{"payload":{"header_redesign_enabled":false,"results":[{"id":"592036305","archived":false,"color":"#e34c26","followers":13,"has_funding_file":false,"hl_name":"demining/Twist-Attack","hl_trunc_description":"In this article, we will implement a Twist Attack with an example and show how, using certain points on the secp256k1 elliptic curve, we …","language":"HTML","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":592036305,"name":"Twist-Attack","owner_id":87700947,"owner_login":"demining","updated_at":"2023-01-22T18:33:04.841Z","has_issues":true}},"sponsorable":false,"topics":["hack","attack","bitcoin","exploit","blockchain","hacking","cryptocurrency","attacker","vulnerability","vulnerabilities","bitcoin-wallet","vulnerability-scanners","blockchain-technology","exploiting-vulnerabilities","exploiting"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":76,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Ademining%252FTwist-Attack%2B%2Blanguage%253AHTML","metadata":null,"csrf_tokens":{"/demining/Twist-Attack/star":{"post":"iYEMKwAHT2O5h80jvHpdXctMNYSotRakyRR_ggEfLVOrnQobBkB0jI81cDB5ZabrrPLSHSF7hy078ODRoQNTPQ"},"/demining/Twist-Attack/unstar":{"post":"SPwx23RO73F-u5EtQkDT-ALQJF027FoaVHh9ow0J7bb271LQCsMd7nAQNHa_NvZ_PtZh80RZKwYK27FIYApflQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"UZwn27CHs2WvQ43xWI9xZ_3nNDrh3NRtrNiOgzCqiV9XPmlJc4WtYHhSBNnE-2aoZsAWSiDTDtSiMGClHiIjVQ"}}},"title":"Repository search results"}