- Sandton, Gauteng
-
07:47
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Lists (32)
Sort Name ascending (A-Z)
AI Security
Android Security Research
AppSec
Binary Analysis
Binary Exploitation
Cloud
Conferences and Talks
Cryptography
Enumeration
Firmware Security Testing
Forensics
Fuzzing
Hacking SaaS
Insecure Deserialization
IoT
Malware Analysis
Malware Research
Malware Things
Mathematics
Mobile Malware
Mobile Security
NetSec
Protocol Analysis and RE
Reverse Engineering
SAP
SAST Tools Research
Social Engineering
Telecommunications Hacking
Vulnerable Apps
Web3
WiFi Pentesting
YARA
Stars
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Circom
- CodeQL
- Common Lisp
- Cuda
- Dart
- Dockerfile
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Markdown
- Mathematica
- Meson
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Standard ML
- Swift
- TeX
- TypeScript
- Verilog
- Visual Basic 6.0
- WebAssembly
- XSLT
- YARA
Generate Objective-C headers from Mach-O files.
The iOS IPA file Reverse Engineering reference
Supporting code and apps for demonstrating Android interprocess communication
This contains notes and slides for my talk on Reverse Engineering Android Malware
Static IL2CPP metadata extraction for Unity ARM64 binaries
WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit
Pre-Built Vulnerable Environments Based on Docker-Compose
Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)
(CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript
Pentest and manual code review templates -- web/API, cloud (AWS/GCP/Azure), mobile (iOS/Android), thick client, hardware/IoT, plus 11 language-specific code review guides
Decompiled and cleaned Akamai v3 VM powering the latest sensor_data challenge script.
linux, kernel, rootkit, educational, cybersecurity
Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat + PMKID.
Android Dynamic Binary Instrumentation tool for tracing Android native layer
Free educational content on reverse engineering and malware analysis from the FLARE team
Windows x86 PoC: Stack‑based buffer overflow with custom shellcode on legacy 32-bit Windows.
C++ implementation of Shamir Secret Scheme over GF(256)
Open source BLE data reader for the Whoop 4.0 fitness band
Damn Vulnerable Thick Client App developed in C# .NET