{"payload":{"header_redesign_enabled":false,"results":[{"id":"397346691","archived":false,"color":"#f1e05a","followers":152,"has_funding_file":true,"hl_name":"qeeqbox/raven","hl_trunc_description":"Advanced Cyber Threat Map (Simplified, customizable, responsive and optimized)","language":"JavaScript","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":397346691,"name":"raven","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2023-08-08T22:27:58.231Z","has_issues":true}},"sponsorable":true,"topics":["visualization","world","attack","maps","raven","countries","threat-hunting","d3js","threat-intelligence","cyberattack"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483806852","archived":false,"color":null,"followers":11,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-sim-swapping","hl_trunc_description":"An adversary may utilize a sim swapping attack for defeating 2fa authentication","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483806852,"name":"two-factor-authentication-sim-swapping","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:59.852Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vulnerability","sim","2fa","swapping","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525165070","archived":false,"color":null,"followers":4,"has_funding_file":true,"hl_name":"qeeqbox/digital-forensics","hl_trunc_description":"Digital Forensics is the process of finding and analyzing electronic data","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525165070,"name":"digital-forensics","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:13:06.126Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","digital-forensics","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"485967347","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/vertical-privilege-escalation","hl_trunc_description":"A threat actor may perform unauthorized functions belonging to another user with a higher privileges level","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":485967347,"name":"vertical-privilege-escalation","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:26.187Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","vertical","vulnerability","escalation","privilege","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525548349","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/risk-management","hl_trunc_description":"Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525548349,"name":"risk-management","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:11.084Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","risk-management","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"525241914","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/cybersecurity","hl_trunc_description":"Cybersecurity is the measures taken to protect networks, devices, and data against cyberattacks","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":525241914,"name":"cybersecurity","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:12:36.614Z","has_issues":true}},"sponsorable":true,"topics":["visualization","cycle","cybersecurity","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"486443706","archived":false,"color":null,"followers":3,"has_funding_file":true,"hl_name":"qeeqbox/reflected-cross-site-scripting","hl_trunc_description":"A threat actor may inject malicious content into HTTP requests. The content will be reflected in the HTTP response and executed in the vi…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":486443706,"name":"reflected-cross-site-scripting","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:05:42.646Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","scripting","site","xss","vulnerability","cross","reflected","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"581602947","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/xxe-injection","hl_trunc_description":"A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's …","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":581602947,"name":"xxe-injection","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T00:58:42.372Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","xml","injection","vulnerability","xee","xxe","xxe-injection","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483342877","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/two-factor-authentication-brute-force","hl_trunc_description":"A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483342877,"name":"two-factor-authentication-brute-force","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:04:37.641Z","has_issues":true}},"sponsorable":true,"topics":["visualization","authentication","example","brute-force","vulnerability","2fa","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"483914393","archived":false,"color":null,"followers":2,"has_funding_file":true,"hl_name":"qeeqbox/session-fixation","hl_trunc_description":"A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain…","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":483914393,"name":"session-fixation","owner_id":54420737,"owner_login":"qeeqbox","updated_at":"2024-01-29T01:00:35.821Z","has_issues":true}},"sponsorable":true,"topics":["visualization","metadata","example","session","vulnerability","fixation","qeeqbox","infosecsimplified"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":2,"elapsed_millis":205,"errors":[],"result_count":19,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Avisualization%2Borg%253Aqeeqbox%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"csrf_tokens":{"/qeeqbox/raven/star":{"post":"LLL8FWQ9aAOo_dpdY-uBMLdakuEM6bjWv-LmrUJ1IsWIYCTusnag_JeXwfqyhPZBs0TBGRAndEmHOrVxNlYw5A"},"/qeeqbox/raven/unstar":{"post":"tm_Lgc8Z-83EkMm4cv-TFMXN7CLwTHw6EKEROYxflMozNoUJmoN0-lwyibKY8Pu8Mp9PapZRYTA-CPfo-E4VAw"},"/qeeqbox/two-factor-authentication-sim-swapping/star":{"post":"Ejot4ojq-gHcVUi_w7dnitADgRCFcKteLzcPptn343hp2NRMLKw7ZrD9tx4CLuBlEAf5dw32IMkf8B4m6VtFtw"},"/qeeqbox/two-factor-authentication-sim-swapping/unstar":{"post":"c1MaocjoKW-Wofvs0cRVyoNXLBMKm4B3lkGJxCohdzEQ3fsFBW6IOpNiBEaDUZmnoNhNlozY_bEW3JY-u16Azg"},"/qeeqbox/digital-forensics/star":{"post":"dqmIRq_wqeqbAVT1aWAeiXo2YR-tP6mpfE-ZXHFxV2QMLaDd1DlGQ7MWCVxWpi226kieePlCkpx6Zc7GBm11Hw"},"/qeeqbox/digital-forensics/unstar":{"post":"bDwghFcKYU1ukSc0-yvHA98-4IVwV4ImD5nr1iV812eeOAIw_NChntbDt7hQgyA7yYotfP91yCONsjXoY_mipA"},"/qeeqbox/vertical-privilege-escalation/star":{"post":"ZtL7Ohf-r2IPYcdToFgpqjIm2mR4iksaE_DcAT0bDYrJt8uH3PRgq4DE-st3S24PpOCTwIH4EjUw9kLlzBQ2Tw"},"/qeeqbox/vertical-privilege-escalation/unstar":{"post":"moP4Qr5_f64Zr5tl4vKt2_4aNGg4sis5r24e07vQD_1FsJAhgGc-PMbNCSR-3CinU8VDVU8TkuBwhg-aICcwSw"},"/qeeqbox/risk-management/star":{"post":"4qvE1g2CKdVB2iYTdA6rjtD97eTA296c1n7hKIfXSTP3J9BHlAcdhITpQMVwkaJnCC8LJoaBhGHQFedqe6DRVA"},"/qeeqbox/risk-management/unstar":{"post":"S_tU3PCflGcokNoA2aZBtZ5zHk9W3rCNcJtuY7aptMzGYpSyXsdjRlsEggzOluDT-DSzb_lXiUdCGr5UWjcvag"},"/qeeqbox/cybersecurity/star":{"post":"BeXEHse3y0IkF8RydcfVHBC2U1M9dsXXNccSopVrmwPKSgpfEWrSWncgk3HwzCpin3S4CC5fYv419_hTXXeK-w"},"/qeeqbox/cybersecurity/unstar":{"post":"o0HLw0WNqIilSvq5EDcSslFLEoIFbLaEPaHP1TE-O_KbcPk8JXdNK1sEt6a3xkPR6uX3x3ndIJ-0NJGSeXzN4A"},"/qeeqbox/reflected-cross-site-scripting/star":{"post":"zDoGXD_FZUWCswtgFUKdeEYmf-gf3uyuKBbnuw8th2ChyoVrybJi31px6CwTpMCDd5OM5yrCUSRAFlvl3pIV4w"},"/qeeqbox/reflected-cross-site-scripting/unstar":{"post":"WdyGtgDIM9Xrb93HMjweJSFril9Y0QJZ2eoQXoBodM47_WBArqQ_UnjZf3bvLojgpoiXxVuIoeudQLY94CyLjw"},"/qeeqbox/xxe-injection/star":{"post":"9kb4-7tcrEf572Kj55VfwVASa_4gie4dKUvkugo6STWeF7SbAxQglk-1rc30fe7FW-v2aIrFeUlLdjDDQmluPg"},"/qeeqbox/xxe-injection/unstar":{"post":"iSLJxrO7b2BFXOiD2AYo53VgVxRd5qcAD-Kzi__a1YDyYkBP4FTqOIplN8wDFlZt_MxdpMc6ZBAQLDeHNsX0ow"},"/qeeqbox/two-factor-authentication-brute-force/star":{"post":"7LWVSj8XgLYwrlrdDaPbDGCtfK8ITvrgwFdvA1uSiM1Jj9SDixkS44ydz4pU1kIyy67YzX0mx0kSHHjjGXlpYQ"},"/qeeqbox/two-factor-authentication-brute-force/unstar":{"post":"LxXDCkb3lI1ZKpdPkr2bAUfO64snTnwIxNjwJRLVjKM87xsKTDt8mUTiMYDcmZdpJu5A0MD57BQUBp-wZYgXEA"},"/qeeqbox/session-fixation/star":{"post":"GIlHQrza_8BsWkaIUBHNh7HL7FeT_vFnw43zHz-Mm50Yuch1LJdceVmPU7CXwkB-o-LyfReiuipazrJqU2dWrg"},"/qeeqbox/session-fixation/unstar":{"post":"oNsgUDsjn6VTraxvV4v0ZtrX82wRZPwbv4Nvb_qfERMpSfqn5uYm3n0Dot2jk-O8R1dH3EDO_pvGDrxmgIHS3Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"RDfRzpd2hY08Jtq6g63lmVV8z7r-LFqzt6wWmExVDAkKKQ8TSIJE6OAzhzigAG83GtK38GaQjyN_uC6FRtkk9g"}}},"title":"Repository search results"}