{"payload":{"header_redesign_enabled":false,"results":[{"id":"257015859","archived":false,"color":"#3572A5","followers":192,"has_funding_file":false,"hl_name":"VainlyStrain/Vailyn","hl_trunc_description":"A phased, evasive Path Traversal + LFI scanning & exploitation tool in Python","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":257015859,"name":"Vailyn","owner_id":51248447,"owner_login":"VainlyStrain","updated_at":"2021-09-25T19:19:03.790Z","has_issues":true}},"sponsorable":false,"topics":["security","penetration-testing","rce","pentesting","exploitation","information-leak","vulnerability-detection","takeover","vulnerability-scanners","vulnerability-assessment","lfi","directory-traversal","websecurity","pentest-tool","websec","lfi-exploitation","local-file-inclusion","path-traversal","lfi-shells","filter-evasion"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":72,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AVainlyStrain%252FVailyn%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/VainlyStrain/Vailyn/star":{"post":"sinb9CMVhN5lKT-i_QCfkXw5Sm1j5xkQCALIn6JmUqjOM87oJNHbDsCFbdDtJq4w_aD7v9zNyHTJB5wo_WIGgg"},"/VainlyStrain/Vailyn/unstar":{"post":"eLCr4iGNkQS9BdYORbKa3N3DMeNdyv_E5tePgfrn0UIrs_imohn4L2nlX-SBLY0jAT0GJxaa7XxAW7I8Bkz6wA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"budjnkuTn_rWtq53UppkDXKYyU2TiH0tuUh9y6goU_ISMJntJujbY4wIclOL2qAReszIJt7W5Fx3GckJRD6QJw"}}},"title":"Repository search results"}