{"payload":{"header_redesign_enabled":false,"results":[{"id":"537806950","archived":false,"color":"#e34c26","followers":0,"has_funding_file":false,"hl_name":"tsumarios/blog","hl_trunc_description":"My personal blog","language":"HTML","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":537806950,"name":"blog","owner_id":23482292,"owner_login":"tsumarios","updated_at":"2024-07-28T10:04:10.366Z","has_issues":true}},"sponsorable":false,"topics":["blog","security","cloud","privacy","tutorial","research","notes","network","resources","dfir","cybersecurity","infosec","informatics","threat-modeling","risk-assessment","threat-intelligence"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":83,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Atsumarios%252Fblog%2B%2Blanguage%253AHTML","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/tsumarios/blog/star":{"post":"9hFYtoKfc0LyXUfKywL4WoKR6mMI9Bxb4TutwkfB4VR5s4f_ozbkJurr0WbjY9uURILL4uJIarReOkBwgzfX2g"},"/tsumarios/blog/unstar":{"post":"4reiSCPT7FobQYTV9mBigof2tQWk2jwuNEXRvMmQ41oJpzHQXrYhj_seRHgMYknKj4pyfK_g595MnYa9083r4w"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"ax4nCjFxO3A2apiMGIcLAjcojysr6SPmFlY6poE-00ZNwNKnnwYUEf5EjPaU3iNCphqhq4QY6SHaamRu2gwIOQ"}}},"title":"Repository search results"}