{"payload":{"header_redesign_enabled":false,"results":[{"id":"415040730","archived":false,"color":"#3572A5","followers":0,"has_funding_file":false,"hl_name":"HectorTa1989/DNS-cache-poisoning-attack-investigation","hl_trunc_description":"An isolated environment for DNS cache poisoning attack investigation and demonstration.","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":415040730,"name":"DNS-cache-poisoning-attack-investigation","owner_id":31132150,"owner_login":"HectorTa1989","updated_at":"2021-10-27T01:45:29.844Z","has_issues":true}},"sponsorable":false,"topics":["dns","dns-server","dns-cache-poisoning","dns-spoofing","dns-poisoning","poisoning-attack"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":65,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AHectorTa1989%252FDNS-cache-poisoning-attack-investigation%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/HectorTa1989/DNS-cache-poisoning-attack-investigation/star":{"post":"MB1A067gOG_6aCKCs4bl6hU14RX31GKSflP8qXDYTSQlfFsk1f7SFMBfpIsNgtggPGO6LuPfG4AnqOAcwbGGuw"},"/HectorTa1989/DNS-cache-poisoning-attack-investigation/unstar":{"post":"6xRFSUKXOIkYXJ6CiQmI55OMt8kXeTbMBKX__Oav9uZhI0yRxFTkQzNFgRTyXHI2jGpuFXmpVc6rSM1kbvR9qA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"jMlaF-1IvYEZsYzEbt_MVt_P-08yc1DrgQf1VSKpdzXG4_i7fm_e2YG2pztnFOxc8zNmrZUz_kpDISpYGlchYA"}}},"title":"Repository search results"}