{"payload":{"header_redesign_enabled":false,"results":[{"id":"608600649","archived":false,"color":"#e34c26","followers":12,"has_funding_file":false,"hl_name":"demining/Twist-Attack-2","hl_trunc_description":"In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …","language":"HTML","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":608600649,"name":"Twist-Attack-2","owner_id":87700947,"owner_login":"demining","updated_at":"2023-09-09T14:15:22.445Z","has_issues":true}},"sponsorable":false,"topics":["hack","attack","bitcoin","exploit","blockchain","hacking","cryptocurrency","attacker","vulnerability","vulnerabilities","bitcoin-wallet","vulnerability-scanners","blockchain-technology","exploiting-vulnerabilities","exploiting"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":61,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ademining%252FTwist-Attack-2%2B%2Blanguage%253AHTML","metadata":null,"csrf_tokens":{"/demining/Twist-Attack-2/star":{"post":"ewe7otnKv7iN3Fc_yxY2UFc8fQAEiZYE8gIRKlUW8xfY77v5JIPM7ktgNKZwEJGEckysvWmHKwzUrmeEzZsBxg"},"/demining/Twist-Attack-2/unstar":{"post":"xwERXuKYdpp_iTfiw2BA3-gZRcDmeXbym5tkK5QzM-NS-HHA1o5SrjSkGxOXfQcocy4HrSyc_uXFJ_mpn7Kg2Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"DmzHiUTj4b5Zw3XXkKVNOa7NhQ72kFON9ZXTA6Ioj8OPLnCzYWRvyd_kZ9RpYPXqkKgBSlO0qtblfmRmzF_DUg"}}},"title":"Repository search results"}