{"payload":{"header_redesign_enabled":false,"results":[{"id":"84972100","archived":false,"color":"#6E4C13","followers":0,"has_funding_file":false,"hl_name":"Twice22/buffer-overflow-remote-shellcode","hl_trunc_description":"CA647: Secure Programming - exploit a buffer overflow vulnerability","language":"Assembly","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":84972100,"name":"buffer-overflow-remote-shellcode","owner_id":7197622,"owner_login":"Twice22","updated_at":"2017-04-29T10:01:16.281Z","has_issues":true}},"sponsorable":false,"topics":["dcu","ca647"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":79,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ATwice22%252Fbuffer-overflow-remote-shellcode%2B%2Blanguage%253AAssembly","metadata":null,"csrf_tokens":{"/Twice22/buffer-overflow-remote-shellcode/star":{"post":"n3jGwrb1exaBULd1XdJeub6w1S06c3mfe7VtSVO8J5LOthXL4iENM2KpEalYyX7PgJazgsfE3YU3tMXjIIvYkw"},"/Twice22/buffer-overflow-remote-shellcode/unstar":{"post":"7XF8HM0qH3ECcWSp3tiwxMQeZn1uXMOZHGtIVc2jX4AW-NynyX5nZOY78EteihQJ7rk-cqo_Ab_GQ6yCkVChyg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"kONNnwmvDq7Wilab1fLYBPjVuRPfYqTc50euCEAO8ZERZkOQ6-FCXzRZX6uIQUXHSoFkoBJT2Jk4CPoRhDGRag"}}},"title":"Repository search results"}