{"payload":{"header_redesign_enabled":false,"results":[{"id":"611723026","archived":false,"color":"#3572A5","followers":3,"has_funding_file":false,"hl_name":"sergiovks/shellshock.py-and-referer-spoofing","hl_trunc_description":"Python3 shellshock exploit, for ethical hacking/pentesting purposes only. Use it at your own risk. I'm not responisble if you use it with…","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":611723026,"name":"shellshock.py-and-referer-spoofing","owner_id":118485549,"owner_login":"sergiovks","updated_at":"2023-03-09T13:23:39.497Z","has_issues":true}},"sponsorable":false,"topics":["python","shell","user-agent","reverse-shell","exploit","script","scripts","python3","shellshock","rce","remote-command-execution","shell-shockers","rce-exploit"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":61,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Asergiovks%252Fshellshock.py-and-referer-spoofing%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/sergiovks/shellshock.py-and-referer-spoofing/star":{"post":"FHDC9LlBxbQHKQIuKWwXPbIPKuUb1i6Xp0lL7GtufitTSl8090dn04jKVVejjOxu12m8mxQrUrg3B4Vuqu6wFA"},"/sergiovks/shellshock.py-and-referer-spoofing/unstar":{"post":"8i8kpbkRUMwWM3D6pxB6M0eycdCkdPPclr8kPf8KMHBnrN4wCL3BOKq_xxOTaQYMMPLHU9iW2FUsExz9J3ctRw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"ziSUXeyqiGKYBUW78zBB8lS9nNvPCdQhktYX6C3swCI47079XQ5No0eREcNeMSkCUSqAZTZWbcVB4QsllrXaVw"}}},"title":"Repository search results"}