{"payload":{"header_redesign_enabled":false,"results":[{"id":"787515987","archived":false,"color":"#178600","followers":0,"has_funding_file":false,"hl_name":"Trn44/Process-Hollowing-POC","hl_trunc_description":"Proof of concept, example of process hollowing, generating reverse TCP shellcode. Conducted on Windows 10 64 Bit 22H2.","language":"C#","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":787515987,"name":"Process-Hollowing-POC","owner_id":167228423,"owner_login":"Trn44","updated_at":"2024-05-14T15:41:51.170Z","has_issues":true}},"sponsorable":false,"topics":["windows-10","process-hollowing","windows-11","process-injection"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":67,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ATrn44%252FProcess-Hollowing-POC%2B%2Blanguage%253AC%2523","metadata":null,"csrf_tokens":{"/Trn44/Process-Hollowing-POC/star":{"post":"dlFog5hTfEVw1z3Kmp7AAqve6Uw5SI0n96LvlkLhevBemTiWS2QMEpuj8YysBaxYUMZO_lzj8aUqVXwPXMMgyw"},"/Trn44/Process-Hollowing-POC/unstar":{"post":"NZuI1AAbzIQ28BcgNDM8iAFaNZP0slF3e6e1iCRaDku8vps6MzCPkfp9_Uv30onNYJm8cJIC9Vw7aUCI1fzI4A"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"jenIIGalc6HeT-rvHPZ9U_JxGI7PzDu2tH518vj1HbGF-iFevvWT01ekBa6GQGEWYu7J23zXB0eYGEY6DyOxxA"}}},"title":"Repository search results"}