{"payload":{"header_redesign_enabled":false,"results":[{"id":"183624680","archived":false,"color":"#89e051","followers":47,"has_funding_file":true,"hl_name":"ricardojoserf/wpa2-enterprise-attack","hl_trunc_description":"Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC","language":"Shell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":183624680,"name":"wpa2-enterprise-attack","owner_id":11477353,"owner_login":"ricardojoserf","updated_at":"2023-05-29T16:33:52.115Z","has_issues":true}},"sponsorable":false,"topics":["wifi","pentesting","hostapd","freeradius","wifi-security","wifi-pineapple","hostapd-wpe","gtc","wpa2-cracking","wpa2-enterprise","wifi-hacking","rogue-ap","8021x","pentesting-tools","802dot1x","freeradius-setup","wifi-pentesting","wifi-downgrade","freeradius-wpe"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":69,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Aricardojoserf%252Fwpa2-enterprise-attack%2B%2Blanguage%253AShell","metadata":null,"csrf_tokens":{"/ricardojoserf/wpa2-enterprise-attack/star":{"post":"wFmC5FURn66kkcD22vzQckYOFpXfKyYe2V_oll_4fGruHPGVvR6y6CCVnqeEY42q6fIsa2Dq8-MsAIT1QrWlUQ"},"/ricardojoserf/wpa2-enterprise-attack/unstar":{"post":"TuKJfyphGfrHqNI8J4aZpGw6LBZupB0NRRrypUPkBfca4MEFkvAyxXj6ZCplOrv53HYsbgEqvHPuD0IczCj3iw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"lo0pOymlVi3TEFNH4vM_eJX_udP29T8LlgCQWcJ1Iyazw7NRNP1xcWrtXt_R82-DP7Iwy5p6EKhmfyZZE4FYeA"}}},"title":"Repository search results"}