{"payload":{"pageCount":1,"repositories":[{"type":"Public","name":"mig-t","owner":"stfbk","isFork":false,"description":"A web pentesting and compliance tool to help security testers automate their testing activites.","allTopics":["cybersecurity","penetration-testing","automated-testing","security-tools","burp-extensions","penetration-testing-tools"],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":1,"issueCount":4,"starsCount":4,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-09T13:11:25.125Z"}},{"type":"Public","name":"stfbk.github.io","owner":"stfbk","isFork":false,"description":"Website of the Security & Trust Research Unit, in Fondazione Bruno Kessler","allTopics":[],"primaryLanguage":{"name":"HTML","color":"#e34c26"},"pullRequestCount":0,"issueCount":0,"starsCount":4,"forksCount":18,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-09T10:24:07.174Z"}},{"type":"Public","name":"tlsassistant","owner":"stfbk","isFork":false,"description":"An open-source modular framework capable of identifying a wide range of TLS vulnerabilities and assessing compliance with multiple guidelines. Its actionable report can assist the user in correctly and easily fixing their configurations.","allTopics":["tls","hsts","nist","robot","https","crime","rc4","certificate-transparency","compliance","poodle","attack-trees","mitigations","breach","sloth","mitigation","drown","sweet32","3shake","bar-mitzvah","lucky13"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":39,"forksCount":11,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-09-09T08:04:25.126Z"}},{"type":"Public","name":"mig","owner":"stfbk","isFork":false,"description":"Micro-ID-Gym is a software suite designed to aid security researchers and developers in testing Identity Management protocols implementations","allTopics":["testing","oauth2","compliance","security-testing","security-compliance","penetration-testing-tools"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":1,"issueCount":0,"starsCount":2,"forksCount":4,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-08-29T13:27:47.185Z"}},{"type":"Public","name":"TLS-Scanner","owner":"stfbk","isFork":true,"description":"The TLS-Scanner Module from TLS-Attacker - based on @IvanValentini's work","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":39,"license":"Other","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-23T09:01:36.675Z"}},{"type":"Public","name":"tls-compliance-dataset","owner":"stfbk","isFork":false,"description":"A dataset containing TLS requirements to assess a webserver's compliance with national cybersecurity agencies","allTopics":["recommendations","tls","nist","mozilla","compliance","guidelines","agid","cipher-suites","bsi","anssi"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Creative Commons Attribution 4.0 International","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-07-13T00:28:14.142Z"}},{"type":"Public","name":"A-Secure-and-Quality-of-Service-Aware-Solution-for-the-End-to-End-Protection-of-IoT-Applications","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Kotlin","color":"#A97BFF"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-06-12T09:46:30.442Z"}},{"type":"Public","name":"mqttsa","owner":"stfbk","isFork":false,"description":"A tool to assist IoT developers in securing MQTT-based IoT deployments","allTopics":["mqtt","security"],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":40,"forksCount":8,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-03-26T09:32:28.054Z"}},{"type":"Public","name":"CryptoAC","owner":"stfbk","isFork":false,"description":"CryptoAC is an open-source tool for the E2E protection of sensitive data through cryptographic enforcement of access control policies.","allTopics":["open-source","cryptography","security"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":0,"issueCount":0,"starsCount":2,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-17T15:42:24.712Z"}},{"type":"Public","name":"micro-id-gym","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":19,"issueCount":1,"starsCount":4,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-16T13:42:32.635Z"}},{"type":"Public","name":"tls-table","owner":"stfbk","isFork":true,"description":"Generates mappings between IANA TLS hex values and their corresponding cipher names in GnuTLS, NSS, and OpenSSL","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":11,"license":"Mozilla Public License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-11T13:06:19.866Z"}},{"type":"Public","name":"ACME","owner":"stfbk","isFork":false,"description":"Access Control Mechanisms Evaluator","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2024-01-10T11:32:34.882Z"}},{"type":"Public","name":"ACE","owner":"stfbk","isFork":false,"description":"AC state-change rule extraction procedurE","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-11-05T10:23:30.809Z"}},{"type":"Public","name":".github","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-10-10T09:00:52.055Z"}},{"type":"Public","name":"TDSC2022_SymbolicAnalysis","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"ReScript","color":"#ed5051"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":1,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2023-04-20T12:14:59.265Z"}},{"type":"Public","name":"pullprinting","owner":"stfbk","isFork":false,"description":"Pullprinting project developed in Security&Trust in FBK","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":6,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-22T13:17:55.368Z"}},{"type":"Public","name":"vc-saml-node","owner":"stfbk","isFork":false,"description":"Verifiable Credentials issued and verified by SAML service providers -- a proof of concept implementation","allTopics":["saml2","eidas","verifiable-credentials"],"primaryLanguage":{"name":"JavaScript","color":"#f1e05a"},"pullRequestCount":22,"issueCount":0,"starsCount":2,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-13T05:39:33.994Z"}},{"type":"Public","name":"AuBACE","owner":"stfbk","isFork":false,"description":"Audit-Based Access Control Enforcement (AuBACE) is a DLT-oriented framework to support controlled information sharing","allTopics":[],"primaryLanguage":{"name":"Go","color":"#00ADD8"},"pullRequestCount":4,"issueCount":0,"starsCount":0,"forksCount":0,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-12-11T00:09:21.063Z"}},{"type":"Public","name":"Mitigating-Debugger-based-Attacks-to-Java-Applications-with-Self-Debugging","owner":"stfbk","isFork":false,"description":"This repository collects complementary material for the article \"Mitigating Debugger-based Attacks to Java Applications with Self-Debugging\".","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-05-06T07:09:52.917Z"}},{"type":"Public","name":"MSRMP","owner":"stfbk","isFork":false,"description":"Multi-Stakeholder Risk Assessment Tool","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2022-01-12T14:22:35.163Z"}},{"type":"Public archive","name":"SECRYPT2021","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-05-19T09:32:14.652Z"}},{"type":"Public","name":"mallodroid","owner":"stfbk","isFork":true,"description":"Find broken SSL certificate validation in Android Apps","allTopics":[],"primaryLanguage":{"name":"Python","color":"#3572A5"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":31,"license":"GNU Lesser General Public License v3.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2021-05-13T15:13:27.210Z"}},{"type":"Public","name":"mIDAssistant_iGov","owner":"stfbk","isFork":false,"description":"An Android Studio Plugin to Integrate OpenID Connect iGov Profile within Native Apps","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-18T08:14:20.550Z"}},{"type":"Public","name":"mIDAssistant","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Java","color":"#b07219"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-09-15T12:47:23.613Z"}},{"type":"Public archive","name":"CODASPY2020_FormalAnalysis","owner":"stfbk","isFork":false,"description":"This repository contains the complementary files referred to in the paper \"The Good, the Bad and the (Not So) Ugly of Out-Of-Band Authentication with eID Cards and Push Notifications: Design, Formal and Risk Analysis\", accepted to the 10th ACM Conference on Data and Application Security and Privacy (CODASPY ‘20).","allTopics":[],"primaryLanguage":null,"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2020-01-09T15:58:11.728Z"}},{"type":"Public archive","name":"i2cns-19","owner":"stfbk","isFork":false,"description":"","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":0,"issueCount":0,"starsCount":1,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-11-25T11:55:06.266Z"}},{"type":"Public archive","name":"socrates-replication-package","owner":"stfbk","isFork":false,"description":"SoCRATES is framework for Ethereum Smart Contract test cases generation","allTopics":[],"primaryLanguage":{"name":"Jupyter Notebook","color":"#DA5B0B"},"pullRequestCount":2,"issueCount":0,"starsCount":0,"forksCount":1,"license":"Apache License 2.0","participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-10-25T12:03:59.078Z"}},{"type":"Public","name":"ITOTLab","owner":"stfbk","isFork":false,"description":"An open and flexible cybersecurity training laboratory in IT/OT infrastructures","allTopics":[],"primaryLanguage":{"name":"C++","color":"#f34b7d"},"pullRequestCount":0,"issueCount":0,"starsCount":0,"forksCount":0,"license":null,"participation":null,"lastUpdated":{"hasBeenPushedTo":true,"timestamp":"2019-09-04T23:09:42.376Z"}}],"repositoryCount":28,"userInfo":null,"searchable":true,"definitions":[],"typeFilters":[{"id":"all","text":"All"},{"id":"public","text":"Public"},{"id":"source","text":"Sources"},{"id":"fork","text":"Forks"},{"id":"archived","text":"Archived"},{"id":"template","text":"Templates"}],"compactMode":false},"title":"stfbk repositories"}