{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"Session-Hijacking-Visual-Exploitation","owner":"doyensec","isFork":false,"description":"Session Hijacking Visual Exploitation","allTopics":["xss","appsec","xss-exploitation","session-hijacking"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":3,"starsCount":185,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-07T09:15:03.514Z"}},{"type":"Public","name":"webext_boilerplate","owner":"doyensec","isFork":false,"description":"Web extension boilerplate files for web application testers.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":6,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-22T15:26:59.641Z"}},{"type":"Public","name":"electronegativity","owner":"doyensec","isFork":false,"description":"Electronegativity is a tool to identify misconfigurations and security anti-patterns in Electron applications.","allTopics":["electron","nodejs","security","electron-app"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":10,"starsCount":943,"forksCount":65,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-06-28T16:00:08.797Z"}},{"type":"Public","name":"request","owner":"doyensec","isFork":true,"description":"🏊🏾 Simplified HTTP request client.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":3144,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-05-04T05:25:35.396Z"}},{"type":"Public","name":"imagemagick-security-policy-evaluator","owner":"doyensec","isFork":false,"description":"The ImageMagick Security Policy Evaluator allows developers and security experts to check if an XML Security Policy is hardened against a wide set of malicious attacks. It assists with the process of reviewing such policies, which is usually a manual task, and helps identify the best practices for ImageMagick deployments. ","allTopics":["security","imagemagick","scanner","conversion","image-processing","converters","security-tools","security-policies"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":1,"starsCount":14,"forksCount":2,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-02-06T10:37:07.006Z"}},{"type":"Public","name":"Damn-Vulnerable-GraphQL-Application","owner":"doyensec","isFork":true,"description":"Damn Vulnerable GraphQL Application is an intentionally vulnerable implementation of Facebook's GraphQL technology, to learn and practice GraphQL Security.","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":285,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-15T23:24:17.013Z"}},{"type":"Public","name":"StandardizedImageProcessingTest","owner":"doyensec","isFork":false,"description":"A test suite built with Mocha/Chai to test for behavioral differences between image libraries for the web","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":68,"forksCount":11,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-05-07T07:57:35.815Z"}}],"repositoryCount":7,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"doyensec repositories"}