📖
Learning and Growing
- Sandton, Gauteng
-
20:39
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Lists (31)
Sort Name ascending (A-Z)
AI Security
6 repositories
Android Security Research
8 repositories
AppSec
40 repositories
Binary Analysis
48 repositories
Binary Exploitation
6 repositories
Cloud
4 repositories
Conferences and Talks
2 repositories
Cryptography
11 repositories
Enumeration
1 repository
Firmware Security Testing
5 repositories
Forensics
1 repository
Fuzzing
17 repositories
Hacking SaaS
1 repository
Insecure Deserialization
1 repository
IoT
15 repositories
Malware Analysis
38 repositories
Malware Research
30 repositories
Malware Things
23 repositories
Mathematics
9 repositories
Mobile Malware
1 repository
Mobile Security
120 repositories
NetSec
29 repositories
Protocol Analysis and RE
9 repositories
Reverse Engineering
65 repositories
SAST Tools Research
3 repositories
Social Engineering
1 repository
Telecommunications Hacking
1 repository
Vulnerable Apps
2 repositories
Web3
2 repositories
WiFi Pentesting
2 repositories
YARA
2 repositories
Stars
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- CodeQL
- Common Lisp
- Cuda
- Dart
- Go
- Groovy
- HCL
- HTML
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Mathematica
- Meson
- Objective-C
- PHP
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Standard ML
- Swift
- TeX
- TypeScript
- Verilog
- WebAssembly
- XSLT
- YARA
1
star
written in Verilog
Clear filter
building blocks for accelerating ZK proofs over binary fields