{"payload":{"header_redesign_enabled":false,"results":[{"id":"96033111","archived":false,"color":"#012456","followers":102,"has_funding_file":false,"hl_name":"danielbohannon/Out-FINcodedCommand","hl_trunc_description":"POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…","language":"PowerShell","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":96033111,"name":"Out-FINcodedCommand","owner_id":17295051,"owner_login":"danielbohannon","updated_at":"2017-07-02T16:32:49.563Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":87,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Adanielbohannon%252FOut-FINcodedCommand%2B%2Blanguage%253APowerShell","metadata":null,"csrf_tokens":{"/danielbohannon/Out-FINcodedCommand/star":{"post":"YN00sddUf6tvSCk3Ojv9pdAj5_kPPOdLn44bZDPL4E-DMe_dA2fRF-CMoZZfOpb90GcQO1ABC0dsC7y_X1SHwQ"},"/danielbohannon/Out-FINcodedCommand/unstar":{"post":"rSKao38VK_wSnsvjLGjslFf67HV_gKmHndhmDeXS5GmBIS0aBWGDENaZydtVE4RqjoETjpXk-W5-O1i0yFmI8g"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"3Ey5BxdZmA9Oo-y119VHMV_cavCvt-amPIMCrmN2Wd891o6wXEgPkZdX5idU_fotwUgU0OWtFggAC5WYXYtGIw"}}},"title":"Repository search results"}