Title: Pull requests · gerasdf/InsecureProgramming · GitHub
Open Graph Title: Pull requests · gerasdf/InsecureProgramming
X Title: Pull requests · gerasdf/InsecureProgramming
Description: Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them - Pull requests · gerasdf/InsecureProgramming
Open Graph Description: Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them - Pull requests · gerasdf/InsecurePr...
X Description: Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them - Pull requests · gerasdf/InsecurePr...
Opengraph URL: https://github.com/gerasdf/InsecureProgramming
X: @github
Domain: patch-diff.githubusercontent.com
| route-pattern | /:user_id/:repository/pulls(.:format) |
| route-controller | pull_requests |
| route-action | index |
| fetch-nonce | v2:e6347b2d-a95f-ae2b-3a07-18c77da84ddb |
| current-catalog-service-hash | ae870bc5e265a340912cde392f23dad3671a0a881730ffdadd82f2f57d81641b |
| request-id | 9378:FDA3:3141445:41C942A:696F1C88 |
| html-safe-nonce | dbe180569744a01203c2783c563c8b0ad92c91b7967d82a9b52533c4604ca56a |
| visitor-payload | eyJyZWZlcnJlciI6IiIsInJlcXVlc3RfaWQiOiI5Mzc4OkZEQTM6MzE0MTQ0NTo0MUM5NDJBOjY5NkYxQzg4IiwidmlzaXRvcl9pZCI6Ijg1NDU5MjQ3NTUzNzY1MTIxMzYiLCJyZWdpb25fZWRnZSI6ImlhZCIsInJlZ2lvbl9yZW5kZXIiOiJpYWQifQ== |
| visitor-hmac | 3b6b35b329a6a14b810ab6a4b08991b0b97c8682374405a7a61a9c7080af0363 |
| hovercard-subject-tag | repository:104121594 |
| github-keyboard-shortcuts | repository,pull-request-list,pull-request-conversation,pull-request-files-changed,copilot |
| google-site-verification | Apib7-x98H0j5cPqHWwSMm6dNU4GmODRoqxLiDzdx9I |
| octolytics-url | https://collector.github.com/github/collect |
| analytics-location-query-strip | true |
| analytics-location | / |
| fb:app_id | 1401488693436528 |
| apple-itunes-app | app-id=1477376905, app-argument=https://github.com/gerasdf/InsecureProgramming/pulls |
| twitter:image | https://opengraph.githubassets.com/477846041d319f879bcd3e82b8fae2a4580bcd5c9091726b49f2c4d5d7b1e05d/gerasdf/InsecureProgramming |
| twitter:card | summary_large_image |
| og:image | https://opengraph.githubassets.com/477846041d319f879bcd3e82b8fae2a4580bcd5c9091726b49f2c4d5d7b1e05d/gerasdf/InsecureProgramming |
| og:image:alt | Insecure Programming by Example - Teach yourself how buffer overflows, format strings, numeric bugs, and other binary security bugs work and how to exploit them - Pull requests · gerasdf/InsecurePr... |
| og:image:width | 1200 |
| og:image:height | 600 |
| og:site_name | GitHub |
| og:type | object |
| hostname | github.com |
| expected-hostname | github.com |
| None | b278ad162d35332b6de714dfb005de04386c4d92df6475522bef910f491a35ee |
| turbo-cache-control | no-preview |
| go-import | github.com/gerasdf/InsecureProgramming git https://github.com/gerasdf/InsecureProgramming.git |
| octolytics-dimension-user_id | 510958 |
| octolytics-dimension-user_login | gerasdf |
| octolytics-dimension-repository_id | 104121594 |
| octolytics-dimension-repository_nwo | gerasdf/InsecureProgramming |
| octolytics-dimension-repository_public | true |
| octolytics-dimension-repository_is_fork | false |
| octolytics-dimension-repository_network_root_id | 104121594 |
| octolytics-dimension-repository_network_root_nwo | gerasdf/InsecureProgramming |
| turbo-body-classes | logged-out env-production page-responsive |
| disable-turbo | false |
| browser-stats-url | https://api.github.com/_private/browser/stats |
| browser-errors-url | https://api.github.com/_private/browser/errors |
| release | 39aed5006635ab6f45e6b77d23e73b08a00272a3 |
| ui-target | full |
| theme-color | #1e2327 |
| color-scheme | light dark |
Links:
Viewport: width=device-width