{"payload":{"header_redesign_enabled":false,"results":[{"id":"479795446","archived":false,"color":"#3572A5","followers":62,"has_funding_file":false,"hl_name":"hcbaker/Puwr","hl_trunc_description":"Pivot your way deeper into computer networks with SSH compromised machines.","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":479795446,"name":"Puwr","owner_id":156484651,"owner_login":"hcbaker","updated_at":"2022-10-18T04:20:10.556Z","has_issues":true}},"sponsorable":false,"topics":["python","ssh","security","hack","hacking","python3","cybersecurity","enumeration","penetration-testing","pentesting","hacking-tool","pivoting","redteam","cybersec","puwr"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":63,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ahcbaker%252FPuwr%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/hcbaker/Puwr/star":{"post":"7oN6eVbwnPC1Enud5VvmzR6113Gyewn5gz37xePTGrOIZolDhV45FCNDzi9eDU3tYaT65HswA2TpIB2CcCA86A"},"/hcbaker/Puwr/unstar":{"post":"w7YVPZrMs36zQFfMP9KE0Id17Vs12lk8vqigJs4mQrwuSolD3v14eMP18AaS3slL3HTd3gQys9VOcCe7TxeDzg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"nScKX3KQ9ys8q4XOMQVbYTWfQHfBEPWDWDBhv5p9LOj5Sd06g-4p2eN_n03XCCt4znDp2TlKX34ZFL1sGsXgwA"}}},"title":"Repository search results"}