{"payload":{"header_redesign_enabled":false,"results":[{"id":"309793252","archived":false,"color":"#6E4C13","followers":11,"has_funding_file":false,"hl_name":"mytechnotalent/0x01-ARM-32-Hacking-Hello-World","hl_trunc_description":"ARM 32-bit Raspberry Pi Hacking Hello World example in Kali Linux.","language":"Assembly","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":309793252,"name":"0x01-ARM-32-Hacking-Hello-World","owner_id":7095767,"owner_login":"mytechnotalent","updated_at":"2021-08-28T15:09:06.315Z","has_issues":true}},"sponsorable":false,"topics":["iot","arm","hack","assembly","reverse-engineering","assembler","hacking","cybersecurity","assembly-language","cyber","assembly-language-programming","radare2","cyber-security","red-team","reverse-engineer","red-team-engagement","radare","reverse-engineering-tutorial","cyber-threat-intelligence","cyber-security-team"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":118,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amytechnotalent%252F0x01-ARM-32-Hacking-Hello-World%2B%2Blanguage%253AAssembly","metadata":null,"csrf_tokens":{"/mytechnotalent/0x01-ARM-32-Hacking-Hello-World/star":{"post":"GUCRxv8UwaGXYI_qu8dBVEGPqTpufTy_ET8vJ7ehjvm2MyyGxzK4TYXmMLRAuEHsI16GFKPa8jThQRlHiZeoxQ"},"/mytechnotalent/0x01-ARM-32-Hacking-Hello-World/unstar":{"post":"P4hclqhAIh1nAZXxZh3Xs4xupYX21DQ8obLWDunYQhQ6Ibj6g8GuQYzyRRHI0BEcf7ULlNYTB3aOL2opJJ807Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"r1aTUHYRZokeH7U1UspHLsUcP17qL7LiJIXUZK0cjhLcT-No4WaNiR1scyl0EfeQ0tQWCvp5TDKntckF8pjR5g"}}},"title":"Repository search results"}