{"payload":{"header_redesign_enabled":false,"results":[{"id":"430220430","archived":false,"color":"#555555","followers":674,"has_funding_file":true,"hl_name":"mrexodia/dumpulator","hl_trunc_description":"An easy-to-use library for emulating memory dumps. Useful for malware analysis (config extraction, unpacking) and dynamic analysis in gen…","language":"C","mirror":false,"owned_by_organization":false,"public":true,"repo":{"repository":{"id":430220430,"name":"dumpulator","owner_id":2458265,"owner_login":"mrexodia","updated_at":"2024-02-02T13:14:58.333Z","has_issues":true}},"sponsorable":true,"topics":["python","windows","emulator","cross-platform","sandbox","x64","reverse-engineering","malware","python3","easy-to-use","malware-analyzer","malware-analysis","malware-research","unicorn","hacktoberfest","debugging-tools","minidump","unpacking","windows-internals"],"type":"Public","help_wanted_issues_count":0,"good_first_issue_issues_count":1,"starred_by_current_user":false}],"type":"repositories","page":1,"page_count":1,"elapsed_millis":61,"errors":[],"result_count":1,"facets":[],"protected_org_logins":[],"topics":null,"query_id":"","logged_in":false,"sign_up_path":"/signup?source=code_search_results","sign_in_path":"/login?return_to=https%3A%2F%2Fgithub.com%2Fsearch%3Fq%3Drepo%253Amrexodia%252Fdumpulator%2B%2Blanguage%253AC","metadata":null,"csrf_tokens":{"/mrexodia/dumpulator/star":{"post":"2W5e0M4L-GY_k4J4A5WbOwVGQIvIcCyR-SDlRTRcW---0CiQp205LpE3rxGby30ML5drqv5ZLnhVpGO8KrE-Yg"},"/mrexodia/dumpulator/unstar":{"post":"lHnsjDK5_Ols0_hGN9qEDTvTszRg0AfC4QAiBLw8jlY4kUQ5J22ExzxIW_1S373Ig7Mj3CbVRI3jDUg9DKuBXA"},"/sponsors/batch_deferred_sponsor_buttons":{"post":"PHrI_1Gh1COHxi76fUO4nDSYIStqVKLPOvlOnLs5A-QSp51YYZpED_aEcM9Ux7jvqRDm9tDnls6-2cUuzHyCcQ"}}},"title":"Repository search results"}