{"payload":{"header_redesign_enabled":false,"results":[{"id":"778888585","archived":false,"color":"#3572A5","followers":0,"has_funding_file":false,"hl_name":"scrymastic/windows-log-analyzer","hl_trunc_description":"Python tool for analyzing Windows event logs using Sigma rules for threat detection","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":778888585,"name":"windows-log-analyzer","owner_id":99010732,"owner_login":"scrymastic","updated_at":"2024-05-30T13:49:18.171Z","has_issues":true}},"sponsorable":false,"topics":["python","log-analysis","windows-security","sigma-rules"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":47,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ascrymastic%252Fwindows-log-analyzer%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/scrymastic/windows-log-analyzer/star":{"post":"D_-K1IXu_whjVHHiIY750qeT0uM9mhIsqwkx5c_qunplfSnrTk1yOVuSGwFdo80qa0WPO_rB3m636DMz23nW6Q"},"/scrymastic/windows-log-analyzer/unstar":{"post":"rn4Em3YtwHTVsCTrq08uEhofQRkIPhxZvl6hBoGRzltGeBP3j9nLA8oO37naGJ7chz-lrlP8wmF0p2qq3DOQ4Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"-OASnuG73tsnUVsN942kINyYWXyym-oFsHaAN72Ni5yr-moQnT-6F9M-vWXgIUnIjHTMqDYS2BXW0j9Cxoo85Q"}}},"title":"Repository search results"}