{"payload":{"header_redesign_enabled":false,"results":[{"id":"299600237","archived":false,"color":"#3572A5","followers":275,"has_funding_file":true,"hl_name":"Charmve/BLE-Security-Attack-Defence","hl_trunc_description":"✨ Purpose only! The dangers of Bluetooth Low Energy(BLE)implementations: Unveiling zero day vulnerabilities and security flaws in modern …","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":299600237,"name":"BLE-Security-Attack-Defence","owner_id":29084184,"owner_login":"Charmve","updated_at":"2024-05-27T02:43:31.114Z","has_issues":true}},"sponsorable":true,"topics":["stack","hacking","reverse-proxy","ble","bluetooth-low-energy","fuzzing","wireless","reverse","vulnerability","bluetooth-le","bluefuzz","bluetooth-fuzz","bluetoothle","ble-security","bluetooth-stack"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":104,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ACharmve%252FBLE-Security-Attack-Defence%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/Charmve/BLE-Security-Attack-Defence/star":{"post":"Pu_BrNGHDfFYVskKIMnDDomz2PcMKWBvhk3-A4KfVyXaGjbhqmJO9vkLZV_8F-_Yg5Z34yk6fbpNyU1O88JT6A"},"/Charmve/BLE-Security-Attack-Defence/unstar":{"post":"JR1UNi5xqvuFeimr8UeIRghT8-LLL4agLFPPFak3-wz80pbqoHs3reefXq3W5E0KWDKO5CtFFERggvjxB_ZuFQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"GGU3OXLOM1kAtYLD2OBULIFLJjdYz2qBb3fcGh8v5ywKUJlvFTS3T4LvXrcxGc83_z5mQxfbKFzR6arKz2uGXA"}}},"title":"Repository search results"}