{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Pwnscan","owner":"pwn0sec","isFork":false,"description":"Shalfa is a simple tool that helps you with Extract URLs.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":2,"issueCount":0,"starsCount":9,"forksCount":2,"license":"GNU General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-23T00:19:29.677Z"}},{"type":"Public","name":"PwnXSS","owner":"pwn0sec","isFork":false,"description":"PwnXSS: Vulnerability (XSS) scanner exploit","allTopics":["xss-vulnerability","xss-scanner"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":3,"issueCount":9,"starsCount":712,"forksCount":136,"license":"MIT License","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-30T12:17:48.962Z"}},{"type":"Public","name":"PwnSSRF","owner":"pwn0sec","isFork":false,"description":"A Python based scanner to find potential SSRF parameters in a web application.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":71,"forksCount":25,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-12T00:16:12.906Z"}},{"type":"Public","name":"Starbucks-Checker","owner":"pwn0sec","isFork":false,"description":"Starbucks Account Checker 2021","allTopics":[],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":0,"starsCount":8,"forksCount":2,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-27T22:34:31.131Z"}},{"type":"Public","name":"PwnChecker","owner":"pwn0sec","isFork":false,"description":"Multi tool checker account validator 2020","allTopics":["checker","multi-tool","pwn-checker"],"primaryLanguage":{"name":"Shell","color":"#89e051"},"pullRequestCount":0,"issueCount":1,"starsCount":35,"forksCount":13,"license":null,"participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-06-12T08:50:47.000Z"}},{"type":"Public","name":"PwnGIT","owner":"pwn0sec","isFork":false,"description":"PwnGIT is a semi-automated, feedback-driven tool to empower users to rapidly search through troves of public data on GitHub for sensitive secrets.","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":14,"forksCount":7,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-12-17T14:38:53.494Z"}},{"type":"Public","name":"Pwn-Parameter","owner":"pwn0sec","isFork":false,"description":"Parameter findder exploitation using PHP","allTopics":[],"primaryLanguage":{"name":"PHP","color":"#4F5D95"},"pullRequestCount":0,"issueCount":0,"starsCount":10,"forksCount":7,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-19T15:51:31.669Z"}},{"type":"Public","name":"open-redir","owner":"pwn0sec","isFork":false,"description":"Open Redirect Vulnerability scanner (Pwn0sec-Project)","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":17,"forksCount":13,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-19T15:06:06.063Z"}},{"type":"Public","name":"R6-ESP","owner":"pwn0sec","isFork":false,"description":"Rainbow Six Siege (ESP-Menu)","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":4,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-18T21:57:03.692Z"}},{"type":"Public","name":"TslGame_Multi","owner":"pwn0sec","isFork":false,"description":"PlayerUnknowns Battlegrounds external multihack (trash code)","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":4,"license":"GNU General Public License v3.0","participation":[0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0,0],"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-03-05T20:56:14.445Z"}},{"type":"Public","name":"VAC-Bypass-Loader","owner":"pwn0sec","isFork":false,"description":"Loader for VAC Bypass written in C.","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-22T19:16:29.482Z"}},{"type":"Public","name":"VAC-Bypass","owner":"pwn0sec","isFork":false,"description":"Valve Anti-Cheat bypass written in C.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-22T19:14:12.227Z"}},{"type":"Public","name":"0x1-311019-codm","owner":"pwn0sec","isFork":false,"description":"COD Mobile - norecoil/spread/speed hack/fly/highview sit/highview","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":1,"starsCount":7,"forksCount":3,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-30T20:50:17.161Z"}}],"repositoryCount":13,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"pwn0sec repositories"}