{"payload":{"header_redesign_enabled":false,"results":[{"id":"62306972","archived":false,"color":"#555555","followers":340,"has_funding_file":false,"hl_name":"laginimaineb/ExtractKeyMaster","hl_trunc_description":"Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":62306972,"name":"ExtractKeyMaster","owner_id":11378334,"owner_login":"laginimaineb","updated_at":"2016-06-30T15:32:42.667Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":87,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Alaginimaineb%252FExtractKeyMaster%2B%2Blanguage%253AC","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/laginimaineb/ExtractKeyMaster/star":{"post":"vMxqUza21abEUXzeIfeTMX0NMY1PTh0LJNWGLF1Thu_aHHxihMvaQ0jgMaeYu3zzC5IyX_VEABj2_qBv7UUNGg"},"/laginimaineb/ExtractKeyMaster/unstar":{"post":"5-2JZbkrUPwjqJ8n_MUVApeMaWKZUuzpmVYmbd55FwXXaKt71BFPJGHl0mm4JSLZOd5PflvTcG6seVZD4PA-gw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"a0NZ8yxNgQ6rOEBAgztvP_jpkM2YkUIir6gGMIu3o_wbl1mCy-tgE6xUnPYPK1VYcYHJZzACmNAGDq5n2TSUWA"}}},"title":"Repository search results"}