{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"E2EDPS","owner":"Dark-Utilities","isFork":false,"description":"The research paper and implementation of the End To End Data Protection System","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-12T17:27:58.813Z"}},{"type":"Public","name":".github","owner":"Dark-Utilities","isFork":false,"description":"Your landing's github page","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-12T11:53:45.181Z"}},{"type":"Public","name":"The-Reverse-Lab","owner":"Dark-Utilities","isFork":false,"description":"Here you can find a list of malware that have been reversed or malicious website investigations made by us or by some contributors ","allTopics":["laboratory","reverse-engineering","cybersecurity"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":3,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-05-30T17:35:30.488Z"}},{"type":"Public","name":"The-Research-Lab","owner":"Dark-Utilities","isFork":false,"description":"Here you will be able to find a list of research paper made by our team or contributors","allTopics":["science","research","research-paper"],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-02-13T20:22:58.716Z"}}],"repositoryCount":4,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"Dark-Utilities repositories"}