- Sandton, Gauteng
-
05:10
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Lists (32)
Sort Name ascending (A-Z)
AI Security
Android Security Research
AppSec
Binary Analysis
Binary Exploitation
Cloud
Conferences and Talks
Cryptography
Enumeration
Firmware Security Testing
Forensics
Fuzzing
Hacking SaaS
Insecure Deserialization
IoT
Malware Analysis
Malware Research
Malware Things
Mathematics
Mobile Malware
Mobile Security
NetSec
Protocol Analysis and RE
Reverse Engineering
SAP
SAST Tools Research
Social Engineering
Telecommunications Hacking
Vulnerable Apps
Web3
WiFi Pentesting
YARA
Stars
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Circom
- CodeQL
- Common Lisp
- Cuda
- Dart
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Markdown
- Mathematica
- Meson
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Standard ML
- Swift
- TeX
- TypeScript
- Verilog
- Visual Basic 6.0
- WebAssembly
- XSLT
- YARA
Official QEMU mirror. Please see https://www.qemu.org/contribute/ for how to submit changes to QEMU. Pull Requests are disabled. Please only use release tarballs from the QEMU website.
AddressSanitizer, ThreadSanitizer, MemorySanitizer
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Course materials for Modern Binary Exploitation by RPISEC
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
eBPF implementation that runs on top of Windows
Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Powerful automated tool for reverse engineering Unity IL2CPP binaries
🔥 ShadowHook is an Android inline hook library which supports thumb, arm32 and arm64.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Command line utility for inserting a dylib load command into a Mach-O binary
All of the code from Learn C The Hard Way, each project, plus the presentation slides used in the videos.
Exercises to learn how to fuzz with American Fuzzy Lop
Original C Implementation of the Hell's Gate VX Technique
Tool to decompile & extract Android Dex bytecode from Vdex files
Decompilation of Castlevania: Symphony of the Night (PSX, PSP, Saturn)
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.