{"id":13439451,"url":"https://github.com/deadbits/InsecureProgramming","last_synced_at":"2025-03-20T08:31:06.575Z","repository":{"id":5255008,"uuid":"6432845","full_name":"deadbits/InsecureProgramming","owner":"deadbits","description":"mirror of gera's insecure programming examples | http://community.coresecurity.com/~gera/InsecureProgramming/","archived":false,"fork":false,"pushed_at":"2020-10-20T17:43:31.000Z","size":11,"stargazers_count":263,"open_issues_count":0,"forks_count":79,"subscribers_count":15,"default_branch":"master","last_synced_at":"2024-08-01T03:29:27.372Z","etag":null,"topics":["c","exploitation","learning-exercise","security","security-vulnerability","vulnerabilities"],"latest_commit_sha":null,"homepage":null,"language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":"dompdf/dompdf","license":null,"status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/deadbits.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":null,"code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null}},"created_at":"2012-10-28T22:29:57.000Z","updated_at":"2024-07-27T19:44:17.000Z","dependencies_parsed_at":"2022-09-04T07:40:15.888Z","dependency_job_id":null,"html_url":"https://github.com/deadbits/InsecureProgramming","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deadbits%2FInsecureProgramming","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deadbits%2FInsecureProgramming/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deadbits%2FInsecureProgramming/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/deadbits%2FInsecureProgramming/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/deadbits","download_url":"https://codeload.github.com/deadbits/InsecureProgramming/tar.gz/refs/heads/master","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":221739720,"owners_count":16872775,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["c","exploitation","learning-exercise","security","security-vulnerability","vulnerabilities"],"created_at":"2024-07-31T03:01:14.023Z","updated_at":"2024-10-27T22:30:57.908Z","avatar_url":"https://github.com/deadbits.png","language":"C","readme":"[![Say Thanks](https://img.shields.io/badge/Say%20Thanks-!-1EAEDB.svg?style=flat)](https://saythanks.io/to/deadbits)\n\n# InsecureProgramming\nThis is a mirror of Gera's Insecure Programming examples. Olds but great for begginers getting into the basics of exploitation techniques and vulnerabilities.\n\n## Original Source\nhttp://community.coresecurity.com/~gera/InsecureProgramming/\n\n\n","funding_links":[],"categories":["C"],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeadbits%2FInsecureProgramming","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fdeadbits%2FInsecureProgramming","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fdeadbits%2FInsecureProgramming/lists"}