{"payload":{"header_redesign_enabled":false,"results":[{"id":"393489989","archived":false,"color":"#3572A5","followers":1503,"has_funding_file":false,"hl_name":"mikeroyal/Digital-Forensics-Guide","hl_trunc_description":"Digital Forensics Guide. Learn all about Digital Forensics, Computer Forensics, Mobile device Forensics, Network Forensics, and Database …","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":393489989,"name":"Digital-Forensics-Guide","owner_id":45159366,"owner_login":"mikeroyal","updated_at":"2024-01-04T22:41:58.311Z","has_issues":true}},"sponsorable":false,"topics":["security","osint","alerting","forensics","dfir","intrusion-detection","siem","digital-forensics","offensive-security","cyber-security","network-security","port-scanning","forensic-analysis","threat-intelligence","mitre-attack","forensics-investigations","detection-engineering","digitalforensics","forensics-tools","digitalforensicreadiness"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":62,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amikeroyal%252FDigital-Forensics-Guide%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/mikeroyal/Digital-Forensics-Guide/star":{"post":"7pkf2-n6OBlQ6EilSj5706aZ24BTKZuxA1b7-SqaR29EAfthsee6m3D8jFU2Vle3N9JDcUWHT-2lsBzAkj6ahg"},"/mikeroyal/Digital-Forensics-Guide/unstar":{"post":"42EJJDhemL0DdbmK2bIxefIU8DuW-dokg0iydQzsRztWGLVNoLPRVqB84mnNqQ6OxUt7nUwNJvx72YGplIJh_Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"Sel_3Z3TjLP-61UIANxTrLl1139vO0XoIuKd0ECYZrnjoXi8k5EcbjwQ1vS3vNOuW1g4Ch-7PY3fSplXG5uB_g"}}},"title":"Repository search results"}