{"payload":{"header_redesign_enabled":false,"results":[{"id":"157397021","archived":false,"color":"#012456","followers":8,"has_funding_file":false,"hl_name":"manta0101/yaforto","hl_trunc_description":"a Forensic Script to remotely obtain information from a target machine.","language":"PowerShell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":157397021,"name":"yaforto","owner_id":45007670,"owner_login":"manta0101","updated_at":"2019-08-22T17:46:37.702Z","has_issues":true}},"sponsorable":false,"topics":["windows","collection","incident-response","remote","forensics","memory-dump","investigation","triage-content"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":66,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amanta0101%252Fyaforto%2B%2Blanguage%253APowerShell","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/manta0101/yaforto/star":{"post":"hzrQLzCP1TbfKl5hD5UYyKANnb1tSznlGu7RvU9WVgs2i7XhcH5II8O9pXhD7CwYaTsjz0ftvaqlN6lbM4vFzg"},"/manta0101/yaforto/unstar":{"post":"MA0nASAQguA2nb2GSVohxZDESvF5Zl4Ey9Y7xHOK2cURq_owVInIhDbn2Sd-cSjykAIT8YD2A-O9WryQndLifg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"Lj1606W367GAHtnxjOpgoF_mQ8H-J0z593H6aABriI6ZAxZ_Oiy5q3NXJ0GpAH2FPfQ37KcHNGqAjz9xGd7Ypw"}}},"title":"Repository search results"}