{"payload":{"header_redesign_enabled":false,"results":[{"id":"574492545","archived":false,"color":"#012456","followers":127,"has_funding_file":true,"hl_name":"mthcht/Purpleteam","hl_trunc_description":"Purpleteam scripts simulation & Detection - trigger events for SOC detections","language":"PowerShell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":574492545,"name":"Purpleteam","owner_id":75267080,"owner_login":"mthcht","updated_at":"2024-05-29T07:00:00.581Z","has_issues":true}},"sponsorable":true,"topics":["windows","linux","security","ioc","awesome","simulation","detection","tactics","awesome-list","threat-hunting","siem","soc","techniques","blueteam","redteam","mitre-attack","purpleteam","threathunting","offensive-scripts","detection-engineering"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":79,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amthcht%252FPurpleteam%2B%2Blanguage%253APowerShell","metadata":null,"csrf_tokens":{"/mthcht/Purpleteam/star":{"post":"PJjXxszPIag0iOtJ2Ga3A1osMBVdUEaexoeL4p8ZSpEcspRZGfWFVOjBxQ8SZWjAWBoSLMCHCKr46P6UTE9S0w"},"/mthcht/Purpleteam/unstar":{"post":"O7ToQ_zzZpGCP-hq0Q1QuItFxsV6WX7FiBlT_BPN7PNo-e-Ph9hOQmxRSUfb792ky0_XLiq6IKhBcWqhHpRz7A"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"Z2hAUcr98Tf4k0xG7TmKOXdbKoPe_Dz3U2_XTKG6MtrKPz7p67yzU42QSphtuLOmuRnu4kNFCBr-xIfLb0EpDw"}}},"title":"Repository search results"}