{"payload":{"header_redesign_enabled":false,"results":[{"id":"339773808","archived":false,"color":"#3572A5","followers":265,"has_funding_file":true,"hl_name":"EntySec/HatSploit","hl_trunc_description":"Modular penetration testing platform that enables you to write, test, and execute exploit code.","language":"Python","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":339773808,"name":"HatSploit","owner_id":72795305,"owner_login":"EntySec","updated_at":"2024-05-19T01:02:21.337Z","has_issues":true}},"sponsorable":true,"topics":["android","python","windows","security","remote-control","exploit","exploits","infosec","post-exploitation","exploitation","exploitation-framework","payload","hacking-tool","privilege-escalation","exploit-database","windows-hacking","exploit-development","remote-access-tool","entysec"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":95,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AEntySec%252FHatSploit%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/EntySec/HatSploit/star":{"post":"uvhehQw_dGnlm2HZ65-ikh52sBuDOJ6yAhkXKkGre04bUsXkssu7wQ2jy4X_bUXOAq2UR5cPWapEBVEId0bt_A"},"/EntySec/HatSploit/unstar":{"post":"POVoS2OOBmSb1lpqBY8LL5WZzTvGBXXQGDyFpZpNPVTrJi66SsaG8W4A3LMcNjVR0PTqBitQkS7-NH_2Tc2Gcw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"8Dxn43M1jrCtSPYBagVjPnoUpUKFkX__WoMBim-3Xl0zL8KtieVf1rKROOAYxPBJjpr1MooDt5hBCIah6_e-pA"}}},"title":"Repository search results"}