{"payload":{"header_redesign_enabled":false,"results":[{"id":"649007110","archived":false,"color":"#00ADD8","followers":2,"has_funding_file":false,"hl_name":"tahadraidia/OSQueryED","hl_trunc_description":"A tool PoC that demonstrate how to leverage Osquery interactive shell named pipe implementation to enumerate windows machines. ","language":"Go","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":649007110,"name":"OSQueryED","owner_id":3128363,"owner_login":"tahadraidia","updated_at":"2023-06-29T15:45:24.140Z","has_issues":true}},"sponsorable":false,"topics":["windows","golang","discovery","enumeration","post-exploitation","osquery","offensive-security","osquery-extension"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":91,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Atahadraidia%252FOSQueryED%2B%2Blanguage%253AGo","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/tahadraidia/OSQueryED/star":{"post":"Ek0g1yo2qRk_f6_ao4UnMKnfeNCfaSXvMsdwVqqOdQ-HZ6a44HLg8QpsBr1M15cbUeev3iMY8aK5tNAZXKcR2Q"},"/tahadraidia/OSQueryED/unstar":{"post":"R07yRm3mN7XmEYnmk9Bzre_gropYpEp452t1hp2NevXSvITELqnROhiPFD6qBhH5Kt2fRDQuCzdeNWbalw8YAw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"gyqkVmcWoqz5B67ggnVeZGapdxkv2hI57xFhRRlPMJW_vDy3598HaG7QkHG77de-8JV43NsD_h97y3io2sMGKA"}}},"title":"Repository search results"}