{"payload":{"header_redesign_enabled":false,"results":[{"id":"404901674","archived":false,"color":"#f34b7d","followers":258,"has_funding_file":false,"hl_name":"ZeroMemoryEx/APT38-0day-Stealer","hl_trunc_description":"APT38 Tactic PoC for Stealing 0days from security professionals","language":"C++","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":404901674,"name":"APT38-0day-Stealer","owner_id":60795188,"owner_login":"ZeroMemoryEx","updated_at":"2023-06-22T13:15:37.861Z","has_issues":true}},"sponsorable":false,"topics":["lazarus","visual-studio","malware","rce","malware-research","win32api","red-team","0day","lateral-movement","0day-stealer","north-korean-apt","apt-38"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":66,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253AZeroMemoryEx%252FAPT38-0day-Stealer%2B%2Blanguage%253AC%252B%252B","metadata":null,"warn_limited_results":false,"csrf_tokens":{"/ZeroMemoryEx/APT38-0day-Stealer/star":{"post":"n_4rXSIiUB3W_9Q2PWw0ei5KRyKlmZ9GQnx5tsKZsB6EjRfWVnFzYL6EZ7J0SxvB0DV2kVaUHCdMT40N1pogeA"},"/ZeroMemoryEx/APT38-0day-Stealer/unstar":{"post":"SN9G0MwAIyiHHOnRBlPpKujCgmoPbd-5SHJ-BG2npMjCthPoc56ltwfoaXviClKB9IL0BvCWwMIW8ojgQaIn4w"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"U3AmLJ6NZOKkDqrtYGYMf8RI2shSsSxxM1-kSgIr7mQ7a1xtEofNSk5Z1FoTjMlULWO7pbyiSTjvToWPNtK6ew"}}},"title":"Repository search results"}