{"payload":{"header_redesign_enabled":false,"results":[{"id":"139266458","archived":false,"color":"#e34c26","followers":45,"has_funding_file":false,"hl_name":"MISP/best-practices-in-threat-intelligence","hl_trunc_description":"Best practices in threat intelligence","language":"HTML","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":139266458,"name":"best-practices-in-threat-intelligence","owner_id":4134875,"owner_login":"MISP","updated_at":"2022-11-06T16:52:51.342Z","has_issues":true}},"sponsorable":false,"topics":["misp","threat-sharing","threatintel","information-sharing","threat-intelligence"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":55,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AMISP%252Fbest-practices-in-threat-intelligence%2B%2Blanguage%253AHTML","metadata":null,"csrf_tokens":{"/MISP/best-practices-in-threat-intelligence/star":{"post":"5ezjw3VqLA5ZnVQKM5s6-FCHnK5OSqOUt69ToRklDIT3WGOi00XbUygvsd2QRXDLlNbyoHfLFkRZ0pLwnQdAyg"},"/MISP/best-practices-in-threat-intelligence/unstar":{"post":"2wW0YOT2smkOuXbGp3CMGOK-AvFz6cKlc2PLCZ9BuDBY-LkOD-hTC1yjUaQ5zWQaB64HMmr3PTnjTcuxdGhL1g"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"bInS5yKHyvErUgc3RXLqQuuZkWC4NNaYRqBU5BGfN6RwjPr6yfJ9VC9Ay_Wr9A6VYgYgtyXWqcz24RGg0MQi2Q"}}},"title":"Repository search results"}