Skip to content
View lehasaS's full-sized avatar
📖
Learning and Growing
📖
Learning and Growing

Block or report lehasaS

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don’t include any personal information such as legal names or email addresses. Markdown is supported. This note will only be visible to you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
Showing results

Cyber Security Notes, Methodology, Resources and Tips

228 65 Updated Apr 13, 2026

Generate Objective-C headers from Mach-O files.

Objective-C 3,566 898 Updated Apr 6, 2022

The iOS IPA file Reverse Engineering reference

Python 533 37 Updated Jan 29, 2024

Supporting code and apps for demonstrating Android interprocess communication

Java 44 5 Updated Aug 5, 2024

This contains notes and slides for my talk on Reverse Engineering Android Malware

69 5 Updated Feb 6, 2026

iOS and macOS Decompiler

Java 2,936 110 Updated Aug 26, 2025

Static IL2CPP metadata extraction for Unity ARM64 binaries

Go 3 Updated Apr 11, 2026

WebLogic Insecure Deserialization - CVE-2019-2725 payload builder & exploit

Python 52 11 Updated Sep 26, 2019

Pre-Built Vulnerable Environments Based on Docker-Compose

Dockerfile 20,528 4,773 Updated Apr 15, 2026

Starlark Language

Python 2,954 175 Updated Feb 6, 2026

Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)

Go 129 42 Updated Sep 16, 2022

(CVE-2019-2725) Oracle WLS(Weblogic) RCE test sciript

Python 2 Updated Nov 7, 2020

Kalim backdooe Malware Report

3 Updated Apr 1, 2026

Pentest and manual code review templates -- web/API, cloud (AWS/GCP/Azure), mobile (iOS/Android), thick client, hardware/IoT, plus 11 language-specific code review guides

20 5 Updated Apr 12, 2026

Decompiled and cleaned Akamai v3 VM powering the latest sensor_data challenge script.

JavaScript 31 7 Updated Apr 8, 2026

linux, kernel, rootkit, educational, cybersecurity

C 27 6 Updated Apr 12, 2026

Wireless penetration testing framework. Automates WPA/WPA2/WEP/WPS attacks - recon to exploitation in one command. aircrack-ng + hashcat + PMKID.

Python 28 2 Updated Apr 10, 2026

Android Dynamic Binary Instrumentation tool for tracing Android native layer

C 316 84 Updated Apr 7, 2023

Fuzzing with controlled compilation

C++ 31 12 Updated Apr 7, 2023

Free educational content on reverse engineering and malware analysis from the FLARE team

JavaScript 888 64 Updated Mar 31, 2026

🔒 Trezor Firmware Monorepo

C 1,707 758 Updated Apr 15, 2026

SatoshiLabs Improvement Proposals

Markdown 1,671 1,870 Updated Apr 13, 2026

Windows x86 PoC: Stack‑based buffer overflow with custom shellcode on legacy 32-bit Windows.

C 8 2 Updated Apr 15, 2026

C++ implementation of Shamir Secret Scheme over GF(256)

C++ 24 8 Updated Jan 26, 2026

Library for the Shamir secret sharing scheme

C 400 85 Updated Aug 18, 2025

Open source BLE data reader for the Whoop 4.0 fitness band

Python 2 Updated Apr 8, 2026
TypeScript 156 21 Updated Apr 16, 2026

Damn Vulnerable Thick Client App developed in C# .NET

C# 179 77 Updated Aug 17, 2023
Next