{"payload":{"header_redesign_enabled":false,"results":[{"id":"624821707","archived":false,"color":"#6E4C13","followers":290,"has_funding_file":false,"hl_name":"f1zm0/acheron","hl_trunc_description":"indirect syscalls for AV/EDR evasion in Go assembly","language":"Assembly","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":624821707,"name":"acheron","owner_id":79873476,"owner_login":"f1zm0","updated_at":"2023-06-13T19:20:33.671Z","has_issues":true}},"sponsorable":false,"topics":["go","golang","assembly","malware-research","evasion","offensive-security","red-team","av-evasion","red-teaming","adversary-emulation","edr-bypass","edr-evasion"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":59,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Af1zm0%252Facheron%2B%2Blanguage%253AAssembly","metadata":null,"csrf_tokens":{"/f1zm0/acheron/star":{"post":"32iAFJOAv5VbqQmlLx0mrhKcf1gfX50QXNTxrGZlIXeM0rXsjAuq4Qa4K5BNsfBx0vR4EzvkRqepXxeg1_I7tg"},"/f1zm0/acheron/unstar":{"post":"niik9Vm1wxxzSSRYT2qFqQL4cOtqRDr0RAtave8BFDHEN2QlaTHrwIeHczyk8Wke190_vr47jPaovdcL5ADFiw"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"3c8ISYWQIzMQsUbyl1aOKMGW7QsJg6evaE1mHIKoYu9X-yEOAzxype6Q0_TCFb-d3enFc39cBmxMCeXAX2VhCA"}}},"title":"Repository search results"}