{"payload":{"header_redesign_enabled":false,"results":[{"id":"269540718","archived":false,"color":"#C1F12E","followers":2,"has_funding_file":false,"hl_name":"LiveGray/GEYSERWATCH","hl_trunc_description":"USB drop framework to check-in to an attacker controlled server if successful. ","language":"Batchfile","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":269540718,"name":"GEYSERWATCH","owner_id":54043553,"owner_login":"LiveGray","updated_at":"2020-06-09T00:30:15.668Z","has_issues":true}},"sponsorable":false,"topics":["windows","security","usb","hacking","penetration-testing","batch","penetration","batch-script","hacking-tool","security-tools","hacking-tools","penetration-testing-tools"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":62,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ALiveGray%252FGEYSERWATCH%2B%2Blanguage%253ABatchfile","metadata":null,"csrf_tokens":{"/LiveGray/GEYSERWATCH/star":{"post":"4YbvXTwK7fejXF7aKRCuRqilcLTzU-BkvNEiXF5HwnNqlYd2-2XQTMh3ng-lTbidR_Wt5_JPWCnx-XixudTVSg"},"/LiveGray/GEYSERWATCH/unstar":{"post":"jno2jj-Q3JU3_Bes7XQxLkDvIzdFYfEr3CK9QpKRr7pCC_ycVq0SW0U4NbN1zqHa7Z8yL7vaf8S09qrGqGY1kw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"1UcBUUScLtQ6X21tU-jKM7Veftn3lYceh3hOTtKYIpwTAWsXZWt7i6GbnMP_uAmK3GTWtPu4Kl1QvYOUYF3lww"}}},"title":"Repository search results"}