{"id":21973049,"url":"https://github.com/pikulet/mem-attacks-example","last_synced_at":"2025-07-09T04:34:43.255Z","repository":{"id":113080849,"uuid":"299741972","full_name":"pikulet/mem-attacks-example","owner":"pikulet","description":"Examples of Binary Exploitations - Buffer Overflow, Return-Oriented Programming and Format String","archived":false,"fork":false,"pushed_at":"2022-10-27T07:00:10.000Z","size":342,"stargazers_count":8,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"master","last_synced_at":"2025-04-28T13:54:50.337Z","etag":null,"topics":["binary-exploitation","buffer-overflow-attack","format-string-attack","return-oriented-programming"],"latest_commit_sha":null,"homepage":"","language":"Python","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"mit","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/pikulet.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null,"zenodo":null}},"created_at":"2020-09-29T21:27:27.000Z","updated_at":"2024-12-19T15:28:01.000Z","dependencies_parsed_at":"2023-03-13T01:52:32.094Z","dependency_job_id":null,"html_url":"https://github.com/pikulet/mem-attacks-example","commit_stats":null,"previous_names":[],"tags_count":0,"template":false,"template_full_name":null,"purl":"pkg:github/pikulet/mem-attacks-example","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pikulet%2Fmem-attacks-example","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pikulet%2Fmem-attacks-example/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pikulet%2Fmem-attacks-example/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pikulet%2Fmem-attacks-example/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/pikulet","download_url":"https://codeload.github.com/pikulet/mem-attacks-example/tar.gz/refs/heads/master","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/pikulet%2Fmem-attacks-example/sbom","host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":264394790,"owners_count":23601361,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["binary-exploitation","buffer-overflow-attack","format-string-attack","return-oriented-programming"],"created_at":"2024-11-29T15:24:42.454Z","updated_at":"2025-07-09T04:34:43.249Z","avatar_url":"https://github.com/pikulet.png","language":"Python","readme":"# mem-attacks-example\nExamples of Binary Exploitations\n\n- Buffer Overflow\n- Format String\n- Return-Oriented Programming\n\nNot intended to be a teaching guide. \n\nPre-requisites:\n\nThe basic techniques of binary exploitation, namely overwriting variables/ return addresses.\n\nThis repository was tested on Ubuntu 16.04\n\nGeneral Tips:\n- Install `peda`, which is a much more bazinga-ed version of gdb\n- For format string attack, read documentation on `printf` calling conventions and how arguments are passed to functions for your machine (registers or stack).\n\n\n\n","funding_links":[],"categories":[],"sub_categories":[],"project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpikulet%2Fmem-attacks-example","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fpikulet%2Fmem-attacks-example","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fpikulet%2Fmem-attacks-example/lists"}