{"payload":{"header_redesign_enabled":false,"results":[{"id":"656298951","archived":false,"color":"#012456","followers":772,"has_funding_file":true,"hl_name":"The-Viper-One/PsMapExec","hl_trunc_description":"A PowerShell tool that takes strong inspiration from CrackMapExec / NetExec","language":"PowerShell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":656298951,"name":"PsMapExec","owner_id":68926315,"owner_login":"The-Viper-One","updated_at":"2024-06-12T18:33:51.850Z","has_issues":true}},"sponsorable":false,"topics":["powershell","active-directory","hacking","sam","pentesting","rdp","vnc","crackmapexec","mimikatz","lateral-movement","spraying","netexec"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":99,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AThe-Viper-One%252FPsMapExec%2B%2Blanguage%253APowerShell","metadata":null,"csrf_tokens":{"/The-Viper-One/PsMapExec/star":{"post":"lP6TuAgFVRvdzRDm__nxE0h8AhsEjY23nC9qk5N9HNZVhXk2Cy9KsG9iLqzoBb80N9dznPRsSdkvDSbkOZaNIw"},"/The-Viper-One/PsMapExec/unstar":{"post":"Zjj3UZm1pFWdUtW5MHAc2gP9v6aCxdHtkDYuajXYcb7xMonL4iEBlWK6x0xsptb6z6goFgfbDOnoZMXp8z2j-g"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"YSCPUepZJFGagy7SxCE2XT01iNyevUzrbYdD2aG-jFY3dLqdjIdBf3Zps8JFGKGvCb1J_wiBr7fr5YqACQp2XQ"}}},"title":"Repository search results"}