{"payload":{"header_redesign_enabled":false,"results":[{"id":"461679101","archived":false,"color":"#844FBA","followers":14,"has_funding_file":false,"hl_name":"brootware/flarevm-up","hl_trunc_description":"Easy automated vagrant provisioning of Windows 10 with flarevm tools installed for Digital Forensics and Malware Analysis Lab.","language":"HCL","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":461679101,"name":"flarevm-up","owner_id":7734956,"owner_login":"brootware","updated_at":"2022-05-29T11:16:17.894Z","has_issues":true}},"sponsorable":false,"topics":["vagrant","virtualbox","reverse-engineering","windows-10","ctf","malware-analysis","digital-forensics","ctf-tools","blueteaming","dfir-automation","forensics-tools"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":57,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Abrootware%252Fflarevm-up%2B%2Blanguage%253AHCL","metadata":null,"csrf_tokens":{"/brootware/flarevm-up/star":{"post":"IjcqiV3VHLm2TXrO3l8nbJnRD0Sx30GW4nc5-QDdbvMyEBJqhB-cyhyls2kRQGlpU_8dgzP_usqkHf4vmEtLVA"},"/brootware/flarevm-up/unstar":{"post":"LWOqcdtoTxWv7uIpb8DRyW1S0bUSXwNsXb856TC-dh52_ykyY8Kktjd0Z91eFSD_GT077MI6sePnB25vyNrUMQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"t_Y5xcorAgmibUnwdVyt3Mpo9rk7E4NNTYlQdTNlRokFuKGxE4oJhGY-LgC5id-wJHreaM_dq4OD2WuLAai6mQ"}}},"title":"Repository search results"}