{"payload":{"header_redesign_enabled":false,"results":[{"id":"73915307","archived":false,"color":"#f1e05a","followers":6161,"has_funding_file":false,"hl_name":"samyk/poisontap","hl_trunc_description":"Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…","language":"JavaScript","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":73915307,"name":"poisontap","owner_id":411832,"owner_login":"samyk","updated_at":"2018-11-26T16:50:44.958Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":61,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Asamyk%252Fpoisontap%2B%2Blanguage%253AJavaScript","metadata":null,"csrf_tokens":{"/samyk/poisontap/star":{"post":"qQYd5fLnqn3U4C_KiezlKD71f3h3FBElIGy5ZWr5twFqYkmzhZbYn2HYtPPNwjjD1c6s9x6H6MC5ghvGs_InVg"},"/samyk/poisontap/unstar":{"post":"w79qPknbcFaAgs3oE98edXLwZNDuvj2A2JWR7GuQicu30Vi6UnMdjAb4gJuzfkNyQUxPRzku9iC8S_gm6jCgxw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"khHAkpXKm6_HxPnvPksV1OuYsPtkmpZn8jcUf6y3RlQ9qqxTwG40l0SV2g-1rZ0zO05tQpsKQHlo4E4XU7wJSg"}}},"title":"Repository search results"}