{"payload":{"header_redesign_enabled":false,"results":[{"id":"71630197","archived":false,"color":"#3572A5","followers":59,"has_funding_file":false,"hl_name":"Cr4sh/Aptiocalypsis","hl_trunc_description":"Arbitrary SMM code execution exploit for industry-wide 0day vulnerability in AMI Aptio based firmwares","language":"Python","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":71630197,"name":"Aptiocalypsis","owner_id":534534,"owner_login":"Cr4sh","updated_at":"2016-10-22T17:27:11.107Z","has_issues":false}},"sponsorable":false,"topics":["exploit","firmware","intel","ami","uefi","vulnerability","smm","0day"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":57,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253ACr4sh%252FAptiocalypsis%2B%2Blanguage%253APython","metadata":null,"csrf_tokens":{"/Cr4sh/Aptiocalypsis/star":{"post":"v3flbXCsbNaAlH44Vr-h7-OUISw-40yK0IhnVXNXEICtg6AjXqPh0vXDJ3u_PulzT_4BINOZhORALiBWPhh6hg"},"/Cr4sh/Aptiocalypsis/unstar":{"post":"kV3hKBIJAXBJ0FjUqgCwzBQ9UCVsYeoIW02N-nzBJfplMtIVuVBpP-4kbZoykxUfsKo_Q5CLBQoFGBZwHuFohg"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"gHnORPgNI3B6e9LUFQyOIBRFFHVHB2RYZmaXBcAo_MpzTqIo5Q1ZyOHGqIRHS5bwloziwO3JRBjdqnah8rVGpA"}}},"title":"Repository search results"}