{"payload":{"header_redesign_enabled":false,"results":[{"id":"62306972","archived":false,"color":"#555555","followers":340,"has_funding_file":false,"hl_name":"laginimaineb/ExtractKeyMaster","hl_trunc_description":"Exploit that extracts Qualcomm's KeyMaster keys using CVE-2015-6639 and CVE-2016-2431","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":62306972,"name":"ExtractKeyMaster","owner_id":11378334,"owner_login":"laginimaineb","updated_at":"2016-06-30T15:32:42.667Z","has_issues":true}},"sponsorable":false,"topics":[],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":70,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Alaginimaineb%252FExtractKeyMaster%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/laginimaineb/ExtractKeyMaster/star":{"post":"t2hdWcDHWACXq3lO6VO-eywvo5dEyDnfV0zS6f6V2MnkM9f2flT_b6QuzIlt36pq5iOn6cuVqWUmaPXRnuAvEw"},"/laginimaineb/ExtractKeyMaster/unstar":{"post":"sjusDJiLt3ICg6cfa5L2qfO14nuh238wnR6Y5NhLy8JCzPjDhvDHzsZ2Xu1RvwS_TPABOE5GNyNkc4veJt2SWA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"YKY22KMHEEzV1Q8RzuBdi4o8uxP5MJxbdr5-TNpog3ABVSoIBZfiLsXSFY3cBVADM2HtGtQPa086E0kJ5QHhTg"}}},"title":"Repository search results"}