{"payload":{"header_redesign_enabled":false,"results":[{"id":"310682488","archived":false,"color":"#555555","followers":3,"has_funding_file":false,"hl_name":"mytechnotalent/0x04-ARM-32-Hacking-Double","hl_trunc_description":"ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":310682488,"name":"0x04-ARM-32-Hacking-Double","owner_id":7095767,"owner_login":"mytechnotalent","updated_at":"2021-08-28T15:15:03.518Z","has_issues":true}},"sponsorable":false,"topics":["c","iot","arm","hack","assembly","reverse-engineering","assembler","hacking","cybersecurity","assembly-language","cyber","assembly-language-programming","radare2","cyber-security","red-team","red-team-engagement","radare","reverse-engineering-tutorial","cyber-threat-intelligence","cyber-security-team"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":55,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amytechnotalent%252F0x04-ARM-32-Hacking-Double%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/mytechnotalent/0x04-ARM-32-Hacking-Double/star":{"post":"S9BL5yGxhS_AJjwnm-7cn6cZkQfFCKDTIqRGxSySygub-9H9p55lghgfo-Cf-J2vnL4BnmXu3mYTwRUkxfI5PA"},"/mytechnotalent/0x04-ARM-32-Hacking-Double/unstar":{"post":"lhO7eBGow-SgdAfh6uSaKWgKGmXs6KTms7tk-ikqNS4u3vksEi1YM47JdX_V0E9T060qJ-6b30qB1v4PzTAUGA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"OYukW6uwJg06TqFMrWFaHFS1lAE7BZC-DhXTofl-I1-78vfR0t_QxIs-woEsL2VcP1E_Kyddm62fcpkZVy_KTQ"}}},"title":"Repository search results"}