{"payload":{"header_redesign_enabled":false,"results":[{"id":"289128579","archived":false,"color":"#f34b7d","followers":262,"has_funding_file":false,"hl_name":"S1ckB0y1337/TokenPlayer","hl_trunc_description":"Manipulating and Abusing Windows Access Tokens.","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":289128579,"name":"TokenPlayer","owner_id":30439198,"owner_login":"S1ckB0y1337","updated_at":"2021-01-15T16:07:47.603Z","has_issues":true}},"sponsorable":false,"topics":["windows","tokens","post-exploitation","uac-bypass","pentest-tool","windows-privilege-escalation","windows-internals","windows-security","lateral-movement"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":115,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AS1ckB0y1337%252FTokenPlayer%2B%2Blanguage%253AC%252B%252B","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/S1ckB0y1337/TokenPlayer/star":{"post":"5qa8b73NA_xsvX3I4rk0LrUnQbWDqOIXKVhTZbSp3XSYW2513EdU2HhwwI8BHw_95nBF8BFaHSxS7YhkeMRJJQ"},"/S1ckB0y1337/TokenPlayer/unstar":{"post":"U7UTdNNFSTV6txUIpflYhD5N6cK1C_d5qWMhctLTY3oAiy86MFcNwdK9iUpDPww8e1aSxuo7hNaZDQItrLnQ5Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"_8iExYEV9xUGyMUXMRTwirYUYtSlp78A02jihoNYq75e8etEqzfk-RJEYZ0HOX3A4-svRyP_phlimxVC_4w1Dg"}}},"title":"Repository search results"}