics","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:06.126Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","digital-forensics","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"485967347","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/vertical-privilege-escalation","hl_trunc_description":"A threat actor may perform unauthorized functions belonging to another user with a higher privileges level","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":485967347,"name":"vertical-privilege-escalation","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:26.187Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vertical","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525241914","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/cybersecurity","hl_trunc_description":"Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525241914,"name":"cybersecurity","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:12:36.614Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","cybersecurity","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525548349","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/risk-management","hl_trunc_description":"Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525548349,"name":"risk-management","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:11.084Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","risk-management","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486443706","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/reflected-cross-site-scripting","hl_trunc_description":"A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the vi…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486443706,"name":"reflected-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:42.646Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","scripting","site","xss","vulnerability","cross","reflected","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"581602947","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/xxe-injection","hl_trunc_description":"A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's …","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":581602947,"name":"xxe-injection","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T00:58:42.372Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","xml","injection","vulnerability","xee","xxe","xxe-injection","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483799156","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/credential-stuffing","hl_trunc_description":"A threat actor may guess the target credentials using a known username and password pairs gathered from previous brute-force attacks","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483799156,"name":"credential-stuffing","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:06:15.155Z","has_issues":true}},"sponsorable":true,"topics":["visualization","credentials","example","vulnerability","metadta","stuffing","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483342877","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-brute-force","hl_trunc_description":"A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483342877,"name":"two-factor-authentication-brute-force","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:04:37.641Z","has_issues":true}},"sponsorable":true,"topics":["visualization","authentication","example","brute-force","vulnerability","2fa","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":2,"elapsed_millis":200,"errors":[],"result_count":19,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Avisualization%2Borg%253Aqeeqbox%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"csrf_tokens":{"/qeeqbox/raven/star":{"post":"ZRUJE8wECIX7K_Iildu5ufmdq3ZUbtzxmBWV0_QIf4yAKL9yE33fM4QqgW_voik4U6u7-kKzJkMjSRtB_jN58A"},"/qeeqbox/raven/unstar":{"post":"DqD7Q3BEBhQzN9Z3reuoUCjW2YycgxWJOwiTrHTC0ocTIZgnBlom3WPwxr-ihYhqIzU5meJje854FhPRdqvruQ"},"/qeeqbox/two-factor-authentication-sim-swapping/star":{"post":"2cQ6DOUCL_pCE9_QspSfJcyjoaKbiepjiwVEd-MKfgVnuDWCOdL4bTh_HBFYOt3dgkk_uE9yOz2869oJytydDQ"},"/qeeqbox/two-factor-authentication-sim-swapping/unstar":{"post":"GlBzO6tehmjPaTNCzq3ob5hAZy_39BBGXxRXVTxOi7regf6mTdQcAbgmNQp1mMNCaeZuIFujJumocB6-Z7R3Yw"},"/qeeqbox/digital-forensics/star":{"post":"eWXh1P_3ypbyVLRwHNmanlPUBwKx5rbP2CL9GruarqM96xYDs5OWAwYPgFEIXXXJcl88ciJq3G-QNS-NzlCHGg"},"/qeeqbox/digital-forensics/unstar":{"post":"ResEun5_DBH-CzMrn4H8VDzymYpZa-cRavFpAJK3z-v-lCMqwLKnZjq7dC9sPijteKv74y-3N3CjHMBe55wOoA"},"/qeeqbox/vertical-privilege-escalation/star":{"post":"AWugLqwcCvcXnpIAhoRMSlPrgh_kXhaR0LZUcLkCia1pTeDpWQb6UfnovX2ndYzB6JbgyHNrC0PeKWkFJJUDBg"},"/qeeqbox/vertical-privilege-escalation/unstar":{"post":"6LXnc33rPHkM_hE3aJgXp8aGQohKvokNs6JgAJjKqqjvsG-iX27ocrJippZ6Ny8wxEW9uXbSZTr0b3kYIzsm5A"},"/qeeqbox/cybersecurity/star":{"post":"9AxZ_0Zy-9ikwM7DWBxKBiVjG2ILxPM6BEz-w83jV7SUZsPqxPzdMz30EpEQOY4YCAbxC0U4w3fnyBm7qnpe8A"},"/qeeqbox/cybersecurity/unstar":{"post":"1DhJyLZBkNpyOpXo8saA7X1jX8WivHw61Rheb8xpc2MhW5VcigG_sa7TJPn5QdsU8Aa0UcrQVdL-IQjoEJ_IkA"},"/qeeqbox/risk-management/star":{"post":"eUSbQXH_H3cWYIbQpcW2SkLKT71iVnAJXlQT5Rqo81mtJT53bhNNBrjYBiI2s6VZla6TqulMqXmv8Nes4ODKzA"},"/qeeqbox/risk-management/unstar":{"post":"ANjYqQ__jkCcbfKkFxwE-WcgBP6kwc2wtbeT9BZ_l2HbI3RfKyMMbYd4PF6BvZawzk-Qe4A8sRy7KB_6cD_Sqw"},"/qeeqbox/reflected-cross-site-scripting/star":{"post":"epQiM76Z2-vdnONrniOfStflAMAQj0qvaXAEajta_Z8nXGtIE6-0ZA83qVpSQDXRk2Y1YW-j47ipf8sBqJyRYQ"},"/qeeqbox/reflected-cross-site-scripting/unstar":{"post":"ad7Lww0qoRU8fuVONE82m6MXfo9GTUso9kTLK1sPDClSyyOaUJLtqwlrBH3fp1b3B2Ep47XBh33gskcuZCj5tA"},"/qeeqbox/xxe-injection/star":{"post":"smsCWPx_VU7hf_DqxJiHduTWN36xgFl9hIby-qyN1T5wfMv5NKoUHa25tLclN3p9w9lBLpF4Cc8hXpIWThNWKA"},"/qeeqbox/xxe-injection/unstar":{"post":"kmFxm0Blzw97CPuMiyXvxcpHdbXZOOoApDSl7By23xoH6Q895SlB8meyOiCNnNe9yK_aCSGtZ_y5191kj8NCBA"},"/qeeqbox/credential-stuffing/star":{"post":"nQ8U54tmBlpG8Y5IcKUppYThlE4FuPX6xAQq9yCD1lVmI_be9D7wz122y9KjweuJPBkejh_2L7p1jrwWcHGvpA"},"/qeeqbox/credential-stuffing/unstar":{"post":"p8--RUtJYnBDfEWBGVVyb923dTPOvUQ44Uzm2zJvrKYnzlbEgkNDPXsAcXlFQWKV-aB1PUmZNfnU9Qu354iUFQ"},"/qeeqbox/two-factor-authentication-brute-force/star":{"post":"jkAMyitv97cOresMYNEQGXFkrP9FmsduHKQ8hqCxGKnRkh_I_RiG3gKqmfGXkh-9UQoxX-Hey7wdaFWJP_fIcg"},"/qeeqbox/two-factor-authentication-brute-force/unstar":{"post":"wphYsacCNHgM3OvFlElEROglG9b0mFOTyhLhSxPoDxcBZ-1xFzSCCWAGGIEcGsuOpEZwwpMsW-6pWPpDfC7sFg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"l57rXSEM8nR3EUodSyV2ZYNXhAUf3mMAvrrhRqqDNwlxUTV_5NBIfyhqkso2lbf8WanMdj86896vBf5mdwbXvw"}}},"title":"Repository search results"}