{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"SOC-Interview-Questions","owner":"LetsDefend","isFork":false,"description":"SOC Interview Questions","allTopics":[],"primaryLanguage":null,"pullRequestCount":2,"issueCount":6,"starsCount":989,"forksCount":146,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,2,0,0,0,0,0,0,0,0,2,0,0,0,2,2,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-18T07:33:53.460Z"}},{"type":"Public","name":"incident-response-playbooks","owner":"LetsDefend","isFork":false,"description":"","allTopics":["security","incident-response","security-playbooks"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":148,"forksCount":28,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-11T17:22:21.742Z"}},{"type":"Public","name":"Cybersecurity-Black-Friday","owner":"LetsDefend","isFork":false,"description":"Cybersecurity Black Friday Deals repository! 🛡️🎁","allTopics":["cybersecurity","blackfriday","black-friday"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":38,"forksCount":6,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-23T11:02:30.552Z"}},{"type":"Public","name":"awesome-soc-analyst","owner":"LetsDefend","isFork":false,"description":"Useful resources for SOC Analyst and SOC Analyst candidates.","allTopics":["security","cybersecurity","awesome-list","soc-analyst"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":555,"forksCount":97,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-28T07:02:05.813Z"}},{"type":"Public","name":"Blue-Team-Community","owner":"LetsDefend","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":16,"starsCount":35,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-03-06T11:23:12.290Z"}},{"type":"Public","name":"Phishing-Email-Analysis","owner":"LetsDefend","isFork":false,"description":"Useful resources about phishing email analysis","allTopics":["security","phishing","phishing-detection"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":76,"forksCount":11,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-12T10:36:46.896Z"}}],"repositoryCount":6,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"LetsDefend repositories"}