{"payload":{"header_redesign_enabled":false,"results":[{"id":"456634353","archived":false,"color":"#f34b7d","followers":166,"has_funding_file":false,"hl_name":"danielkrupinski/x86RetSpoof","hl_trunc_description":"Invoke functions with a spoofed return address. For 32-bit Windows binaries. Supports __fastcall, __thiscall, __stdcall and __cdecl calliā€¦","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":456634353,"name":"x86RetSpoof","owner_id":34515229,"owner_login":"danielkrupinski","updated_at":"2023-02-17T21:26:39.006Z","has_issues":true}},"sponsorable":false,"topics":["reverse-engineering","game-hacking","assembly-language","x86","cpp17","single-header","assembly-x86","anticheat-bypass"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":88,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Adanielkrupinski%252Fx86RetSpoof%2B%2Blanguage%253AC%252B%252B","metadata":null,"csrf_tokens":{"/danielkrupinski/x86RetSpoof/star":{"post":"QEvZX2DEeXIuAzjo4oY7ps0RZPT9dSaelTamGb3B4uULxed5o-tLp0cIsiz5ZhetnVsHRr2aiSuP2CJIsrdaUw"},"/danielkrupinski/x86RetSpoof/unstar":{"post":"BufSe2bevWJxQ2xZCB_t6B60suJrYsRYb_RZ3jaQlKZgB56BYfDFDssrT8aJQpzfqesdtFZN6x_gjZRkCfgZMQ"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"jtDXMNLQ1Pc54T-vpCLD_PcQSDXR_MFbcQkNjXG-XxyKUFtAmc-J2fxHhafY4EFiipTphQsQK9g1CDFHOC8MgA"}}},"title":"Repository search results"}