{"payload":{"header_redesign_enabled":false,"results":[{"id":"339773808","archived":false,"color":"#3572A5","followers":268,"has_funding_file":true,"hl_name":"EntySec/HatSploit","hl_trunc_description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","language":"Python","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":339773808,"name":"HatSploit","owner_id":72795305,"owner_login":"EntySec","updated_at":"2024-05-19T01:02:21.337Z","has_issues":true}},"sponsorable":false,"topics":["android","python","windows","security","remote-control","exploit","exploits","infosec","post-exploitation","exploitation","exploitation-framework","payload","hacking-tool","privilege-escalation","exploit-database","windows-hacking","exploit-development","remote-access-tool","entysec"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":67,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AEntySec%252FHatSploit%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/EntySec/HatSploit/star":{"post":"w6rOOhseh4P0y9HuejkzMRyfm-y7uZOA4k6QpHSEdqBj66NcUJrevGdDZz_MN_4x4AHjzNTVMu5jHVhPgF3y-A"},"/EntySec/HatSploit/unstar":{"post":"QvkDwyjKsj2QxHVNg3O-1CsFJPn3ovgri7u6LavBIC-s9XCeWkbNz0E4oV_DENXIFV5KPa0T7c0OGwtekvl0dQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"z3xo29J7slUk_5UP52Tpv-wUPq1K-Jv9LdQQ2tNJdZX0cGMRB0hY4KGT38sFJj03KqbLtuyfsP_4U0f3hzZSjg"}}},"title":"Repository search results"}