{"payload":{"header_redesign_enabled":false,"results":[{"id":"191637806","archived":true,"color":"#E3F171","followers":531,"has_funding_file":true,"hl_name":"lawrenceamer/0xsp-Mongoose","hl_trunc_description":"a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…","language":"Pascal","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":191637806,"name":"0xsp-Mongoose","owner_id":10256911,"owner_login":"lawrenceamer","updated_at":"2022-03-27T06:11:24.364Z","has_issues":true}},"sponsorable":true,"topics":["windows","agent","security-audit","toolkit","mongoose","webapi","privilege-escalation","security-tools","impersonation","redteaming","redteam","windows-vulnerability","backdoor-attacks","lateral-movement","0xsp-mongoose"],"type":"Public archive","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":96,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Alawrenceamer%252F0xsp-Mongoose%2B%2Blanguage%253APascal","metadata":null,"csrf_tokens":{"/lawrenceamer/0xsp-Mongoose/star":{"post":"cSpOG8AZoP_1ONEfFiSDDv87Qxx5QiBNFza5pMtaSpN-K6_lxFtzpWwybKMbb8ePAzZ3Gp04p_yj5vf96u3DrQ"},"/lawrenceamer/0xsp-Mongoose/unstar":{"post":"EQBQ-ofpBP9YD6xe-o8fXuxM-dzAVTpkAZ9Z-E0rXGpXurTTNcgNWL6WZvYMsolkok4wa24DCL3SPhUn7TmcHA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"aXf6JiXOkrzc2PwRGDpjKryCtWPq9SB0nenzposVNzzbp-drexxClnutLbUHk6u8SA2ZUb3c2yEdKGPk7ffCXw"}}},"title":"Repository search results"}