{"payload":{"header_redesign_enabled":false,"results":[{"id":"116049333","archived":false,"color":"#555555","followers":159,"has_funding_file":false,"hl_name":"smeso/MTPwn","hl_trunc_description":"PoC exploit for arbitrary file read/write in locked Samsung Android device via MTP (SVE-2017-10086)","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":116049333,"name":"MTPwn","owner_id":28690427,"owner_login":"smeso","updated_at":"2018-01-02T19:28:01.572Z","has_issues":true}},"sponsorable":false,"topics":["android","usb","exploit","poc","recovery","samsung","mtp"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":0,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":73,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Asmeso%252FMTPwn%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/smeso/MTPwn/star":{"post":"WhAYtHNlRuy0N2jKJ5gmksFMywI2L6rKgOKVZ_uDp2bf1SNYOAGo092gESxum7hkftDMzEZxTo53_V41uA6CpA"},"/smeso/MTPwn/unstar":{"post":"M56mROZFMMyvTZXIOVwJ2FJQ7JXxeaMRmunSkhpC5EMnwUfz0HJaEH_dNhVpj_kAq0MPIA-3W_Y6augMo_r-0Q"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"qHhvcm0AVKsQfy_POi5Nm0xHCGq9tAG5CAuxrZO32SjFZK--E4GoyLzFPiZ8EAsAGMpzpzW5J8krd6zhRzZ70g"}}},"title":"Repository search results"}