{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"MDE_Enum","owner":"0xsp-SRD","isFork":false,"description":"comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reduction (ASR) rules without Admin privileges","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":193,"forksCount":16,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-10T18:40:27.202Z"}},{"type":"Public","name":"0xsp.com","owner":"0xsp-SRD","isFork":false,"description":"a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab ","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":55,"forksCount":14,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-04-15T20:39:48.007Z"}},{"type":"Public","name":"callback_injection-Csharp","owner":"0xsp-SRD","isFork":false,"description":"this repo is to cover the other undocumented or published / in different langaue to achieve shellcode injection via windows callback functions ","allTopics":[],"primaryLanguage":{"name":"C#","color":"#178600"},"pullRequestCount":0,"issueCount":0,"starsCount":81,"forksCount":12,"license":"MIT License","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-06-24T10:19:09.653Z"}}],"repositoryCount":3,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"0xsp-SRD repositories"}