{"payload":{"header_redesign_enabled":false,"results":[{"id":"322021364","archived":false,"color":"#f34b7d","followers":536,"has_funding_file":false,"hl_name":"med0x2e/ExecuteAssembly","hl_trunc_description":"Load/Inject .NET assemblies by; reusing the host (spawnto) process loaded CLR AppDomainManager, Stomping Loader/.NET assembly PE DOS head…","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":322021364,"name":"ExecuteAssembly","owner_id":3585128,"owner_login":"med0x2e","updated_at":"2021-07-26T17:36:17.646Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":62,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amed0x2e%252FExecuteAssembly%2B%2Blanguage%253AC%252B%252B","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/med0x2e/ExecuteAssembly/star":{"post":"To7su5WDBwfJ8_5LhvR6YKMI1jx5wQY8Ntq53GjXdzDdCdfngprRLBoGiiIHN14hFjMDcId3ADtTdk7X1XfKZw"},"/med0x2e/ExecuteAssembly/unstar":{"post":"tnzUYcOsu61E82s9VlNEkcPlFBFS6cGjdirDMfH9KWkNzfK4N0KL6oXg7VRsrTFBq6Y33r_-RvItBzoCJRcSDQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"EB3uxPYuGVM9cd7oKm1YDTct2kWw44_yhRvOXNp6cn5s1i6uoVqoyfTic2_1zHSz7BLrF0A_RdgHQwsA1nT8Eg"}}},"title":"Repository search results"}