{"payload":{"feedbackUrl":"https://github.com/orgs/community/discussions/53140","repo":{"id":660803913,"defaultBranch":"main","name":"Cyber-Security","ownerLogin":"Swaynee1","currentUserCanPush":false,"isFork":false,"isEmpty":false,"createdAt":"2023-06-30T22:24:37.000Z","ownerAvatar":"https://avatars.githubusercontent.com/u/138259577?v=4","public":true,"private":false,"isOrgOwned":false},"refInfo":{"name":"","listCacheKey":"v0:1688611385.0","currentOid":""},"activityList":{"items":[{"before":"ed16ca6817ed7f27e0a845c4f0a1e4ba6776ae35","after":"35ef5d99a51739cc3989f2dea53cf86e3811f671","ref":"refs/heads/main","pushedAt":"2023-07-01T15:41:22.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Update README.md","shortMessageHtmlLink":"Update README.md"}},{"before":"377d3a9ab9c91da21d6b5201e577be98681ad233","after":"ed16ca6817ed7f27e0a845c4f0a1e4ba6776ae35","ref":"refs/heads/main","pushedAt":"2023-07-01T15:39:16.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Anomaly Detection\n\nsimple and effective anomaly detection good to run with Threat Intelligence","shortMessageHtmlLink":"Anomaly Detection"}},{"before":"2b5150268eb314e3d5cdf565f7e7ea94ba50cceb","after":"377d3a9ab9c91da21d6b5201e577be98681ad233","ref":"refs/heads/main","pushedAt":"2023-07-01T14:18:07.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"IMPORTANT README","shortMessageHtmlLink":"IMPORTANT README"}},{"before":"f8fc9156797090b58faec07a59c0faa19a4356a2","after":"2b5150268eb314e3d5cdf565f7e7ea94ba50cceb","ref":"refs/heads/main","pushedAt":"2023-07-01T07:26:41.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Create Threat Intelligence READ ME","shortMessageHtmlLink":"Create Threat Intelligence READ ME"}},{"before":"2dfc75ed3be6cee632aca1bf785fb5fcb2f1390f","after":"f8fc9156797090b58faec07a59c0faa19a4356a2","ref":"refs/heads/main","pushedAt":"2023-07-01T07:15:50.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Create Indepth Threat Intelligence\n\nWhy did the threat intelligence API join GitHub?\r\n\r\nBecause it wanted to keep track of all the \"commits\" made by malicious indicators!","shortMessageHtmlLink":"Create Indepth Threat Intelligence"}},{"before":"ffe7b74656ffc8e49df09fef755fdf9b40bc820c","after":"2dfc75ed3be6cee632aca1bf785fb5fcb2f1390f","ref":"refs/heads/main","pushedAt":"2023-07-01T06:53:33.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Firewall READ ME","shortMessageHtmlLink":"Firewall READ ME"}},{"before":"933375b6aaae1adbbe4ac5734080d986447a5501","after":"ffe7b74656ffc8e49df09fef755fdf9b40bc820c","ref":"refs/heads/main","pushedAt":"2023-07-01T06:34:24.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"AES ALGO README","shortMessageHtmlLink":"AES ALGO README"}},{"before":"71fb649b98b22b067ff561671ce401f137b756a3","after":"933375b6aaae1adbbe4ac5734080d986447a5501","ref":"refs/heads/main","pushedAt":"2023-07-01T06:27:55.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Create AES Algorithm Image Encryption","shortMessageHtmlLink":"Create AES Algorithm Image Encryption"}},{"before":"32b3ccae7c0e13dd2b869eb5060cf3b4b37697a7","after":"71fb649b98b22b067ff561671ce401f137b756a3","ref":"refs/heads/main","pushedAt":"2023-07-01T06:21:01.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Create DataStreamFlux description","shortMessageHtmlLink":"Create DataStreamFlux description"}},{"before":"54e139729f33c65499397f63ba7d070b83faf2bf","after":"32b3ccae7c0e13dd2b869eb5060cf3b4b37697a7","ref":"refs/heads/main","pushedAt":"2023-07-01T06:14:42.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Create Concurrent Data Stream flux\n\nflowing-hash-map","shortMessageHtmlLink":"Create Concurrent Data Stream flux"}},{"before":"5e30b8fbb45882f1acb9d892157d94a5de6b4fe9","after":"54e139729f33c65499397f63ba7d070b83faf2bf","ref":"refs/heads/main","pushedAt":"2023-06-30T22:52:05.000Z","pushType":"push","commitsCount":1,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":" READ ME\n\nhow to use","shortMessageHtmlLink":" READ ME"}},{"before":null,"after":"5e30b8fbb45882f1acb9d892157d94a5de6b4fe9","ref":"refs/heads/main","pushedAt":"2023-06-30T22:38:46.000Z","pushType":"branch_creation","commitsCount":0,"pusher":{"login":"Swaynee1","name":"Swayne","path":"/Swaynee1","primaryAvatarUrl":"https://avatars.githubusercontent.com/u/138259577?s=80&v=4"},"commit":{"message":"Free firewall.\n\nprovided implements several security measures to enhance the protection of your server. It includes features like blocking common attack patterns, rate limiting, SYN flood protection, and port knocking. These are all valuable components of a robust firewall configuration.\r\n\r\nHowever, it's important to note that the effectiveness of a firewall depends on various factors, such as the specific requirements of your server...... Stay Safe","shortMessageHtmlLink":"Free firewall."}}],"hasNextPage":false,"hasPreviousPage":false,"activityType":"all","actor":null,"timePeriod":"all","sort":"DESC","perPage":30,"cursor":"Y3Vyc29yOnYyOpK7MjAyMy0wNy0wMVQxNTo0MToyMi4wMDAwMDBazwAAAANM2Wbf","startCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wNy0wMVQxNTo0MToyMi4wMDAwMDBazwAAAANM2Wbf","endCursor":"Y3Vyc29yOnYyOpK7MjAyMy0wNi0zMFQyMjozODo0Ni4wMDAwMDBazwAAAANMmSmB"}},"title":"Activity ยท Swaynee1/Cyber-Security"}