{"payload":{"header_redesign_enabled":false,"results":[{"id":"32133566","archived":false,"color":"#3572A5","followers":877,"has_funding_file":false,"hl_name":"EnableSecurity/sipvicious","hl_trunc_description":"SIPVicious OSS is a VoIP security testing toolset. It helps security teams, QA and developers test SIP-based VoIP systems and application…","language":"Python","mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":32133566,"name":"sipvicious","owner_id":13013552,"owner_login":"EnableSecurity","updated_at":"2022-11-18T14:40:03.770Z","has_issues":true}},"sponsorable":false,"topics":["security","sip","voip","password-cracker","svwar","svcrack","svmap","war-dial","svcrash","security-tools","hacking-tools","audit-sip"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false},{"id":"259825257","archived":false,"color":null,"followers":396,"has_funding_file":false,"hl_name":"EnableSecurity/awesome-rtc-hacking","hl_trunc_description":"a list of awesome resources related to security and hacking of VoIP, WebRTC and VoLTE","language":null,"mirror":false,"owned_by_organization":true,"public":true,"repo":{"repository":{"id":259825257,"name":"awesome-rtc-hacking","owner_id":13013552,"owner_login":"EnableSecurity","updated_at":"2023-01-27T14:31:52.075Z","has_issues":true}},"sponsorable":false,"topics":["security","awesome","webrtc","hacking","bug-bounty","fuzzing","awesome-lists","volte","voip-security","hacking-voip","sip-security","communications-hacking"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":86,"errors":[],"result_count":2,"facets":[],"protected_org_logins":[],"topics":{"linked_topic_name":"security","curated_topic":{"id":"646","name":"security","flagged":false,"short_description":"Cybersecurity is the protection of computer hardware, software, and data from theft, damage, and malicious intent.","display_name":"Security","released":null,"wikipedia_url":"https://en.wikipedia.org/wiki/Computer_security","url":null,"github_url":null,"logo_url":null,"has_logo_url":false,"featured":true,"stargazer_count":37066,"applied_count":32672,"hl_display_name":null,"hl_short_description":null,"created_by":null,"curated":true,"aliases":["security-audit","security-tools","security-vulnerability"],"related":[],"repository_count":null,"repository_count_over_max_fetch_limit":null,"starred_by_current_user":null,"highlights":{"description":null,"display_name":null,"name.ngram":null}}},"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Dtopic%253Asecurity%2Borg%253AEnableSecurity%2Bfork%253Atrue%26type%3Drepositories","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/EnableSecurity/sipvicious/star":{"post":"0cNrgP6JlFiWI6Nppe9lW6WRSr7uOX0dLfkfeglFaNznbz-r5B5HVL2vtQJr3LMx8zXw95NTREez12X2iFV6BA"},"/EnableSecurity/sipvicious/unstar":{"post":"d1pdv-LTFi94tD01gaiX0NgFoeCuG8Iez2NZUYPN8LwDpS9XYpSOhVYtHi_TWpG-z_zvcVOfW0lAVZmw0qJZCA"},"/EnableSecurity/awesome-rtc-hacking/star":{"post":"hAB1ncKXahKGvxfhGydhD_9lNhKoqH5afpbh0umHhIhTk5tSg1tPiYXMvJLYf8rurSM_bwhQO8_ZUzhwN4kvgg"},"/EnableSecurity/awesome-rtc-hacking/unstar":{"post":"zrqn-ZMkBFyqdobZg-yr6V7dACvlEcFyVRaQtWtsPvg31haS1Lu-mWfDpQcv-LxLzOa7_lunv_fgy7b9ZhcV2g"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"26NKCMULv1iFVJYmUQ6Tq23yzYTIhsInWVju8HmhpgRzQO2eOST4ycjBEypYrlBL2K8fhzYjfycbnoR90LWCkw"}}},"title":"Repository search results"}