{"payload":{"header_redesign_enabled":false,"results":[{"id":"310682488","archived":false,"color":"#555555","followers":4,"has_funding_file":false,"hl_name":"mytechnotalent/0x04-ARM-32-Hacking-Double","hl_trunc_description":"ARM 32-bit Raspberry Pi Hacking Double example in Kali Linux.","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":310682488,"name":"0x04-ARM-32-Hacking-Double","owner_id":7095767,"owner_login":"mytechnotalent","updated_at":"2021-08-28T15:15:03.518Z","has_issues":true}},"sponsorable":false,"topics":["c","iot","arm","hack","assembly","reverse-engineering","assembler","hacking","cybersecurity","assembly-language","cyber","assembly-language-programming","radare2","cyber-security","red-team","red-team-engagement","radare","reverse-engineering-tutorial","cyber-threat-intelligence","cyber-security-team"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":68,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amytechnotalent%252F0x04-ARM-32-Hacking-Double%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/mytechnotalent/0x04-ARM-32-Hacking-Double/star":{"post":"jI7yZGNna8SmkZ175_du2HeRXi0-Y9kpAfydwQHIO_g3epUVDv9QwEayEh-e2PF_mRMfr2QxO8eXjNvF-jXH1A"},"/mytechnotalent/0x04-ARM-32-Hacking-Double/unstar":{"post":"U9aUhr58_yhv7BxOPfb-Ci-zjOa7gDqq4Z3GCzJYiuZpZU4xSecWjNZ76NSiafntFMM9YqnxcmMogUoQ4rPeMQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"IsNMSk-q_PHGq--CHpr-xLfhX8V4odscOjxYKQqC7aA9-VvmQLC9J7vFUvto6999ygzsC8NdkWu9MOuLRQidXg"}}},"title":"Repository search results"}