- Sandton, Gauteng
-
22:23
(UTC +02:00) - https://lehasas.github.io/
- in/lehasas
- lehasa_s
Lists (32)
Sort Name ascending (A-Z)
AI Security
Android Security Research
AppSec
Binary Analysis
Binary Exploitation
Cloud
Conferences and Talks
Cryptography
Enumeration
Firmware Security Testing
Forensics
Fuzzing
Hacking SaaS
Insecure Deserialization
IoT
Malware Analysis
Malware Research
Malware Things
Mathematics
Mobile Malware
Mobile Security
NetSec
Protocol Analysis and RE
Reverse Engineering
SAP
SAST Tools Research
Social Engineering
Telecommunications Hacking
Vulnerable Apps
Web3
WiFi Pentesting
YARA
Stars
- All languages
- ASP
- ActionScript
- Assembly
- Batchfile
- C
- C#
- C++
- CMake
- CSS
- Circom
- CodeQL
- Common Lisp
- Cuda
- Dart
- Go
- Groovy
- HCL
- HTML
- Hack
- Haskell
- Java
- JavaScript
- Jupyter Notebook
- Kotlin
- Makefile
- Mathematica
- Meson
- Objective-C
- PHP
- Pascal
- Perl
- PowerShell
- Python
- Roff
- Ruby
- Rust
- Shell
- Standard ML
- Swift
- TeX
- TypeScript
- Verilog
- Visual Basic 6.0
- WebAssembly
- XSLT
- YARA
C++ implementation of Shamir Secret Scheme over GF(256)
Open source BLE data reader for the Whoop 4.0 fitness band
Damn Vulnerable Thick Client App developed in C# .NET
Demo pages for testing the WebAuthn API with custom options (FIDO Project 2019-2020 @ University of Piraeus)
A tool to test & analyze FIDO2/WebAuthn requests and responses
zkmopro / rapidsnark
Forked from iden3/rapidsnarkrapidsnark is a fast zkSNARK prover written in C++, that generates proofs for circuits created with circom and snarkjs.
StealthNote is an application for people in an organization to anonymously broadcast messages.
Pull any installed Android app from your device as XAPK - no root required
DarkSword webkit exploit captured ITW
Reverse engineered a variant of Stealc famliy, analyzing data exfiltration with self-propagation. Demonstrated the threat actor techniques including credential theft and lateral movement.
Age Verification ZKP ICAO for Android
OWASP Foundation Web Respository
Zero-trust anti-forensic networking engine. Wipes secrets. Severs traces. CPR in a Stealth Tank. đź‘»
SPiCa (System Process Integrity & Cross-view Analysis) is a high-performance, eBPF-based rootkit detection engine written in Rust, inspired by the hatsune miku song SPiCa
Whoopsie — Reverse‑engineered WHOOP research with a PoC Flutter app and tiny backend.
Generates x86, x64, or AMD64+x86 position-independent shellcode that loads .NET Assemblies, PE files, and other Windows payloads from memory and runs them with parameters