{"id":21871081,"url":"https://github.com/isaka-james/memory-exploit-game","last_synced_at":"2025-03-21T22:23:57.075Z","repository":{"id":247651773,"uuid":"826459414","full_name":"isaka-james/memory-exploit-game","owner":"isaka-james","description":"Hack software by intercepting and manipulating memory on Linux.","archived":false,"fork":false,"pushed_at":"2024-07-09T18:59:28.000Z","size":9,"stargazers_count":2,"open_issues_count":0,"forks_count":0,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-01-26T16:47:25.103Z","etag":null,"topics":["hacking-memory","heap-exploitation","linux","memory","memory-game","memory-hacking","process-hack"],"latest_commit_sha":null,"homepage":"","language":"C++","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/isaka-james.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2024-07-09T18:43:24.000Z","updated_at":"2024-07-10T10:30:44.000Z","dependencies_parsed_at":"2024-07-09T23:34:08.323Z","dependency_job_id":"961af5f6-bb74-4f63-b9a7-95e3e9103733","html_url":"https://github.com/isaka-james/memory-exploit-game","commit_stats":null,"previous_names":["isaka-james/memory-exploit-game"],"tags_count":0,"template":false,"template_full_name":null,"repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/isaka-james%2Fmemory-exploit-game","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/isaka-james%2Fmemory-exploit-game/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/isaka-james%2Fmemory-exploit-game/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/isaka-james%2Fmemory-exploit-game/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/isaka-james","download_url":"https://codeload.github.com/isaka-james/memory-exploit-game/tar.gz/refs/heads/main","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":244876467,"owners_count":20524855,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["hacking-memory","heap-exploitation","linux","memory","memory-game","memory-hacking","process-hack"],"created_at":"2024-11-28T06:13:22.032Z","updated_at":"2025-03-21T22:23:57.048Z","avatar_url":"https://github.com/isaka-james.png","language":"C++","readme":"## Memory Exploit Game 💾🕹️\n\n### Introduction\nMemory Exploit Game is a command-line game on Linux where you manipulate memory to influence gameplay dynamics. The challenge includes guessing characters (m, a, s, t, e, r) to maintain your balance without running out.\n\n### Game Dynamics\n- **Initial Balance:** 300\n- **Guessing Mechanism:** Choose characters (m, a, s, t, e, r).\n- **Outcome:**\n  - Correct Guess: Balance x2.\n  - Incorrect Guess: Deduct 100 from balance.\n- **Game Termination:** Balance hits 0, displaying the number of moves made.\n- **Endless Play:** Continues indefinitely if you keep guessing correctly.\n\n### Hack Script (hack.sh)\nUse `hack.sh` to gain privileged access and manipulate memory to cheat the game. The game's challenge includes code segments placed in the heap, increasing the difficulty of cheating effectively.\n\n### Usage\n1. **Run the Game:**\n   ```bash\n   ./game\n   ```\n   Start the command-line game.\n\n2. **Use Hack Script:**\n   ```bash\n   sudo ./hack.sh\n   ```\n   Access and manipulate memory to influence game outcomes.\n\n### Purpose\nExplore memory exploitation techniques to modify game behavior on Linux systems without source code access.\n\n[MIT](LICENSE)\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fisaka-james%2Fmemory-exploit-game","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fisaka-james%2Fmemory-exploit-game","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fisaka-james%2Fmemory-exploit-game/lists"}