{"id":26237746,"url":"https://github.com/base4security/buda","last_synced_at":"2025-03-13T05:29:08.063Z","repository":{"id":281661146,"uuid":"925844692","full_name":"Base4Security/BUDA","owner":"Base4Security","description":"Behavioral User-driven Deceptive Activities Framework","archived":false,"fork":false,"pushed_at":"2025-03-10T12:55:52.000Z","size":171,"stargazers_count":1,"open_issues_count":0,"forks_count":0,"subscribers_count":0,"default_branch":"main","last_synced_at":"2025-03-10T13:41:39.511Z","etag":null,"topics":["deception","deception-technology","deceptive-defense","deceptive-design","honeypot","honeytoken","network-security","open-source"],"latest_commit_sha":null,"homepage":"https://budaframework.readthedocs.io/en/latest/","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/Base4Security.png","metadata":{},"created_at":"2025-02-01T22:00:44.000Z","updated_at":"2025-03-10T13:23:12.000Z","dependencies_parsed_at":null,"dependency_job_id":"2f6cda7c-eb37-4cd8-beaa-3076b6aafb17","html_url":"https://github.com/Base4Security/BUDA","commit_stats":null,"previous_names":["base4security/buda"],"tags_count":null,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Base4Security%2FBUDA","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Base4Security%2FBUDA/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Base4Security%2FBUDA/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/Base4Security%2FBUDA/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/Base4Security","download_url":"https://codeload.github.com/Base4Security/BUDA/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":243349949,"owners_count":20276699,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["deception","deception-technology","deceptive-defense","deceptive-design","honeypot","honeytoken","network-security","open-source"],"created_at":"2025-03-13T05:29:07.466Z","updated_at":"2025-03-13T05:29:08.000Z","avatar_url":"https://github.com/Base4Security.png","language":"Python","readme":null,"funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbase4security%2Fbuda","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fbase4security%2Fbuda","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fbase4security%2Fbuda/lists"}