{"payload":{"header_redesign_enabled":false,"results":[{"id":"409034195","archived":false,"color":"#3572A5","followers":75,"has_funding_file":false,"hl_name":"jackaduma/ThreatReportExtractor","hl_trunc_description":"Extracting Attack Behavior from Threat Reports","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":409034195,"name":"ThreatReportExtractor","owner_id":1276942,"owner_login":"jackaduma","updated_at":"2023-04-28T22:16:45.314Z","has_issues":true}},"sponsorable":false,"topics":["nlp","security","machine-learning","natural-language-processing","deep-learning","graph","graph-algorithms","machine-learning-algorithms","cybersecurity","deeplearning","nlp-parsing","nlp-machine-learning","threat-analysis","threat-intelligence","cyber-threat-intelligence","advanced-persistent-threat"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":87,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ajackaduma%252FThreatReportExtractor%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/jackaduma/ThreatReportExtractor/star":{"post":"nN6G6kVroScyx-i5afT__jqMmrHHrlFKLVP-75NZh7o3A2VZJR_vyEfDuTFLoNAiuvJNG6TTfZmFxsqgZMAlxw"},"/jackaduma/ThreatReportExtractor/unstar":{"post":"85czGqu_NLe068FFEI15V8hEp8NdXbGBfcGZhwI3Qm3i4_gqJlU3XJv5FU20q73pTR9x4UpWFiNRabT4JQaEBA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"rTTMz-1jGDr8ks159hPLXDZm07A9eeocI9HCqlS-bCifS49QFLkiEDQzOyhS-t7teYW_J-NzY_jPZRAqY9SUlA"}}},"title":"Repository search results"}