{"payload":{"header_redesign_enabled":false,"results":[{"id":"183624680","archived":false,"color":"#89e051","followers":48,"has_funding_file":true,"hl_name":"ricardojoserf/wpa2-enterprise-attack","hl_trunc_description":"Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC","language":"Shell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":183624680,"name":"wpa2-enterprise-attack","owner_id":11477353,"owner_login":"ricardojoserf","updated_at":"2023-05-29T16:33:52.115Z","has_issues":true}},"sponsorable":false,"topics":["wifi","pentesting","hostapd","freeradius","wifi-security","wifi-pineapple","hostapd-wpe","gtc","wpa2-cracking","wpa2-enterprise","wifi-hacking","rogue-ap","8021x","pentesting-tools","802dot1x","freeradius-setup","wifi-pentesting","wifi-downgrade","freeradius-wpe"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":68,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Aricardojoserf%252Fwpa2-enterprise-attack%2B%2Blanguage%253AShell","metadata":null,"csrf_tokens":{"/ricardojoserf/wpa2-enterprise-attack/star":{"post":"jCm6hJyJnZ4o8bf7Xs4LBEIo_q-vKb5NAkhhRMv3ypUUewNkRatnkmPT37HnfB_nMjv-y11_90HiiO1ke6VocA"},"/ricardojoserf/wpa2-enterprise-attack/unstar":{"post":"VRdEeB8jvLFTuO8HeTEvZmF-UduhZYj9oY5PzfsG72nUQP1WbKyyOnzT0MLKY0waYNd9UI-AeGmsXyZzpNM8qg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"aigXgLvEKt7CZjzqbh0D3LfhhdxEM9aORvkDHJno0KdlYxb_AFOsx-IOS4cotFJ6A70v_reIiIjAMtmsJbpaTg"}}},"title":"Repository search results"}