{"payload":{"header_redesign_enabled":false,"results":[{"id":"457113830","archived":false,"color":"#3572A5","followers":139,"has_funding_file":false,"hl_name":"safesploit/PythonRAT","hl_trunc_description":"Command and Control (C2) server with backdoor acting as Remote Administration Trojan (RAT) written in Python3","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":457113830,"name":"PythonRAT","owner_id":10171446,"owner_login":"safesploit","updated_at":"2023-07-22T01:23:11.403Z","has_issues":true}},"sponsorable":false,"topics":["python","backdoor","reverse-shell","cross-platform","malware","python3","rat","keylogger","post-exploitation","malware-research","payload","malware-development","linux-malware","c2","command-and-control","remote-access-trojan","windows-malware","mac-malware"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":73,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Asafesploit%252FPythonRAT%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/safesploit/PythonRAT/star":{"post":"JGtsi93eRQ-qrHF2z1KaLkr5T768Ej17H7LWd93GmdssIlwohsA5soQmXK0UaYjGcR27offQAOm3CWgwDp0HBg"},"/safesploit/PythonRAT/unstar":{"post":"mwTT4mWAG9j3S_4WnmnNOrxBmaHsKVueOp3WKlllfPx6vGy7HYZxRnR4Y-qWJYJS8C3yuEcubX0lTx4ACd8ZRw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"tF1fMfr27cCglGtNUt-QMWWaUM4vHYX1k_fXlh1QsODs-s5wNLGrDYjU5-viW2gzc4fGj5S3U0ec1--ZUbYAmQ"}}},"title":"Repository search results"}