{"payload":{"header_redesign_enabled":false,"results":[{"id":"617923532","archived":false,"color":"#f34b7d","followers":78,"has_funding_file":false,"hl_name":"XaFF-XaFF/ZwProcessHollowing","hl_trunc_description":"ZwProcessHollowing is a x64 process hollowing project which uses direct systemcalls, dll unhooking and RC4 payload decryption ","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":617923532,"name":"ZwProcessHollowing","owner_id":40365455,"owner_login":"XaFF-XaFF","updated_at":"2023-03-23T14:09:14.301Z","has_issues":true}},"sponsorable":true,"topics":["windows","x64","hacking-tool","process-hollowing","runpe"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":85,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AXaFF-XaFF%252FZwProcessHollowing%2B%2Blanguage%253AC%252B%252B","metadata":null,"csrf_tokens":{"/XaFF-XaFF/ZwProcessHollowing/star":{"post":"VSQzoDEyW069QdtgWIXKwDZGXN1vlgbkFsAJQiqw6iSYLOSXHGHQbqPfQCJXigr13E3utk7woOqU0MmYJyIqeg"},"/XaFF-XaFF/ZwProcessHollowing/unstar":{"post":"0ZpCa7tH0h-1_yMNp41g4c8qwXxrq-g5KOqZN6tW5t1cFRIHFJ5aLqC6rgFmHj1QJ3mQUrpyJfX7Z_7AviRyQw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"WjyuEX_ziB7fg-o2gWWfb8DhTYwKBDdf42qhnPNAfaVBzhKeglByCBVW88gkEbq5iQ0rD-3AELnAxOmevemj0Q"}}},"title":"Repository search results"}