{"payload":{"header_redesign_enabled":false,"results":[{"id":"276734087","archived":false,"color":"#555555","followers":1,"has_funding_file":false,"hl_name":"emb-team/shell-exploit","hl_trunc_description":"Exploit sample bypassing stack canary and ASLR on x86/x86_64","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":276734087,"name":"shell-exploit","owner_id":15201850,"owner_login":"emb-team","updated_at":"2020-07-25T13:18:37.437Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":62,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Aemb-team%252Fshell-exploit%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/emb-team/shell-exploit/star":{"post":"wrgyo3d0kqISLi3SHvxHQgHBseralxb7vUWI4fUS8Y7D6V_3BS8I_nWtLtb-9mf9vaQtrv35qSZPYmhIdZ8Mnw"},"/emb-team/shell-exploit/unstar":{"post":"09lkLowwBaSmYU-ur7ZzgGpbcAcVJQzIXRwxih8wps2_j9dXINh_XudM1_gpgrUMzpSxB1Z1Db9twhuXBiGZzQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"oc4F9jpEZrn5EwJY7NuuhlDl_Q_ELlnfuYUCPPNBj6p8l_iepBZHMMuN3xzHslZ6cFErllz1esy4ebQJEzm0ww"}}},"title":"Repository search results"}