{"id":15049154,"url":"https://github.com/research-camp/hacking-computer-memory","last_synced_at":"2026-02-17T06:09:15.024Z","repository":{"id":165891452,"uuid":"543935678","full_name":"research-camp/hacking-computer-memory","owner":"research-camp","description":"Research about Buffer Overflow Attack vulnerability.","archived":false,"fork":false,"pushed_at":"2023-05-16T07:12:59.000Z","size":30,"stargazers_count":2,"open_issues_count":0,"forks_count":1,"subscribers_count":1,"default_branch":"main","last_synced_at":"2025-03-14T00:24:24.403Z","etag":null,"topics":["buffer-overflow","buffer-overflow-attack","buffer-overflow-vulnerability","c-programming-language","cpp","memory-allocation","memory-management"],"latest_commit_sha":null,"homepage":"","language":"C","has_issues":true,"has_wiki":null,"has_pages":null,"mirror_url":null,"source_name":null,"license":"gpl-3.0","status":null,"scm":"git","pull_requests_enabled":true,"icon_url":"https://github.com/research-camp.png","metadata":{"files":{"readme":"README.md","changelog":null,"contributing":null,"funding":null,"license":"LICENSE","code_of_conduct":null,"threat_model":null,"audit":null,"citation":null,"codeowners":null,"security":null,"support":null,"governance":null,"roadmap":null,"authors":null,"dei":null,"publiccode":null,"codemeta":null}},"created_at":"2022-10-01T07:36:31.000Z","updated_at":"2023-07-31T08:53:23.000Z","dependencies_parsed_at":null,"dependency_job_id":"e7ac6a11-3eb4-4152-a45e-ed9279acbb56","html_url":"https://github.com/research-camp/hacking-computer-memory","commit_stats":{"total_commits":21,"total_committers":2,"mean_commits":10.5,"dds":0.1428571428571429,"last_synced_commit":"1fad631f978a3f777be335aad86ff277a3c97b6d"},"previous_names":[],"tags_count":2,"template":false,"template_full_name":null,"purl":"pkg:github/research-camp/hacking-computer-memory","repository_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/research-camp%2Fhacking-computer-memory","tags_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/research-camp%2Fhacking-computer-memory/tags","releases_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/research-camp%2Fhacking-computer-memory/releases","manifests_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/research-camp%2Fhacking-computer-memory/manifests","owner_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners/research-camp","download_url":"https://codeload.github.com/research-camp/hacking-computer-memory/tar.gz/refs/heads/main","sbom_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories/research-camp%2Fhacking-computer-memory/sbom","scorecard":null,"host":{"name":"GitHub","url":"https://github.com","kind":"github","repositories_count":279002345,"owners_count":26083340,"icon_url":"https://github.com/github.png","version":null,"created_at":"2022-05-30T11:31:42.601Z","updated_at":"2022-07-04T15:15:14.044Z","status":"online","status_checked_at":"2025-10-09T02:00:07.460Z","response_time":59,"last_error":null,"robots_txt_status":"success","robots_txt_updated_at":"2025-07-24T06:49:26.215Z","robots_txt_url":"https://github.com/robots.txt","online":true,"can_crawl_api":true,"host_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub","repositories_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repositories","repository_names_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/repository_names","owners_url":"https://repos.ecosyste.ms/api/v1/hosts/GitHub/owners"}},"keywords":["buffer-overflow","buffer-overflow-attack","buffer-overflow-vulnerability","c-programming-language","cpp","memory-allocation","memory-management"],"created_at":"2024-09-24T21:18:34.967Z","updated_at":"2025-10-09T23:13:05.904Z","avatar_url":"https://github.com/research-camp.png","language":"C","funding_links":[],"categories":[],"sub_categories":[],"readme":"# Hacking computer memory with C, But how? (Buffer Overflow Attack)\n\nAccess to other parts of memory with C programming language. How does C programming language allows us to\naccess every part of memory? How we can secure our system againts this problem?\n\nIn this research we are going to talk about **Buffer Overflow** and it is a common cause of security vulnerabilities, as not checking the bounds of an array before indexing it can result in malicious modifications to your program at runtime.\n\n## Publishers\n\nThis research is done by **Mr.Amirhossein Najafizadeh** and **Mrs.Asal Delkhosh** at January 2023.\n\n## Publication\n\nCheck the research publication at [ResearchGate](https://www.researchgate.net/publication/366878233_Hacking_computer_memory_with_C_Buffer_Overflow_Attack).\n","project_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fresearch-camp%2Fhacking-computer-memory","html_url":"https://awesome.ecosyste.ms/projects/github.com%2Fresearch-camp%2Fhacking-computer-memory","lists_url":"https://awesome.ecosyste.ms/api/v1/projects/github.com%2Fresearch-camp%2Fhacking-computer-memory/lists"}