{"payload":{"header_redesign_enabled":false,"results":[{"id":"299600237","archived":false,"color":"#3572A5","followers":274,"has_funding_file":true,"hl_name":"Charmve/BLE-Security-Attack-Defence","hl_trunc_description":"✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":299600237,"name":"BLE-Security-Attack-Defence","owner_id":29084184,"owner_login":"Charmve","updated_at":"2024-05-27T02:43:31.114Z","has_issues":true}},"sponsorable":true,"topics":["stack","hacking","reverse-proxy","ble","bluetooth-low-energy","fuzzing","wireless","reverse","vulnerability","bluetooth-le","bluefuzz","bluetooth-fuzz","bluetoothle","ble-security","bluetooth-stack"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":72,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ACharmve%252FBLE-Security-Attack-Defence%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/Charmve/BLE-Security-Attack-Defence/star":{"post":"Bfz-d9nigtuMnhjPeuhuEU6YI_cto5qb7Pyjt0o6c69qldcA8D29AKBJSD2tX5nILoNcffKDx_q-fZaNkxRv0g"},"/Charmve/BLE-Security-Attack-Defence/unstar":{"post":"mJ-vsjekReqO6wXXl6sLh-MEqb-bKVrDeQTE6yfXGrS5b2-VsK_8zV5J5G-IgB8IVrHwIHS9rcYq6eqnxPW7Pg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"PWiQU8ipSCBbuB_5YXsSe5--j2N6H4UuYpN51BwmvM_77F7VEcNvLevQupcaFtCQBXLfGWKvz33CTb8cgR-0uw"}}},"title":"Repository search results"}