{"payload":{"header_redesign_enabled":false,"results":[{"id":"30412628","archived":false,"color":"#3572A5","followers":132,"has_funding_file":false,"hl_name":"Cr4sh/UEFI_boot_script_expl","hl_trunc_description":"CHIPSEC module that exploits UEFI boot script table vulnerability","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":30412628,"name":"UEFI_boot_script_expl","owner_id":534534,"owner_login":"Cr4sh","updated_at":"2016-01-25T14:14:28.164Z","has_issues":false}},"sponsorable":false,"topics":["exploit","firmware","intel","uefi","vulnerability","smm","dma"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":60,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ACr4sh%252FUEFI_boot_script_expl%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/Cr4sh/UEFI_boot_script_expl/star":{"post":"3sACnEeZHaxkDL4EOBloZgpCt15L4Q8J-ZluFdUdfWmu3NOfS73yVk4gDuj97aGOfHrbXZ9ytfHTuKSlz-QFJw"},"/Cr4sh/UEFI_boot_script_expl/unstar":{"post":"ya3j2bbjMwLTI58A0rDmKtaG_8WvbAcqEOTTjrxGElA25AHr3Ue6hDv07o3SWscvfmyMOBAFvXs1Gs3mw3_9Mw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"aRmYmODqMfdrS3x2_BwPBe0L1SIrvJBHVjO3vZHqw2T5rFcJyyl6l_Db6iWafmZ7lQdeI9KqH4GGDWuZOhjL5Q"}}},"title":"Repository search results"}