{"payload":{"header_redesign_enabled":false,"results":[{"id":"107168094","archived":false,"color":"#f34b7d","followers":5,"has_funding_file":false,"hl_name":"IgorKorkin/testbed","hl_trunc_description":"This project demonstrates the privilege escalation for a user-mode process - cmd.exe using stack overflow in the kernel mode driver. The …","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":107168094,"name":"testbed","owner_id":10939751,"owner_login":"IgorKorkin","updated_at":"2017-10-25T13:56:00.298Z","has_issues":true}},"sponsorable":false,"topics":["stack-overflow","windows-kernel-exploitation"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":75,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AIgorKorkin%252Ftestbed%2B%2Blanguage%253AC%252B%252B","metadata":null,"csrf_tokens":{"/IgorKorkin/testbed/star":{"post":"RFbc37E1IZn0ju06Asan_kt-wr5AGjcYuF9b2OCKeQOAbMfffbxIf7EsrwHUths9_JpppmMJLzOnjqUnkwEnOw"},"/IgorKorkin/testbed/unstar":{"post":"Smr0p_mkdyTMt4ztHwFsJfiBd0ThAf7YqxvjSSpIUKHKEp0e9wx-vwJlHzwu4EHeZ-yzcpjQrTv8kZ9RtoviHg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"APbv8PPSxE3ZAWZmrxg9EzLiPew7thDX7B1hLY4zDwPtA7HobNBtH3sVj1IaF56SPLQ7O6I4f3TVrfX9wbf-Eg"}}},"title":"Repository search results"}