{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Micro8","owner":"vulnscan","isFork":true,"description":"Gitbook","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":6787,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-02-25T03:08:40.676Z"}},{"type":"Public","name":"routersploit","owner":"vulnscan","isFork":true,"description":"The Router Exploitation Framework","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":2310,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-11-13T20:00:09.833Z"}},{"type":"Public","name":"java_deserialization_exploits","owner":"vulnscan","isFork":true,"description":"A collection of Java Deserialization Exploits","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":220,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2017-01-20T02:44:51.505Z"}},{"type":"Public","name":"Censys-Maltego","owner":"vulnscan","isFork":true,"description":"Some Maltego transforms for Censys.io","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":4,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-07-03T11:24:19.523Z"}}],"repositoryCount":4,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"vulnscan repositories"}