{"payload":{"header_redesign_enabled":false,"results":[{"id":"564682811","archived":false,"color":"#f34b7d","followers":24,"has_funding_file":false,"hl_name":"ProcessusT/CobaltStrikeBypassDefender","hl_trunc_description":"A launcher to load a DLL with xored cobalt strike shellcode executed in memory through process hollowing technique","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":564682811,"name":"CobaltStrikeBypassDefender","owner_id":13833925,"owner_login":"ProcessusT","updated_at":"2022-11-11T09:11:33.828Z","has_issues":true}},"sponsorable":false,"topics":["dll","cobalt","malware","process","shellcode","strike","hollowing"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":78,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AProcessusT%252FCobaltStrikeBypassDefender%2B%2Blanguage%253AC%252B%252B","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/ProcessusT/CobaltStrikeBypassDefender/star":{"post":"_M3yGbNH5JiBJxISnHr1qnLRk6ZfKJke63dScYTWdHGV037QG2IxC-XYS7-pRD38jb-hB747FT7Ifmyj-GPUQg"},"/ProcessusT/CobaltStrikeBypassDefender/unstar":{"post":"mVyUS3uWnZNCWep8ERUKQSbayUbcLwQ78A_FabNg0GU_DhFrQ3wjAz9AzHWSJRGKVTXC_Z1xazICGn7p4jATvg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"7T1te6hVaJMMitjqo2rblC9wEus7nbMipOC_OgId4lxVGn2T5LpSJCHJaWcvoooLD96-oJmowsiZpf-dX8whKA"}}},"title":"Repository search results"}