- Sandton, Gauteng
-
19:36
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Lists (31)
Sort Name ascending (A-Z)
AI Security
Android Security Research
AppSec
Binary Analysis
Binary Exploitation
Cloud
Conferences and Talks
Cryptography
Enumeration
Firmware Security Testing
Forensics
Fuzzing
Hacking SaaS
Insecure Deserialization
IoT
Malware Analysis
Malware Research
Malware Things
Mathematics
Mobile Malware
Mobile Security
NetSec
Protocol Analysis and RE
Reverse Engineering
SAST Tools Research
Social Engineering
Telecommunications Hacking
Vulnerable Apps
Web3
WiFi Pentesting
YARA
Stars
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- Common Lisp
- Cuda
- Dart
- Go
- Groovy
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Mathematica
- Meson
- Objective-C
- PHP
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Standard ML
- Swift
- TeX
- TypeScript
- Verilog
- WebAssembly
- XSLT
- YARA
AddressSanitizer, ThreadSanitizer, MemorySanitizer
xoreaxeaxeax / movfuscator
Forked from Battelle/movfuscatorThe single instruction C compiler
iperf3: A TCP, UDP, and SCTP network bandwidth measurement tool
The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!
Course materials for Modern Binary Exploitation by RPISEC
This project hosts security advisories and their accompanying proof-of-concepts related to research conducted at Google which impact non-Google owned code.
eBPF implementation that runs on top of Windows
Security oriented software fuzzer. Supports evolutionary, feedback-driven fuzzing based on code coverage (SW and HW based)
Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loading of a library from memory into a host process.
Powerful automated tool for reverse engineering Unity IL2CPP binaries
🔥 ShadowHook is an Android inline hook library which supports thumb, arm32 and arm64.
An open library of adversary emulation plans designed to empower organizations to test their defenses based on real-world TTPs.
Command line utility for inserting a dylib load command into a Mach-O binary
All of the code from Learn C The Hard Way, each project, plus the presentation slides used in the videos.
Exercises to learn how to fuzz with American Fuzzy Lop
Original C Implementation of the Hell's Gate VX Technique
Tool to decompile & extract Android Dex bytecode from Vdex files
IoTGoat is a deliberately insecure firmware created to educate software developers and security professionals with testing commonly found vulnerabilities in IoT devices.
Dirty Pipe root exploit for Android (Pixel 6)
Decompilation of Castlevania: Symphony of the Night (PSX, PSP, Saturn)
This repository contains sample programs written primarily in C and C++ for learning native code reverse engineering.