{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"killerbee","owner":"riverloopsec","isFork":false,"description":"IEEE 802.15.4/ZigBee Security Research Toolkit","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":6,"issueCount":24,"starsCount":755,"forksCount":215,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-09-12T09:39:25.130Z"}},{"type":"Public","name":"hashashin","owner":"riverloopsec","isFork":false,"description":"Hashashin: A Fuzzy Matching Tool for Binary Ninja","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":1,"starsCount":87,"forksCount":7,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-08-25T18:02:45.716Z"}},{"type":"Public","name":"dockerfiles","owner":"riverloopsec","isFork":false,"description":"Assorted Dockerfiles for public use.","allTopics":[],"primaryLanguage":{"name":"Dockerfile","color":"#384d54"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-02-22T18:01:46.663Z"}},{"type":"Public","name":"ninjadiff","owner":"riverloopsec","isFork":false,"description":"NinjaDiff is a binary diffing plugin for Binary Ninja. Read more on our blog, and contribute code & improvements!","allTopics":["reverse-engineering","binary-analysis","graph-analysis","binaryninja-plugin"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":57,"forksCount":2,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-11-24T16:59:28.638Z"}},{"type":"Public","name":"flash-bash","owner":"riverloopsec","isFork":false,"description":"Flash-BASH is a Raspberry Pi based tool that uses a multiplexer to \"glitch\" a target device into a privileged open state.","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":1,"starsCount":22,"forksCount":5,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-09-02T17:57:48.554Z"}},{"type":"Public","name":"umap","owner":"riverloopsec","isFork":true,"description":"The USB host security assessment tool","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":60,"license":"GNU Affero General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-07-27T12:39:01.655Z"}},{"type":"Public","name":"beekeeperwids","owner":"riverloopsec","isFork":false,"description":"A IEEE 802.15.4 Wireless Intrusion Detection System, Using the KillerBee Framework","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":37,"forksCount":9,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-01T11:31:47.885Z"}},{"type":"Public","name":"kaitai_struct_formats","owner":"riverloopsec","isFork":true,"description":"Kaitai Struct: library of binary file formats (.ksy)","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":202,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-07-06T16:23:09.035Z"}},{"type":"Public","name":"banned-h-embedded","owner":"riverloopsec","isFork":false,"description":"An embedded-focused banned.h / strsafe variant intended to assist for Secure Software Development Lifecycle for Embedded Developers","allTopics":[],"primaryLanguage":{"name":"C","color":"#555555"},"pullRequestCount":0,"issueCount":0,"starsCount":12,"forksCount":3,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-07-30T20:48:18.165Z"}},{"type":"Public","name":"tumblerf","owner":"riverloopsec","isFork":false,"description":"tumbleRF: a unified fuzzing framework for low-level RF and HW protocol/PHY/MAC analysis","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":1,"starsCount":156,"forksCount":24,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2018-03-15T19:07:35.914Z"}},{"type":"Public","name":"killerbee-kali","owner":"riverloopsec","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2016-01-16T19:19:27.761Z"}},{"type":"Public","name":"apimote","owner":"riverloopsec","isFork":false,"description":"ApiMote IEEE 802.15.4/ZigBee Sniffing Hardware","allTopics":[],"primaryLanguage":{"name":"IDL","color":"#a3522f"},"pullRequestCount":0,"issueCount":1,"starsCount":82,"forksCount":15,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2014-06-01T17:50:31.316Z"}}],"repositoryCount":12,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"riverloopsec repositories"}