{"payload":{"header_redesign_enabled":false,"results":[{"id":"535620348","archived":false,"color":"#3572A5","followers":10,"has_funding_file":false,"hl_name":"D3Ext/Reflex-Gallery-Exploit","hl_trunc_description":"Reflex Gallery 3.1.3 Arbitrary File Upload to RCE Exploit","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":535620348,"name":"Reflex-Gallery-Exploit","owner_id":67125397,"owner_login":"D3Ext","updated_at":"2022-10-13T15:46:14.374Z","has_issues":true}},"sponsorable":false,"topics":["wordpress","awesome","exploit","hacking","owasp","pentesting","ctf","kali-linux","kali","vuln","mrrobot","oscp","htb","hackthebox","2022","reflex-gallery"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":121,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AD3Ext%252FReflex-Gallery-Exploit%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/D3Ext/Reflex-Gallery-Exploit/star":{"post":"ZlACEjfJsq972spGFX0W_Kl3XXQPuhei5SjbA6tZxKxYcSp9mA8Z8P8yz6rcDxvDf9cWu0a0k3ScU15_CwlLUw"},"/D3Ext/Reflex-Gallery-Exploit/unstar":{"post":"i1D-cTQ9RNilK-mhI53B7u0y7CVfY0bpdD_8AquJ4qn81GnDRsQ1kIbwOSKMT86pQSExhjdOmGZAPXgNKgBmtA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"6gauXrx0gq5Z-Ma4Q67EHS7qd_0zRWj2u3H9ANTtcFaeWGMBaVkxEdPKvx2gl74XnMWo1SxhIeJBqTU6zZYJ5Q"}}},"title":"Repository search results"}